Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1CMweaqlKp.exe

Overview

General Information

Sample name:1CMweaqlKp.exe
renamed because original name is a hash value
Original sample name:8a19d654cb37e4e51be045acaf097e74.exe
Analysis ID:1436254
MD5:8a19d654cb37e4e51be045acaf097e74
SHA1:7a3a86421a806d2ba66ae84e86305847c8b1f766
SHA256:59b3af1a244a082219116ed9b496de99236b01ae42df75bf4211ed2b7069bc4b
Tags:32exetrojan
Infos:

Detection

LummaC, Amadey, LummaC Stealer, Mars Stealer, RedLine, RisePro Stealer, SmokeLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
System process connects to network (likely due to code injection or exploit)
Yara detected Amadey
Yara detected Amadeys Clipper DLL
Yara detected Amadeys stealer DLL
Yara detected AntiVM3
Yara detected LummaC Stealer
Yara detected Mars stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected SmokeLoader
Yara detected Stealc
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
.NET source code contains very large array initializations
.NET source code references suspicious native API functions
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation))
Checks if the current machine is a virtual machine (disk enumeration)
Creates HTML files with .exe extension (expired dropper behavior)
Creates a thread in another existing process (thread injection)
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Disables UAC (registry)
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
PE file contains section with special chars
Potentially malicious time measurement code found
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses netsh to modify the Windows network and firewall settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops certificate files (DER)
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
Queries information about the installed CPU (vendor, model number etc)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Folder Compress To Potentially Suspicious Output Via Compress-Archive Cmdlet
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 1CMweaqlKp.exe (PID: 2912 cmdline: "C:\Users\user\Desktop\1CMweaqlKp.exe" MD5: 8A19D654CB37E4E51BE045ACAF097E74)
    • explorta.exe (PID: 6676 cmdline: "C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe" MD5: 8A19D654CB37E4E51BE045ACAF097E74)
      • explorta.exe (PID: 8160 cmdline: "C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe" MD5: 8A19D654CB37E4E51BE045ACAF097E74)
      • amert.exe (PID: 7928 cmdline: "C:\Users\user\AppData\Local\Temp\1000019001\amert.exe" MD5: E67C8B3E5EC9F64052FCD2F45341CFA5)
        • explorha.exe (PID: 5664 cmdline: "C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe" MD5: E67C8B3E5EC9F64052FCD2F45341CFA5)
          • rundll32.exe (PID: 4460 cmdline: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main MD5: 889B99C52A60DD49227C5E485A016679)
            • rundll32.exe (PID: 4076 cmdline: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main MD5: EF3179D498793BF4234F708D3BE28633)
              • netsh.exe (PID: 1832 cmdline: netsh wlan show profiles MD5: 6F1E6DD688818BC3D1391D0CC7D597EB)
                • conhost.exe (PID: 3756 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • powershell.exe (PID: 352 cmdline: powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal MD5: 04029E121A0CFA5991749937DD22A1D9)
                • conhost.exe (PID: 6580 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • swiiiii.exe (PID: 2588 cmdline: "C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe" MD5: 1C7D0F34BB1D85B5D2C01367CC8F62EF)
            • conhost.exe (PID: 8044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • RegAsm.exe (PID: 5348 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
            • WerFault.exe (PID: 8080 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 928 MD5: C31336C1EFC2CCB44B4326EA793040F2)
          • rundll32.exe (PID: 8060 cmdline: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main MD5: 889B99C52A60DD49227C5E485A016679)
          • NewB.exe (PID: 2336 cmdline: "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe" MD5: 0099A99F5FFB3C3AE78AF0084136FAB3)
            • schtasks.exe (PID: 8260 cmdline: "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe" /F MD5: 48C2FE20575769DE916F48EF0676A965)
              • conhost.exe (PID: 8272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • ISetup8.exe (PID: 8700 cmdline: "C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe" MD5: 85D23A7E1BF2207A3FA825136090E00D)
              • u6po.0.exe (PID: 8000 cmdline: "C:\Users\user\AppData\Local\Temp\u6po.0.exe" MD5: F2CE35E5AA2A7771759D7F424F2803AC)
            • toolspub1.exe (PID: 9168 cmdline: "C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe" MD5: A9C28724B16C3BB3AF2FDB5AA9BE277C)
          • jok.exe (PID: 8672 cmdline: "C:\Users\user\AppData\Local\Temp\1000071001\jok.exe" MD5: 8510BCF5BC264C70180ABE78298E4D5B)
          • swiiii.exe (PID: 8936 cmdline: "C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe" MD5: 586F7FECACD49ADAB650FAE36E2DB994)
            • conhost.exe (PID: 8944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • RegAsm.exe (PID: 9008 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
          • file300un.exe (PID: 7556 cmdline: "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" MD5: 18B50C6016CD5D7FF2F01B71A5E3373B)
            • powershell.exe (PID: 7708 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
              • conhost.exe (PID: 7628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • RegAsm.exe (PID: 8748 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • d361f35322.exe (PID: 5772 cmdline: "C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe" MD5: C1BF02296C415ABC8B1F0ED13088D96D)
        • schtasks.exe (PID: 6180 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
          • conhost.exe (PID: 6260 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • schtasks.exe (PID: 7724 cmdline: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST MD5: 48C2FE20575769DE916F48EF0676A965)
          • conhost.exe (PID: 8132 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • ac861238af.exe (PID: 6604 cmdline: "C:\Users\user\1000021002\ac861238af.exe" MD5: 34C3E84E001DB4CF23A94BE34D462F11)
        • chrome.exe (PID: 8052 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • chrome.exe (PID: 1028 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/ MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 7340 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2656 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 8840 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • explorta.exe (PID: 8016 cmdline: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe MD5: 8A19D654CB37E4E51BE045ACAF097E74)
  • explorha.exe (PID: 7400 cmdline: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe MD5: E67C8B3E5EC9F64052FCD2F45341CFA5)
  • MPGPH131.exe (PID: 6636 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: C1BF02296C415ABC8B1F0ED13088D96D)
  • MPGPH131.exe (PID: 6008 cmdline: C:\ProgramData\MPGPH131\MPGPH131.exe MD5: C1BF02296C415ABC8B1F0ED13088D96D)
  • d361f35322.exe (PID: 8200 cmdline: "C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe" MD5: C1BF02296C415ABC8B1F0ED13088D96D)
  • NewB.exe (PID: 8664 cmdline: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe MD5: 0099A99F5FFB3C3AE78AF0084136FAB3)
  • RageMP131.exe (PID: 8964 cmdline: "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe" MD5: C1BF02296C415ABC8B1F0ED13088D96D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
NameDescriptionAttributionBlogpost URLsLink
AmadeyAmadey is a botnet that appeared around October 2018 and is being sold for about $500 on Russian-speaking hacking forums. It periodically sends information about the system and installed AV software to its C2 server and polls to receive orders from it. Its main functionality is that it can load other payloads (called "tasks") for all or specifically targeted computers compromised by the malware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.amadey
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
SmokeLoaderThe SmokeLoader family is a generic backdoor with a range of capabilities which depend on the modules included in any given build of the malware. The malware is delivered in a variety of ways and is broadly associated with criminal activity. The malware frequently tries to hide its C2 activity by generating requests to legitimate sites such as microsoft.com, bing.com, adobe.com, and others. Typically the actual Download returns an HTTP 404 but still contains data in the Response Body.
  • SMOKY SPIDER
https://malpedia.caad.fkie.fraunhofer.de/details/win.smokeloader
{"C2 url": ["pillowbrocccolipe.shop", "communicationgenerwo.shop", "diskretainvigorousiw.shop", "affordcharmcropwo.shop", "dismissalcylinderhostw.shop", "enthusiasimtitleow.shop", "worryfillvolcawoi.shop", "cleartotalfisherwo.shop", "affordcharmcropwo.shop"], "Build id": "LGNDR1--ketamine"}
{"C2 url": "http://185.172.128.150/c698e1bc8a2f5e6d.php"}
{"Version": 2022, "C2 list": ["http://trad-einmyus.com/index.php", "http://tradein-myus.com/index.php", "http://trade-inmyus.com/index.php"]}
{"C2 url": "185.172.128.19/ghsdh39s/index.php", "Version": "4.12"}
{"C2 url": ["185.215.113.67:26260"], "Bot Id": "Test1234", "Authorization Header": "bed37b7c341f364ee692c5adfa824881"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dllJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
    C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dllJoeSecurity_Amadey_3Yara detected Amadey\'s Clipper DLLJoe Security
      C:\Users\user\AppData\Local\Temp\1000071001\jok.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\cred64[1].dllJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
          C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\clip64[1].dllJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            00000005.00000003.1721215690.00000000011E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
              0000002C.00000002.2151525456.0000000003CB5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                0000002C.00000002.2151525456.0000000003CB5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
                  00000027.00000000.2050930258.0000000000E51000.00000020.00000001.01000000.00000015.sdmpJoeSecurity_Amadey_2Yara detected Amadey\'s stealer DLLJoe Security
                    00000024.00000003.2840876152.0000000007C6E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
                      Click to see the 49 entries
                      SourceRuleDescriptionAuthorStrings
                      47.2.RegAsm.exe.400000.0.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                        47.2.RegAsm.exe.400000.0.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
                          47.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                            47.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
                              51.3.u6po.0.exe.3680000.0.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                                Click to see the 17 entries

                                System Summary

                                barindex
                                Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe, ProcessId: 6676, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d361f35322.exe
                                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe, ParentProcessId: 7556, ParentProcessName: file300un.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force, ProcessId: 7708, ProcessName: powershell.exe
                                Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal, CommandLine: powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main, ParentImage: C:\Windows\System32\rundll32.exe, ParentProcessId: 4076, ParentProcessName: rundll32.exe, ProcessCommandLine: powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal, ProcessId: 352, ProcessName: powershell.exe
                                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe, ProcessId: 6676, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d361f35322.exe
                                Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems), frack113: Data: Command: powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal, CommandLine: powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main, ParentImage: C:\Windows\System32\rundll32.exe, ParentProcessId: 4076, ParentProcessName: rundll32.exe, ProcessCommandLine: powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal, ProcessId: 352, ProcessName: powershell.exe
                                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe, ParentProcessId: 7556, ParentProcessName: file300un.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force, ProcessId: 7708, ProcessName: powershell.exe
                                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST, CommandLine: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST, CommandLine|base64offset|contains: mj,, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe, ParentProcessId: 5772, ParentProcessName: d361f35322.exe, ProcessCommandLine: schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST, ProcessId: 6180, ProcessName: schtasks.exe
                                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe" /F, CommandLine: "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe" /F, CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe, ParentProcessId: 2336, ParentProcessName: NewB.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe" /F, ProcessId: 8260, ProcessName: schtasks.exe
                                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal, CommandLine: powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main, ParentImage: C:\Windows\System32\rundll32.exe, ParentProcessId: 4076, ParentProcessName: rundll32.exe, ProcessCommandLine: powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal, ProcessId: 352, ProcessName: powershell.exe

                                Stealing of Sensitive Information

                                barindex
                                Source: Process startedAuthor: Joe Security: Data: Command: netsh wlan show profiles, CommandLine: netsh wlan show profiles, CommandLine|base64offset|contains: l, Image: C:\Windows\System32\netsh.exe, NewProcessName: C:\Windows\System32\netsh.exe, OriginalFileName: C:\Windows\System32\netsh.exe, ParentCommandLine: "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main, ParentImage: C:\Windows\System32\rundll32.exe, ParentProcessId: 4076, ParentProcessName: rundll32.exe, ProcessCommandLine: netsh wlan show profiles, ProcessId: 1832, ProcessName: netsh.exe
                                No Snort rule has matched

                                Click to jump to signature section

                                Show All Signature Results

                                AV Detection

                                barindex
                                Source: 1CMweaqlKp.exeAvira: detected
                                Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
                                Source: 185.215.113.67:26260Avira URL Cloud: Label: malware
                                Source: http://147.45.47.102:57893/hera/amadka.exeAvira URL Cloud: Label: malware
                                Source: C:\Users\user\1000021002\ac861238af.exeAvira: detection malicious, Label: TR/AutoIt.zstul
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amert[1].exeAvira: detection malicious, Label: TR/Crypt.TPM.Gen
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exeAvira: detection malicious, Label: TR/Redcap.pernp
                                Source: 00000031.00000002.2229022734.0000000003640000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: SmokeLoader {"Version": 2022, "C2 list": ["http://trad-einmyus.com/index.php", "http://tradein-myus.com/index.php", "http://trade-inmyus.com/index.php"]}
                                Source: 00000033.00000003.2152173443.0000000003680000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Vidar {"C2 url": "http://185.172.128.150/c698e1bc8a2f5e6d.php"}
                                Source: 39.2.NewB.exe.e50000.0.unpackMalware Configuration Extractor: Amadey {"C2 url": "185.172.128.19/ghsdh39s/index.php", "Version": "4.12"}
                                Source: 40.0.jok.exe.7c0000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": ["185.215.113.67:26260"], "Bot Id": "Test1234", "Authorization Header": "bed37b7c341f364ee692c5adfa824881"}
                                Source: 29.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: LummaC {"C2 url": ["pillowbrocccolipe.shop", "communicationgenerwo.shop", "diskretainvigorousiw.shop", "affordcharmcropwo.shop", "dismissalcylinderhostw.shop", "enthusiasimtitleow.shop", "worryfillvolcawoi.shop", "cleartotalfisherwo.shop", "affordcharmcropwo.shop"], "Build id": "LGNDR1--ketamine"}
                                Source: 185.215.113.67:26260Virustotal: Detection: 16%Perma Link
                                Source: pillowbrocccolipe.shopVirustotal: Detection: 18%Perma Link
                                Source: cleartotalfisherwo.shopVirustotal: Detection: 18%Perma Link
                                Source: http://185.172.128.150/c698e1bc8a2f5e6d.phpVirustotal: Detection: 19%Perma Link
                                Source: https://affordcharmcropwo.shop/dVirustotal: Detection: 9%Perma Link
                                Source: worryfillvolcawoi.shopVirustotal: Detection: 18%Perma Link
                                Source: https://affordcharmcropwo.shop/zVirustotal: Detection: 13%Perma Link
                                Source: http://193.233.132.56/cost/lenin.exe1Virustotal: Detection: 21%Perma Link
                                Source: diskretainvigorousiw.shopVirustotal: Detection: 18%Perma Link
                                Source: communicationgenerwo.shopVirustotal: Detection: 17%Perma Link
                                Source: http://147.45.47.102:57893/hera/amadka.exeVirustotal: Detection: 19%Perma Link
                                Source: https://junglethomas.com/Virustotal: Detection: 11%Perma Link
                                Source: http://193.233.132.56/cost/go.exeVirustotal: Detection: 25%Perma Link
                                Source: affordcharmcropwo.shopVirustotal: Detection: 17%Perma Link
                                Source: http://193.233.132.56/cost/go.exemadka.exVirustotal: Detection: 21%Perma Link
                                Source: enthusiasimtitleow.shopVirustotal: Detection: 17%Perma Link
                                Source: https://affordcharmcropwo.shop/apiVirustotal: Detection: 21%Perma Link
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeVirustotal: Detection: 52%Perma Link
                                Source: C:\Users\user\1000021002\ac861238af.exeVirustotal: Detection: 34%Perma Link
                                Source: C:\Users\user\AppData\Local\5LzADXbR9e1baIzvWufsCa70.exeReversingLabs: Detection: 34%
                                Source: C:\Users\user\AppData\Local\5LzADXbR9e1baIzvWufsCa70.exeVirustotal: Detection: 44%Perma Link
                                Source: C:\Users\user\AppData\Local\5W1aDm1vpFLN4gyrIiISMc4h.exeReversingLabs: Detection: 32%
                                Source: C:\Users\user\AppData\Local\5W1aDm1vpFLN4gyrIiISMc4h.exeVirustotal: Detection: 43%Perma Link
                                Source: C:\Users\user\AppData\Local\8sXk5E4IG9n4ZHu2M9Littnp.exeReversingLabs: Detection: 75%
                                Source: C:\Users\user\AppData\Local\8sXk5E4IG9n4ZHu2M9Littnp.exeVirustotal: Detection: 72%Perma Link
                                Source: C:\Users\user\AppData\Local\9SmQs0R4T5RJUISklvcv02zp.exeReversingLabs: Detection: 32%
                                Source: C:\Users\user\AppData\Local\9SmQs0R4T5RJUISklvcv02zp.exeVirustotal: Detection: 43%Perma Link
                                Source: C:\Users\user\AppData\Local\9WrQ2c2u5fxH1pcvCwwjGhdd.exeReversingLabs: Detection: 75%
                                Source: C:\Users\user\AppData\Local\9WrQ2c2u5fxH1pcvCwwjGhdd.exeVirustotal: Detection: 72%Perma Link
                                Source: C:\Users\user\AppData\Local\Aghrmi42Lz5QvS8u8U6BiVXQ.exeReversingLabs: Detection: 43%
                                Source: C:\Users\user\AppData\Local\Aghrmi42Lz5QvS8u8U6BiVXQ.exeVirustotal: Detection: 43%Perma Link
                                Source: C:\Users\user\AppData\Local\Bkg8NSHXvizTVBsjT3dzRvci.exeReversingLabs: Detection: 75%
                                Source: C:\Users\user\AppData\Local\Bkg8NSHXvizTVBsjT3dzRvci.exeVirustotal: Detection: 72%Perma Link
                                Source: C:\Users\user\AppData\Local\C893DEcM3dAA247WrHBz1SDW.exeReversingLabs: Detection: 43%
                                Source: C:\Users\user\AppData\Local\C893DEcM3dAA247WrHBz1SDW.exeVirustotal: Detection: 43%Perma Link
                                Source: C:\Users\user\AppData\Local\CmCQsbfi77SnYQWckHTzUjRg.exeReversingLabs: Detection: 34%
                                Source: C:\Users\user\AppData\Local\CmCQsbfi77SnYQWckHTzUjRg.exeVirustotal: Detection: 44%Perma Link
                                Source: C:\Users\user\AppData\Local\H3bqnZf96LFIOlogieo3h5K9.exeReversingLabs: Detection: 34%
                                Source: C:\Users\user\AppData\Local\H3bqnZf96LFIOlogieo3h5K9.exeVirustotal: Detection: 44%Perma Link
                                Source: C:\Users\user\AppData\Local\KHojJ9v7XtNSHZfW6gAnnH23.exeReversingLabs: Detection: 32%
                                Source: C:\Users\user\AppData\Local\KHojJ9v7XtNSHZfW6gAnnH23.exeVirustotal: Detection: 43%Perma Link
                                Source: C:\Users\user\AppData\Local\LIdx8BlqmZTW07MQOtXboF4f.exeReversingLabs: Detection: 41%
                                Source: C:\Users\user\AppData\Local\LIdx8BlqmZTW07MQOtXboF4f.exeVirustotal: Detection: 36%Perma Link
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\4767d2e713f2021e8fe856e3ea638b58[1].exeReversingLabs: Detection: 34%
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\4767d2e713f2021e8fe856e3ea638b58[1].exeVirustotal: Detection: 44%Perma Link
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exeReversingLabs: Detection: 91%
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exeVirustotal: Detection: 84%Perma Link
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amert[1].exeVirustotal: Detection: 57%Perma Link
                                Source: 1CMweaqlKp.exeReversingLabs: Detection: 50%
                                Source: 1CMweaqlKp.exeVirustotal: Detection: 44%Perma Link
                                Source: C:\Users\user\AppData\Local\9WrQ2c2u5fxH1pcvCwwjGhdd.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\5W1aDm1vpFLN4gyrIiISMc4h.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Bkg8NSHXvizTVBsjT3dzRvci.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\1000021002\ac861238af.exeJoe Sandbox ML: detected
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\KHojJ9v7XtNSHZfW6gAnnH23.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\sarra[1].exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\file300un[1].exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\9SmQs0R4T5RJUISklvcv02zp.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\5LzADXbR9e1baIzvWufsCa70.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Aghrmi42Lz5QvS8u8U6BiVXQ.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\C893DEcM3dAA247WrHBz1SDW.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\8sXk5E4IG9n4ZHu2M9Littnp.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\CmCQsbfi77SnYQWckHTzUjRg.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\4767d2e713f2021e8fe856e3ea638b58[1].exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\GIz2DLitsyoTn14REJti2nqN.exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amert[1].exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exeJoe Sandbox ML: detected
                                Source: C:\Users\user\AppData\Local\H3bqnZf96LFIOlogieo3h5K9.exeJoe Sandbox ML: detected
                                Source: 1CMweaqlKp.exeJoe Sandbox ML: detected
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: INSERT_KEY_HERE
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetProcAddress
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: LoadLibraryA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: lstrcatA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: OpenEventA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CreateEventA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CloseHandle
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Sleep
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetUserDefaultLangID
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualAllocExNuma
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualFree
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetSystemInfo
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualAlloc
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: HeapAlloc
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetComputerNameA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: lstrcpyA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetProcessHeap
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetCurrentProcess
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: lstrlenA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: ExitProcess
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalMemoryStatusEx
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetSystemTime
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SystemTimeToFileTime
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: advapi32.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: gdi32.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: user32.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: crypt32.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: ntdll.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetUserNameA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CreateDCA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetDeviceCaps
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: ReleaseDC
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CryptStringToBinaryA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: sscanf
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: VMwareVMware
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: HAL9TH
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: JohnDoe
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: DISPLAY
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: %hu/%hu/%hu
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: http://52.143.157.84
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: /c73eed764cc59dcb.php
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: /84bad7132df89fd7/
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: pisun
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetEnvironmentVariableA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetFileAttributesA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalLock
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: HeapFree
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetFileSize
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalSize
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CreateToolhelp32Snapshot
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: IsWow64Process
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Process32Next
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetLocalTime
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: FreeLibrary
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetTimeZoneInformation
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetSystemPowerStatus
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetVolumeInformationA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetWindowsDirectoryA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Process32First
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetLocaleInfoA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetUserDefaultLocaleName
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetModuleFileNameA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: DeleteFileA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: FindNextFileA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: LocalFree
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: FindClose
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SetEnvironmentVariableA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: LocalAlloc
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetFileSizeEx
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: ReadFile
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SetFilePointer
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: WriteFile
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CreateFileA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: FindFirstFileA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CopyFileA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: VirtualProtect
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetLogicalProcessorInformationEx
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetLastError
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: lstrcpynA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: MultiByteToWideChar
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalFree
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: WideCharToMultiByte
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GlobalAlloc
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: OpenProcess
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: TerminateProcess
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetCurrentProcessId
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: gdiplus.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: ole32.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: bcrypt.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: wininet.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: shlwapi.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: shell32.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: psapi.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: rstrtmgr.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CreateCompatibleBitmap
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SelectObject
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: BitBlt
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: DeleteObject
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CreateCompatibleDC
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GdipGetImageEncodersSize
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GdipGetImageEncoders
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GdipCreateBitmapFromHBITMAP
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GdiplusStartup
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GdiplusShutdown
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GdipSaveImageToStream
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GdipDisposeImage
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GdipFree
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetHGlobalFromStream
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CreateStreamOnHGlobal
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CoUninitialize
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CoInitialize
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CoCreateInstance
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptGenerateSymmetricKey
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptCloseAlgorithmProvider
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptDecrypt
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptSetProperty
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptDestroyKey
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: BCryptOpenAlgorithmProvider
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetWindowRect
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetDesktopWindow
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetDC
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CloseWindow
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: wsprintfA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: EnumDisplayDevicesA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetKeyboardLayoutList
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CharToOemW
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: wsprintfW
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: RegQueryValueExA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: RegEnumKeyExA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: RegOpenKeyExA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: RegCloseKey
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: RegEnumValueA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CryptBinaryToStringA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CryptUnprotectData
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SHGetFolderPathA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: ShellExecuteExA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: InternetOpenUrlA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: InternetConnectA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: InternetCloseHandle
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: InternetOpenA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: HttpSendRequestA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: HttpOpenRequestA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: InternetReadFile
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: InternetCrackUrlA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: StrCmpCA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: StrStrA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: StrCmpCW
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: PathMatchSpecA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: GetModuleFileNameExA
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: RmStartSession
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: RmRegisterResources
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: RmGetList
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: RmEndSession
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_open
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_prepare_v2
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_step
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_column_text
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_finalize
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_close
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_column_bytes
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3_column_blob
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: encrypted_key
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: PATH
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: C:\ProgramData\nss3.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: NSS_Init
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: NSS_Shutdown
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: PK11_GetInternalKeySlot
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: PK11_FreeSlot
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: PK11_Authenticate
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: PK11SDR_Decrypt
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: C:\ProgramData\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT origin_url, username_value, password_value FROM logins
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: browser:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: profile:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: url:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: login:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: password:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Opera
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: OperaGX
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Network
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: cookies
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: .txt
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: TRUE
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: FALSE
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: autofill
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT name, value FROM autofill
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: history
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT url FROM urls LIMIT 1000
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: name:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: month:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: year:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: card:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Cookies
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Login Data
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Web Data
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: History
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: logins.json
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: formSubmitURL
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: usernameField
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: encryptedUsername
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: encryptedPassword
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: guid
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT fieldname, value FROM moz_formhistory
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SELECT url FROM moz_places LIMIT 1000
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: cookies.sqlite
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: formhistory.sqlite
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: places.sqlite
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: plugins
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Local Extension Settings
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Sync Extension Settings
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: IndexedDB
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Opera Stable
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Opera GX Stable
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: CURRENT
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: chrome-extension_
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: _0.indexeddb.leveldb
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Local State
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: profiles.ini
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: chrome
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: opera
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: firefox
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: wallets
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: %08lX%04lX%lu
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: ProductName
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: %d/%d/%d %d:%d:%d
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: ProcessorNameString
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: DisplayName
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: DisplayVersion
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Network Info:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - IP: IP?
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - Country: ISO?
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: System Summary:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - HWID:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - OS:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - Architecture:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - UserName:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - Computer Name:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - Local Time:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - UTC:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - Language:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - Keyboards:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - Laptop:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - Running Path:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - CPU:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - Threads:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - Cores:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - RAM:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - Display Resolution:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: - GPU:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: User Agents:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Installed Apps:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: All Users:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Current User:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Process List:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: system_info.txt
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: freebl3.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: mozglue.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: msvcp140.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: nss3.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: softokn3.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: vcruntime140.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: \Temp\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: .exe
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: runas
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: open
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: /c start
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: %DESKTOP%
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: %APPDATA%
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: %LOCALAPPDATA%
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: %USERPROFILE%
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: %DOCUMENTS%
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: %PROGRAMFILES%
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: %PROGRAMFILES_86%
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: %RECENT%
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: *.lnk
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: files
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: \discord\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: \Local Storage\leveldb\CURRENT
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: \Local Storage\leveldb
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: \Telegram Desktop\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: key_datas
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: D877F783D5D3EF8C*
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: map*
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: A7FDF864FBC10B77*
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: A92DAA6EA6F891F2*
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: F8806DD0C461824F*
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Telegram
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: *.tox
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: *.ini
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Password
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: 00000001
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: 00000002
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: 00000003
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: 00000004
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: \Outlook\accounts.txt
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Pidgin
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: \.purple\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: accounts.xml
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: dQw4w9WgXcQ
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: token:
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Software\Valve\Steam
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: SteamPath
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: \config\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: ssfn*
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: config.vdf
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: DialogConfig.vdf
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: DialogConfigOverlay*.vdf
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: libraryfolders.vdf
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: loginusers.vdf
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: \Steam\
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: sqlite3.dll
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: browsers
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: done
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: soft
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: \Discord\tokens.txt
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: /c timeout /t 5 & del /f /q "
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: " & del "C:\ProgramData\*.dll"" & exit
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: C:\Windows\system32\cmd.exe
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: https
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: POST
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: HTTP/1.1
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: Content-Disposition: form-data; name="
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: hwid
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: build
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: token
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: file_name
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: file
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: message
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
                                Source: 47.2.RegAsm.exe.400000.0.unpackString decryptor: screenshot.jpg
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: 185.172.128.19
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: /ghsdh39s/index.php
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: S-%lu-
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: cd1f156d67
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Utsysc.exe
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: SCHTASKS
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: /Create /SC MINUTE /MO 1 /TN
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: /TR "
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Startup
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: cmd /C RMDIR /s/q
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Run
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: rundll32
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: /Delete /TN "
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Programs
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: %USERPROFILE%
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: cred.dll|clip.dll|
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: http://
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: https://
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: /Plugins/
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: &unit=
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: shell32.dll
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: kernel32.dll
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: GetNativeSystemInfo
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: ProgramData\
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: AVAST Software
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Kaspersky Lab
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Panda Security
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Doctor Web
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: 360TotalSecurity
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Bitdefender
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Norton
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Sophos
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Comodo
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: WinDefender
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: 0123456789
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: ------
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: ?scr=1
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Content-Type: application/x-www-form-urlencoded
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: ComputerName
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: abcdefghijklmnopqrstuvwxyz0123456789-_
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: -unicode-
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: SYSTEM\CurrentControlSet\Control\UnitedVideo\CONTROL\VIDEO\
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: SYSTEM\ControlSet001\Services\BasicDisplay\Video
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: VideoID
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: DefaultSettings.XResolution
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: DefaultSettings.YResolution
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: ProductName
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: CurrentBuild
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: echo Y|CACLS "
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: " /P "
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: CACLS "
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: :R" /E
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: :F" /E
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: &&Exit
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: rundll32.exe
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: "taskkill /f /im "
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: " && timeout 1 && del
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: && Exit"
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: " && ren
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: Powershell.exe
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: -executionpolicy remotesigned -File "
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: shutdown -s -t 0
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: /w']fC
                                Source: 39.2.NewB.exe.e50000.0.unpackString decryptor: vw(hF=
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: pillowbrocccolipe.shop
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: communicationgenerwo.shop
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: diskretainvigorousiw.shop
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: affordcharmcropwo.shop
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: dismissalcylinderhostw.shop
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: enthusiasimtitleow.shop
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: worryfillvolcawoi.shop
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: cleartotalfisherwo.shop
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: affordcharmcropwo.shop
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: lid=%s&j=%s&ver=4.0
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: TeslaBrowser/5.5
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: - Screen Resoluton:
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: - Physical Installed Memory:
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: Workgroup: -
                                Source: 29.2.RegAsm.exe.400000.0.unpackString decryptor: LGNDR1--ketamine
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008A3EB0 CryptUnprotectData,CryptUnprotectData,9_2_008A3EB0

                                Exploits

                                barindex
                                Source: Yara matchFile source: 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: file300un.exe PID: 7556, type: MEMORYSTR
                                Source: 1CMweaqlKp.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                                Source: Binary string: freebl3.pdb source: freebl3[1].dll.51.dr
                                Source: Binary string: C:\wutimosolix_62\gowaj\tosusinana-la.pdb source: ISetup8.exe, 00000029.00000003.2151074345.0000000003871000.00000004.00000020.00020000.00000000.sdmp, u6po.0.exe, 00000033.00000000.2149099984.0000000000412000.00000002.00000001.01000000.0000001F.sdmp
                                Source: Binary string: freebl3.pdbp source: freebl3[1].dll.51.dr
                                Source: Binary string: C:\somilixucasoba_pi.pdb source: ISetup8.exe, 00000029.00000000.2055258369.0000000000412000.00000002.00000001.01000000.00000019.sdmp, rVg8HtIzXa4xhJHL7Pn8A6d2.exe.54.dr
                                Source: Binary string: file300un.PDBI: source: file300un.exe, 00000032.00000002.7139604951.000000C2DA0F3000.00000004.00000010.00020000.00000000.sdmp
                                Source: Binary string: C:\rute\dazazef.pdb source: toolspub1.exe, 00000031.00000000.2109256617.0000000000412000.00000002.00000001.01000000.0000001D.sdmp, toolspub1.exe, 00000031.00000002.2197395229.0000000000412000.00000002.00000001.01000000.0000001D.sdmp
                                Source: Binary string: mscorlib.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: System.ni.pdbRSDS source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: C:\dimohisek.pdb source: ppcQqLgPI8Dyy7YykX33fm5x.exe.54.dr
                                Source: Binary string: Croco.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: C:\Users\user\AppData\Local\Temp\1000075001\file300un.PDB source: file300un.exe, 00000032.00000002.7139604951.000000C2DA0F3000.00000004.00000010.00020000.00000000.sdmp
                                Source: Binary string: YC:\rute\dazazef.pdb source: toolspub1.exe, 00000031.00000000.2109256617.0000000000412000.00000002.00000001.01000000.0000001D.sdmp, toolspub1.exe, 00000031.00000002.2197395229.0000000000412000.00000002.00000001.01000000.0000001D.sdmp
                                Source: Binary string: mscorlib.ni.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: ,C:\dimohisek.pdb source: ppcQqLgPI8Dyy7YykX33fm5x.exe.54.dr
                                Source: Binary string: pC:\Users\user\AppData\Local\Temp\1000075001\file300un.PDB source: file300un.exe, 00000032.00000002.7139604951.000000C2DA0F3000.00000004.00000010.00020000.00000000.sdmp
                                Source: Binary string: System.pdb4 source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: System.Core.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: mscorlib.ni.pdbRSDS source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: GC:\somilixucasoba_pi.pdb source: ISetup8.exe, 00000029.00000000.2055258369.0000000000412000.00000002.00000001.01000000.00000019.sdmp, rVg8HtIzXa4xhJHL7Pn8A6d2.exe.54.dr
                                Source: Binary string: System.ni.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: System.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: System.Core.ni.pdbRSDS source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: System.Core.ni.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: number of queries: 1081
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008A33B0 FindFirstFileA,FindNextFileA,9_2_008A33B0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008C3B20 FindFirstFileA,FindNextFileA,SetFileAttributesA,RemoveDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,9_2_008C3B20
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00811F8C FindFirstFileExW,9_2_00811F8C
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\userJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\user\AppDataJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\user\AppData\LocalJump to behavior

                                Networking

                                barindex
                                Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 193.233.132.56 80
                                Source: Malware configuration extractorURLs: pillowbrocccolipe.shop
                                Source: Malware configuration extractorURLs: communicationgenerwo.shop
                                Source: Malware configuration extractorURLs: diskretainvigorousiw.shop
                                Source: Malware configuration extractorURLs: affordcharmcropwo.shop
                                Source: Malware configuration extractorURLs: dismissalcylinderhostw.shop
                                Source: Malware configuration extractorURLs: enthusiasimtitleow.shop
                                Source: Malware configuration extractorURLs: worryfillvolcawoi.shop
                                Source: Malware configuration extractorURLs: cleartotalfisherwo.shop
                                Source: Malware configuration extractorURLs: affordcharmcropwo.shop
                                Source: Malware configuration extractorURLs: http://185.172.128.150/c698e1bc8a2f5e6d.php
                                Source: Malware configuration extractorURLs: http://trad-einmyus.com/index.php
                                Source: Malware configuration extractorURLs: http://tradein-myus.com/index.php
                                Source: Malware configuration extractorURLs: http://trade-inmyus.com/index.php
                                Source: Malware configuration extractorIPs: 185.172.128.19
                                Source: Malware configuration extractorURLs: 185.215.113.67:26260
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: EubzUqqfLmBbNiHWxubQa6s2.exe.54.dr
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: dq1f6mXIBjMzMXMQVeg2fNsL.exe.54.dr
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: MTc4G09Eq4noHZ0G091uBZf1.exe.54.dr
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: 5aIar1h6imWjPJZYPL4QSqoe.exe.54.dr
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: r5kIpAOOvnafOvgnH4OtxIFK.exe.54.dr
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: s0yoB0FX6GRQugk063ujbi4o.exe.54.dr
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: EUl5mGPccm3Ux8yn4fNnNA26.exe.54.dr
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: AN3CiEs9vHs3cPsEPcJxdtOY.exe.54.dr
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: K7e4fpNGO8JkAsFxVXguIAcd.exe.54.dr
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: qhzSo7WKfB79QVVeIp5fAbeL.exe.54.dr
                                Source: Yara matchFile source: 50.2.file300un.exe.1f3800d4830.1.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 50.2.file300un.exe.1f3800d7298.0.raw.unpack, type: UNPACKEDPE
                                Source: Joe Sandbox ViewIP Address: 193.233.132.139 193.233.132.139
                                Source: Joe Sandbox ViewIP Address: 185.172.128.90 185.172.128.90
                                Source: Joe Sandbox ViewASN Name: WHOLESALECONNECTIONSNL WHOLESALECONNECTIONSNL
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008A52A0 recv,9_2_008A52A0
                                Source: d361f35322.exe, 00000024.00000003.2820817674.0000000001443000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: in?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820817674.0000000001443000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: in?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en/v/ equals www.youtube.com (Youtube)
                                Source: ac861238af.exe, 00000010.00000003.7189686015.0000000000C7C000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.7258589510.0000000000C7D000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.7259110109.0000000000C7E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccoun equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820673524.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820673524.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en/v/ equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2824119223.0000000007CB5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: //www.youtube.co equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: //www.youtube.com/accountYouTube equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: //www.youtube.com/accountYouTube/v/ equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2824119223.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2822343743.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ?continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Factio- equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_l= equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820673524.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rg equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rgH5 equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000002.3081226044.0000000001440000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rgP equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820673524.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rgkk equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000002.3350736971.00000000013ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&ifkv=AaSxoQwjhvMUJDldG6Innua_C1pcDG5oPAHsCGMCPvqUw802RdjX5hf3fPDpZO3Wpa0PCsK_u6Dcjg&passive=true&service=youtube&uilel=3&flowName=GlifWebSignIn&flowEntry=ServiceLogin&dsh=S1325622038%3A1714794747441010&theme=mn&ddm=0 equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3206207533.0000000008124000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&ifkv=AaSxoQwjhvMUJDldG6Innua_C1pcDG5oPAHsCGMCPvqUw802RdjX5hf3fPDpZO3Wpa0PCsK_u6Dcjg&passive=true&service=youtube&uilel=3&flowName=GlifWebSignIn&flowEntry=ServiceLogin&dsh=S1325622038%3A1714794747441010&theme=mn&ddm=010&t equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: andle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rg equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: andle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rg/v/ equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820817674.0000000001443000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: gin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820817674.0000000001443000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: gin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en/v/ equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_h equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252F equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rg equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rg/v/ equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820609546.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rgYouTube equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820609546.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rgYouTube/v/ equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2838516911.0000000007CDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en(R equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820817674.000000000144A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en/v/ equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820609546.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=enYouTube equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820609546.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=enYouTube/v/ equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en^S equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2839809905.0000000007CCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en} equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Fwww.youtube.com%2Fsig equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&ifkv=AaSxoQwjhvMUJDldG6Innua_C1pcDG5oPAHsCGMCPvqUw802RdjX5hf3fPDpZO3Wpa0PCsK_u6Dcjg&passive=true&service=youtube&uilel=3&flowName=GlifWebSignIn&flowEntry=ServiceLogin&dsh=S1325622038%3A1714794747441010&theme=mn&ddm=0 equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&ifkv=AaSxoQwjhvMUJDldG6Innua_C1pcDG5oPAHsCGMCPvqUw802RdjX5hf3fPDpZO3Wpa0PCsK_u6Dcjg&passive=true&service=youtube&uilel=3&flowName=GlifWebSignIn&flowEntry=ServiceLogin&dsh=S1325622038%3A1714794747441010&theme=mn&ddm=0/v/ equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820609546.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&ifkv=AaSxoQwjhvMUJDldG6Innua_C1pcDG5oPAHsCGMCPvqUw802RdjX5hf3fPDpZO3Wpa0PCsK_u6Dcjg&passive=true&service=youtube&uilel=3&flowName=GlifWebSignIn&flowEntry=ServiceLogin&dsh=S1325622038%3A1714794747441010&theme=mn&ddm=0YouTube equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820609546.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&ifkv=AaSxoQwjhvMUJDldG6Innua_C1pcDG5oPAHsCGMCPvqUw802RdjX5hf3fPDpZO3Wpa0PCsK_u6Dcjg&passive=true&service=youtube&uilel=3&flowName=GlifWebSignIn&flowEntry=ServiceLogin&dsh=S1325622038%3A1714794747441010&theme=mn&ddm=0YouTube/v/ equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000002.3079225585.00000000013E6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&ifkv=AaSxoQwjhvMUJDldG6Innua_C1pcDG5oPAHsCGMCPvqUw802RdjX5hf3fPDpZO3Wpa0PCsK_u6Dcjg&passive=true&service=youtube&uilel=3&flowName=GlifWebSignIn&flowEntry=ServiceLogin&dsh=S1325622038%3A1714794747441010&theme=mn&ddm=0raU equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000009.00000003.2912274365.0000000007DC2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3205947734.0000000007CEB000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819482005.0000000007CBB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/account equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/account equals www.youtube.com (Youtube)
                                Source: ac861238af.exe, 00000010.00000003.2320418390.000000000336C000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.2320275710.0000000003355000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.2320347999.0000000003358000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/account* equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C6A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820817674.000000000144A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/account/v/ equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2820488974.0000000007CDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/accountE equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2828616710.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2826400120.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840128095.0000000007CCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/accountJ equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3206207533.0000000008124000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820488974.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820609546.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/accountYouTube equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3206207533.0000000008124000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820488974.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820609546.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/accountYouTube/v/ equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/accountkO equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: inue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Faction_handle_signin%3Dtru equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2824193350.0000000007C9E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840876152.0000000007C9E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825758993.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ion_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5C equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2832279373.0000000007C9E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2828966339.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ion_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5C! equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2832279373.0000000007C9E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2828966339.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ion_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5C!! equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ion_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rg equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ion_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rgkk equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: nin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&ifkv=AaSxoQwjhvMUJDldG6Innua_C1pcDG5oPAHsCGMCPvqUw802RdjX5hf3fPDpZO3Wpa0PCsK_u6Dcjg&passive=true&service=youtube&uilel=3&flowName=GlifWebSignIn&flowEntry=ServiceLogin&dsh=S1325622038%3A1714794747441010&theme=mn&ddm=0 equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: nin%3Faction_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&ifkv=AaSxoQwjhvMUJDldG6Innua_C1pcDG5oPAHsCGMCPvqUw802RdjX5hf3fPDpZO3Wpa0PCsK_u6Dcjg&passive=true&service=youtube&uilel=3&flowName=GlifWebSignIn&flowEntry=ServiceLogin&dsh=S1325622038%3A1714794747441010&theme=mn&ddm=0/v/ equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2825253363.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824119223.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2826081966.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: p%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=enYouTube equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000024.00000003.2825253363.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824119223.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2826081966.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: p%26hl%3Den%26next%3Dhttps%253A%252F%252Fwww.youtube.com%252Faccount%26feature%3Dredirect_login&hl=enYouTube/v/ equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3248220823.0000000007CD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rg equals www.youtube.com (Youtube)
                                Source: MPGPH131.exe, 0000001B.00000003.3248220823.0000000007CD6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.youtube.com%252Faccount%26feature%3Dredirect_login&hl=en&passive=true&service=youtube&uilel=3&ifkv=AaSxoQx6ne11cfZ6Gk3eVqT5Cz0DLtBw7SzKkiaryluTa5kmW0zT8SNnoepGMkksmkn9pwxU7Cs4rg3xdf equals www.youtube.com (Youtube)
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824519132.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762153720.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758759334.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2874193365.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3081226044.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759980015.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760938757.0000000001442000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760535342.0000000001441000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825526740.0000000001443000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.102:57893/hera/amadka.exe
                                Source: MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.102:57893/hera/amadka.exe.lv
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://147.45.47.102:57893/hera/amadka.exer.dbl
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824519132.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762153720.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758759334.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2874193365.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3081226044.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759980015.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760938757.0000000001442000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760535342.0000000001441000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825526740.0000000001443000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.132.56/cost/go.exe
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.132.56/cost/go.exe4x
                                Source: MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.132.56/cost/go.exehCorel.ba
                                Source: MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.132.56/cost/go.exemadka.ex
                                Source: d361f35322.exe, 00000024.00000003.2759415774.000000000143F000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.132.56/cost/lenin.exe
                                Source: RageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.132.56/cost/lenin.exe1
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.132.56/cost/lenin.exe;x
                                Source: d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.132.56/cost/lenin.exea.exe68.0l
                                Source: MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://193.233.132.56/cost/lenin.exew.s
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl07
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
                                Source: powershell.exe, 0000001E.00000002.2315360912.000001D42EE5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001E.00000002.2095956248.000001D4207A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://ocsp.digicert.com0
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://ocsp.digicert.com0A
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://ocsp.digicert.com0C
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://ocsp.digicert.com0N
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://ocsp.digicert.com0X
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D41EDE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                                Source: freebl3[1].dll.51.drString found in binary or memory: http://www.digicert.com/CPS0
                                Source: d361f35322.exe, 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, MPGPH131.exe, 0000001B.00000003.2069728672.0000000004FF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3349331204.0000000000701000.00000040.00000001.01000000.00000012.sdmp, MPGPH131.exe, 0000001C.00000003.2070120899.0000000005180000.00000004.00001000.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2021888097.00000000050E0000.00000004.00001000.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3072062602.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, RageMP131.exe, 0000002E.00000003.2138214229.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2634123106.0000000000891000.00000040.00000001.01000000.0000001B.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
                                Source: d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                                Source: d361f35322.exe, 00000024.00000003.2820673524.0000000007C6A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2822343743.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.googl
                                Source: MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_h
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/InteractiveLogin?continue=https://www.youtube.com/signin?action_handle_s
                                Source: MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https
                                Source: d361f35322.exe, 00000024.00000003.2839809905.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2826081966.0000000007CE1000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2826875397.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825684612.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2822343743.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2837144727.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2838516911.0000000007CDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/ServiceLogin?service=youtube&uilel=3&passive=true&continue=https%3A%2F%2
                                Source: d361f35322.exe, 00000024.00000003.2825684612.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2822343743.0000000007CB4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/id
                                Source: MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Fwww.youtube.com%2Fsig
                                Source: d361f35322.exe, 00000024.00000003.2822343743.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/identifier?continue=https%3A%2F%2Fwww.youtube.com%2Fsignin%3Fa
                                Source: RegAsm.exe, 0000001D.00000002.2274630744.0000000000D56000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000001D.00000002.2273817779.0000000000D4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://affordcharmcropwo.shop/
                                Source: RegAsm.exe, 0000001D.00000002.2274630744.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000001D.00000002.2226894863.0000000000CFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://affordcharmcropwo.shop/api
                                Source: RegAsm.exe, 0000001D.00000002.2274630744.0000000000D56000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://affordcharmcropwo.shop/apitemb
                                Source: RegAsm.exe, 0000001D.00000002.2273817779.0000000000D4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://affordcharmcropwo.shop/d
                                Source: RegAsm.exe, 0000001D.00000002.2273817779.0000000000D4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://affordcharmcropwo.shop/z
                                Source: RegAsm.exe, 0000001D.00000002.2226894863.0000000000CAA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://affordcharmcropwo.shop:443/apiNAME=userUSERPROFILE=C:
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D41EDE1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001E.00000002.2095956248.000001D420547000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D420547000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelpX
                                Source: jok.exe, 00000028.00000000.2051081332.00000000007C2000.00000002.00000001.01000000.00000018.sdmpString found in binary or memory: https://api.ip.sb/ip
                                Source: d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                                Source: d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                                Source: d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D4207A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D4207A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D4207A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824519132.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762153720.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758759334.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2874193365.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3081226044.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759980015.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760938757.0000000001442000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760535342.0000000001441000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825526740.0000000001443000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762501264.0000000001441000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942487367.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941258327.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940853881.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943456957.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934755710.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824519132.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3079225585.000000000140C000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762153720.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758759334.000000000143F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=81.181.54.104
                                Source: d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=81.181.54.1042
                                Source: MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=81.181.54.1045
                                Source: RageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=81.181.54.104N
                                Source: RageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com/demo/home.php?s=81.181.54.104XNN
                                Source: MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942487367.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941258327.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940853881.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943456957.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934755710.0000000001477000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=81.181.54.104
                                Source: d361f35322.exe, 00000024.00000002.3079225585.000000000136B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://db-ip.com:443/demo/home.php?s=81.181.54.104r
                                Source: d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                                Source: d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                                Source: d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                                Source: powershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                                Source: RageMP131.exe, 0000002E.00000002.2637513543.0000000000FE0000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/
                                Source: d361f35322.exe, 00000009.00000002.3073575028.00000000013E7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/5
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001449000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942487367.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941258327.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940853881.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943456957.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934755710.0000000001477000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3079225585.00000000013F2000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.000000000101B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/Mozilla/5.0
                                Source: MPGPH131.exe, 0000001B.00000002.3350736971.0000000001417000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/_
                                Source: d361f35322.exe, 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, MPGPH131.exe, 0000001B.00000003.2069728672.0000000004FF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3349331204.0000000000701000.00000040.00000001.01000000.00000012.sdmp, MPGPH131.exe, 0000001C.00000003.2070120899.0000000005180000.00000004.00001000.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2021888097.00000000050E0000.00000004.00001000.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3072062602.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, RageMP131.exe, 0000002E.00000003.2138214229.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2634123106.0000000000891000.00000040.00000001.01000000.0000001B.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
                                Source: RageMP131.exe, 0000002E.00000002.2637513543.0000000000FC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/i
                                Source: d361f35322.exe, 00000009.00000002.3073575028.00000000013FA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942487367.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941258327.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940853881.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943456957.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001429000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934755710.0000000001477000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3079225585.00000000013F2000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3079225585.000000000139F000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.0000000000FDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/81.181.54.104
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001449000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.000000000102A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/widget/demo/81.181.54.104T
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001449000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.000000000102A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/81.181.54.104
                                Source: MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942487367.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941258327.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940853881.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943456957.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934755710.0000000001477000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/81.181.54.1048
                                Source: d361f35322.exe, 00000024.00000002.3079225585.000000000136B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io:443/widget/demo/81.181.54.104Uz
                                Source: NewB.exe, 00000023.00000003.2221273909.0000000000C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://junglethomas.com/
                                Source: NewB.exe, 00000023.00000003.2221273909.0000000000C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://junglethomas.com/b3e2dbff31c451a3fa7323ca95e661ba/4767d2e713f2021e8fe856e3ea638b58.exe
                                Source: NewB.exe, 00000023.00000003.2221273909.0000000000C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://junglethomas.com/b3e2dbff31c451a3fa7323ca95e661ba/4767d2e713f2021e8fe856e3ea638b58.exev
                                Source: freebl3[1].dll.51.drString found in binary or memory: https://mozilla.org0/
                                Source: powershell.exe, 0000001E.00000002.2315360912.000001D42EE5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001E.00000002.2095956248.000001D4207A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                                Source: RageMP131.exe, 0000002E.00000002.2671632274.000000000795D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                                Source: RageMP131.exe, 0000002E.00000002.2671632274.000000000795D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
                                Source: d361f35322.exe, 00000009.00000002.3082656269.0000000007D70000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000002.3073575028.00000000013BE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354975509.0000000008152000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.00000000013ED000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840876152.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2839845792.0000000007CE8000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3088709368.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2839809905.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3079225585.000000000136B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.0000000000F9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
                                Source: d361f35322.exe, 00000009.00000002.3082656269.0000000007D70000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT&
                                Source: MPGPH131.exe, 0000001B.00000002.3354975509.0000000008152000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT3
                                Source: d361f35322.exe, 00000024.00000003.2840876152.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3088709368.0000000007C6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT8
                                Source: d361f35322.exe, 00000024.00000003.2840876152.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3088709368.0000000007C6E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTI
                                Source: RageMP131.exe, 0000002E.00000002.2637513543.0000000000F9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTo5#
                                Source: d361f35322.exe, 00000024.00000002.3079225585.000000000136B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORTxR
                                Source: RageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_bot
                                Source: MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botP
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_bote
                                Source: MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botisepro_botf
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botisepro_botw
                                Source: d361f35322.exe, 00000024.00000003.2824519132.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762153720.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758759334.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2874193365.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3081226044.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759980015.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760938757.0000000001442000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760535342.0000000001441000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825526740.0000000001443000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762501264.0000000001441000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2822644005.0000000001443000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758475716.0000000001443000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819365667.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820817674.0000000001443000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759415774.000000000143F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botl
                                Source: MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/risepro_botrisepro4.104
                                Source: freebl3[1].dll.51.drString found in binary or memory: https://www.digicert.com/CPS0
                                Source: d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                                Source: d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                                Source: d361f35322.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
                                Source: RageMP131.exe, 0000002E.00000002.2671632274.000000000795D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                                Source: RageMP131.exe, 0000002E.00000002.2671632274.000000000795D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3088677492.0000000007C60000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2671632274.0000000007914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/&
                                Source: d361f35322.exe, 00000009.00000003.2769151677.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2768805138.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2765865909.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2766547058.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767781607.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000002.3082656269.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3206207533.0000000008152000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354975509.0000000008152000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2828966339.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824193350.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2826557777.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840195887.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3088844064.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825253363.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758285623.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840876152.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2839878527.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2822343743.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2874104366.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2671632274.000000000795D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                                Source: RageMP131.exe, 0000002E.00000002.2671632274.000000000795D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                                Source: MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3088677492.0000000007C60000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2671632274.0000000007914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
                                Source: d361f35322.exe, 00000024.00000002.3088677492.0000000007C60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/Data
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/ces?
                                Source: d361f35322.exe, 00000009.00000003.2769151677.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2768805138.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2765865909.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2766547058.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767781607.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000002.3082656269.0000000007DBA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3206207533.0000000008152000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354975509.0000000008152000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2828966339.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824193350.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2826557777.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840195887.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3088844064.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825253363.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758285623.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840876152.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2839878527.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2822343743.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2874104366.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2671632274.000000000795D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                                Source: d361f35322.exe, 00000024.00000002.3088677492.0000000007C60000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2671632274.0000000007914000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/r
                                Source: MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/ta
                                Source: d361f35322.exe, 00000009.00000003.2912274365.0000000007DC2000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.7189686015.0000000000C7C000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.2320418390.000000000336C000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.2320275710.0000000003355000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.2320347999.0000000003358000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.7258589510.0000000000C7D000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.7259110109.0000000000C7E000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.7189145681.0000000000C76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3205947734.0000000007CEB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2828616710.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820488974.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2826400120.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840128095.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2832748402.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2836881277.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2873758197.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840628725.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2830540798.0000000007CDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/account
                                Source: MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C6A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820817674.000000000144A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820817674.0000000001443000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/account/v/
                                Source: d361f35322.exe, 00000024.00000003.2820488974.0000000007CDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/accountE
                                Source: d361f35322.exe, 00000024.00000003.2828616710.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2826400120.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840128095.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2832748402.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2836881277.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2873758197.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840628725.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2830540798.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825253363.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3088938529.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824119223.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2829699050.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2839577169.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2839809905.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2826875397.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825684612.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2822343743.0000000007CB4000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2837144727.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2838516911.0000000007CDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/accountJ
                                Source: MPGPH131.exe, 0000001B.00000003.3206207533.0000000008124000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820488974.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820609546.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/accountYouTube
                                Source: MPGPH131.exe, 0000001B.00000003.3206207533.0000000008124000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820488974.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820609546.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/accountYouTube/v/
                                Source: MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/accountkO
                                Source: d361f35322.exe, 00000024.00000003.2820673524.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380091000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://yip.su/RNWPd.exeChttps://pastebin.com/raw/E0rY26ni5https://iplogger.com/1lyxz
                                Source: MPGPH131.exe, 0000001B.00000003.3204849861.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819272725.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819336338.0000000007CE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.comVISITOR_INFO1_LIVE/
                                Source: MPGPH131.exe, 0000001B.00000003.3204849861.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819272725.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819336338.0000000007CE0000.00000004.00000020.00020000.00000000.sdmp, u6po.0.exe, 00000033.00000003.2232787568.00000000220DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.comVISITOR_INFO1_LIVEv10%
                                Source: d361f35322.exe, 00000009.00000003.2912110551.0000000007DBC000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3204849861.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819272725.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819336338.0000000007CE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.comVISITOR_PRIVACY_METADATA/(9
                                Source: u6po.0.exe, 00000033.00000003.2232787568.00000000220DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.comVISITOR_PRIVACY_METADATAv10
                                Source: d361f35322.exe, 00000009.00000003.2912110551.0000000007DBC000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3204849861.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819272725.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819336338.0000000007CE0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.comYSC/)?
                                Source: MPGPH131.exe, 0000001B.00000003.3204849861.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819272725.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819336338.0000000007CE0000.00000004.00000020.00020000.00000000.sdmp, u6po.0.exe, 00000033.00000003.2232787568.00000000220DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.comYSCv10

                                Key, Mouse, Clipboard, Microphone and Screen Capturing

                                barindex
                                Source: Yara matchFile source: 00000031.00000002.2229022734.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000031.00000002.2229087093.0000000003661000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                                Source: ac861238af.exe, 00000010.00000003.7189686015.0000000000C7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _WINAPI_REGISTERRAWINPUTDEVICESYxmemstr_ee7ff430-3
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeFile created: C:\Users\user\AppData\Local\Temp\TmpC21F.tmpJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeFile created: C:\Users\user\AppData\Local\Temp\TmpC1FF.tmpJump to dropped file

                                System Summary

                                barindex
                                Source: 00000031.00000002.2229022734.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                                Source: 00000031.00000002.2229087093.0000000003661000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e Author: unknown
                                Source: 00000031.00000002.2228939653.00000000034F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f Author: unknown
                                Source: 00000031.00000002.2228816968.0000000001B2B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
                                Source: swiiiii[1].exe.10.dr, RemoteObjects.csLarge array initialization: RemoteObjects: array initializer size 297472
                                Source: swiiiii.exe.10.dr, RemoteObjects.csLarge array initialization: RemoteObjects: array initializer size 297472
                                Source: swiiii[1].exe.10.dr, RemoteObjects.csLarge array initialization: RemoteObjects: array initializer size 153088
                                Source: swiiii.exe.10.dr, RemoteObjects.csLarge array initialization: RemoteObjects: array initializer size 153088
                                Source: ac861238af.exe, 00000010.00000000.1932011901.0000000000762000.00000002.00000001.01000000.0000000E.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_95765f4c-3
                                Source: ac861238af.exe, 00000010.00000000.1932011901.0000000000762000.00000002.00000001.01000000.0000000E.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_1d9ccc15-0
                                Source: 1CMweaqlKp.exeStatic PE information: section name:
                                Source: 1CMweaqlKp.exeStatic PE information: section name:
                                Source: 1CMweaqlKp.exeStatic PE information: section name:
                                Source: 1CMweaqlKp.exeStatic PE information: section name:
                                Source: 1CMweaqlKp.exeStatic PE information: section name:
                                Source: explorta.exe.0.drStatic PE information: section name:
                                Source: explorta.exe.0.drStatic PE information: section name:
                                Source: explorta.exe.0.drStatic PE information: section name:
                                Source: explorta.exe.0.drStatic PE information: section name:
                                Source: explorta.exe.0.drStatic PE information: section name:
                                Source: sarra[1].exe.1.drStatic PE information: section name:
                                Source: sarra[1].exe.1.drStatic PE information: section name: .idata
                                Source: sarra[1].exe.1.drStatic PE information: section name:
                                Source: amert[1].exe.1.drStatic PE information: section name:
                                Source: amert[1].exe.1.drStatic PE information: section name: .idata
                                Source: amert[1].exe.1.drStatic PE information: section name:
                                Source: amert.exe.1.drStatic PE information: section name:
                                Source: amert.exe.1.drStatic PE information: section name: .idata
                                Source: amert.exe.1.drStatic PE information: section name:
                                Source: random[1].exe.1.drStatic PE information: section name:
                                Source: random[1].exe.1.drStatic PE information: section name: .idata
                                Source: random[1].exe.1.drStatic PE information: section name:
                                Source: d361f35322.exe.1.drStatic PE information: section name:
                                Source: d361f35322.exe.1.drStatic PE information: section name: .idata
                                Source: d361f35322.exe.1.drStatic PE information: section name:
                                Source: explorha.exe.7.drStatic PE information: section name:
                                Source: explorha.exe.7.drStatic PE information: section name: .idata
                                Source: explorha.exe.7.drStatic PE information: section name:
                                Source: RageMP131.exe.9.drStatic PE information: section name:
                                Source: RageMP131.exe.9.drStatic PE information: section name: .idata
                                Source: RageMP131.exe.9.drStatic PE information: section name:
                                Source: MPGPH131.exe.9.drStatic PE information: section name:
                                Source: MPGPH131.exe.9.drStatic PE information: section name: .idata
                                Source: MPGPH131.exe.9.drStatic PE information: section name:
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeFile created: C:\Windows\Tasks\explorta.jobJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile created: C:\Windows\Tasks\explorha.jobJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008D80809_2_008D8080
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0082001D9_2_0082001D
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008761D09_2_008761D0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008BD2B09_2_008BD2B0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008BC3E09_2_008BC3E0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008BB7E09_2_008BB7E0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0085F7309_2_0085F730
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0091C8D09_2_0091C8D0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_007EB8E09_2_007EB8E0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008B49B09_2_008B49B0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00878A809_2_00878A80
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00871A609_2_00871A60
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0087CBF09_2_0087CBF0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00887D209_2_00887D20
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0087AEC09_2_0087AEC0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00873ED09_2_00873ED0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0086DF609_2_0086DF60
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_009240A09_2_009240A0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_009120C09_2_009120C0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008171909_2_00817190
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008621009_2_00862100
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008811309_2_00881130
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_009231609_2_00923160
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0091F2809_2_0091F280
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0082035F9_2_0082035F
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008D03509_2_008D0350
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0080F5709_2_0080F570
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_009896809_2_00989680
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008347AD9_2_008347AD
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0081A9189_2_0081A918
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0081C9509_2_0081C950
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00924AE09_2_00924AE0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00925A409_2_00925A40
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_0082DA749_2_0082DA74
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008C4B909_2_008C4B90
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00838BA09_2_00838BA0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00870BA09_2_00870BA0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00838E209_2_00838E20
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00881E409_2_00881E40
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008CBFC09_2_008CBFC0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008CCFC09_2_008CCFC0
                                Source: Joe Sandbox ViewDropped File: C:\ProgramData\freebl3.dll EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: String function: 007FACE0 appears 86 times
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 928
                                Source: explorta.exe.0.drStatic PE information: Number of sections : 12 > 10
                                Source: 1CMweaqlKp.exeStatic PE information: Number of sections : 12 > 10
                                Source: file300un.exe.10.drStatic PE information: No import functions for PE file found
                                Source: file300un[1].exe.10.drStatic PE information: No import functions for PE file found
                                Source: 1CMweaqlKp.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                                Source: 00000031.00000002.2229022734.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                                Source: 00000031.00000002.2229087093.0000000003661000.00000004.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_4e31426e reference_sample = 1ce643981821b185b8ad73b798ab5c71c6c40e1f547b8e5b19afdaa4ca2a5174, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = cf6d8615643198bc53527cb9581e217f8a39760c2e695980f808269ebe791277, id = 4e31426e-d62e-4b6d-911b-4223e1f6adef, last_modified = 2021-08-23
                                Source: 00000031.00000002.2228939653.00000000034F0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Smokeloader_3687686f reference_sample = 8b3014ecd962a335b246f6c70fc820247e8bdaef98136e464b1fdb824031eef7, os = windows, severity = x86, creation_date = 2021-07-21, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Smokeloader, fingerprint = 0f483f9f79ae29b944825c1987366d7b450312f475845e2242a07674580918bc, id = 3687686f-8fbf-4f09-9afa-612ee65dc86c, last_modified = 2021-08-23
                                Source: 00000031.00000002.2228816968.0000000001B2B000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
                                Source: swiiiii[1].exe.10.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: swiiiii.exe.10.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: swiiii[1].exe.10.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: swiiii.exe.10.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                Source: 1CMweaqlKp.exeStatic PE information: Section: ZLIB complexity 0.9998594874100719
                                Source: 1CMweaqlKp.exeStatic PE information: Section: ZLIB complexity 0.9919149709302325
                                Source: 1CMweaqlKp.exeStatic PE information: Section: ZLIB complexity 1.00537109375
                                Source: 1CMweaqlKp.exeStatic PE information: Section: .boot ZLIB complexity 0.9902337473891388
                                Source: 1CMweaqlKp.exeStatic PE information: Section: .reloc ZLIB complexity 1.5
                                Source: explorta.exe.0.drStatic PE information: Section: ZLIB complexity 0.9998594874100719
                                Source: explorta.exe.0.drStatic PE information: Section: ZLIB complexity 0.9919149709302325
                                Source: explorta.exe.0.drStatic PE information: Section: ZLIB complexity 1.00537109375
                                Source: explorta.exe.0.drStatic PE information: Section: .boot ZLIB complexity 0.9902337473891388
                                Source: explorta.exe.0.drStatic PE information: Section: .reloc ZLIB complexity 1.5
                                Source: amert[1].exe.1.drStatic PE information: Section: ZLIB complexity 0.9981777815013405
                                Source: amert[1].exe.1.drStatic PE information: Section: avcjhwxy ZLIB complexity 0.9946098513719512
                                Source: amert.exe.1.drStatic PE information: Section: ZLIB complexity 0.9981777815013405
                                Source: amert.exe.1.drStatic PE information: Section: avcjhwxy ZLIB complexity 0.9946098513719512
                                Source: explorha.exe.7.drStatic PE information: Section: ZLIB complexity 0.9981777815013405
                                Source: explorha.exe.7.drStatic PE information: Section: avcjhwxy ZLIB complexity 0.9946098513719512
                                Source: gold[1].exe.10.drStatic PE information: Section: .Left ZLIB complexity 0.998365875385208
                                Source: gold.exe.10.drStatic PE information: Section: .Left ZLIB complexity 0.998365875385208
                                Source: sarra[1].exe.1.drStatic PE information: Entrypont disasm: arithmetic instruction to all instruction ratio: 1.0 > 0.5 instr diversity: 0.5
                                Source: file300un[1].exe.10.dr, -.csCryptographic APIs: 'TransformFinalBlock'
                                Source: file300un.exe.10.dr, -.csCryptographic APIs: 'TransformFinalBlock'
                                Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winEXE@133/199@0/39
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008BD2B0 RegOpenKeyExA,RegQueryValueExA,RegOpenKeyExA,RegQueryValueExA,GetLocalTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,GetSystemInfo,GlobalMemoryStatusEx,CreateToolhelp32Snapshot,RegOpenKeyExA,RegEnumKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,9_2_008BD2B0
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\sarra[1].exeJump to behavior
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8944:120:WilError_03
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7628:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8272:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6580:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3756:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6260:120:WilError_03
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeMutant created: \Sessions\1\BaseNamedObjects\a091ec0a6e22276a96a99c1d34ef679c
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeMutant created: \Sessions\1\BaseNamedObjects\07c6bc37dc50874878dcb010336ed906
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8132:120:WilError_03
                                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8044:120:WilError_03
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeMutant created: \Sessions\1\BaseNamedObjects\006700e5a2ab05704bbb0c589b88924d
                                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2588
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeFile created: C:\Users\user\AppData\Local\Temp\5454e6f062Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeFile read: C:\Users\desktop.iniJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                Source: d361f35322.exe, 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, MPGPH131.exe, 0000001B.00000003.2069728672.0000000004FF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3349331204.0000000000701000.00000040.00000001.01000000.00000012.sdmp, MPGPH131.exe, 0000001C.00000003.2070120899.0000000005180000.00000004.00001000.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2021888097.00000000050E0000.00000004.00001000.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3072062602.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, RageMP131.exe, 0000002E.00000003.2138214229.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2634123106.0000000000891000.00000040.00000001.01000000.0000001B.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                                Source: d361f35322.exe, 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, MPGPH131.exe, 0000001B.00000003.2069728672.0000000004FF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3349331204.0000000000701000.00000040.00000001.01000000.00000012.sdmp, MPGPH131.exe, 0000001C.00000003.2070120899.0000000005180000.00000004.00001000.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2021888097.00000000050E0000.00000004.00001000.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3072062602.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, RageMP131.exe, 0000002E.00000003.2138214229.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2634123106.0000000000891000.00000040.00000001.01000000.0000001B.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                                Source: d361f35322.exe, 00000009.00000003.2767781607.0000000007DB1000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2766547058.0000000007DB1000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941355973.0000000007CD2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942331492.0000000008153000.00000004.00000020.00020000.00000000.sdmp, u6po.0.exe, 00000033.00000003.2239168944.00000000220D4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                                Source: 1CMweaqlKp.exeReversingLabs: Detection: 50%
                                Source: 1CMweaqlKp.exeVirustotal: Detection: 44%
                                Source: amert.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                                Source: d361f35322.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                                Source: d361f35322.exeString found in binary or memory: https://www.maxmind.com/en/locate-my-ip-address
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeFile read: C:\Users\user\Desktop\1CMweaqlKp.exeJump to behavior
                                Source: unknownProcess created: C:\Users\user\Desktop\1CMweaqlKp.exe "C:\Users\user\Desktop\1CMweaqlKp.exe"
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeProcess created: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe "C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"
                                Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2656 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe "C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\AppData\Local\Temp\1000019001\amert.exe "C:\Users\user\AppData\Local\Temp\1000019001\amert.exe"
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe "C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeProcess created: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe "C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
                                Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\1000021002\ac861238af.exe "C:\Users\user\1000021002\ac861238af.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Users\user\1000021002\ac861238af.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profiles
                                Source: C:\Windows\System32\netsh.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe "C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
                                Source: unknownProcess created: C:\ProgramData\MPGPH131\MPGPH131.exe C:\ProgramData\MPGPH131\MPGPH131.exe
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 928
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe"
                                Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe "C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe" /F
                                Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000071001\jok.exe "C:\Users\user\AppData\Local\Temp\1000071001\jok.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess created: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe "C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe"
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe "C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: unknownProcess created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe "C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess created: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe "C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe"
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeProcess created: C:\Users\user\AppData\Local\Temp\u6po.0.exe "C:\Users\user\AppData\Local\Temp\u6po.0.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeProcess created: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe "C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe "C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\AppData\Local\Temp\1000019001\amert.exe "C:\Users\user\AppData\Local\Temp\1000019001\amert.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe "C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\1000021002\ac861238af.exe "C:\Users\user\1000021002\ac861238af.exe" Jump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2656 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknownJump to behavior
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeProcess created: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe "C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHESTJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHESTJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe "C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe"
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe"
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000071001\jok.exe "C:\Users\user\AppData\Local\Temp\1000071001\jok.exe"
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe "C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe"
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe"
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: unknown unknown
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: unknown unknown
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: unknown unknown
                                Source: C:\Users\user\1000021002\ac861238af.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
                                Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 928
                                Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\System32\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profiles
                                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe" /F
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess created: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe "C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess created: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe "C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess created: unknown unknown
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeProcess created: C:\Users\user\AppData\Local\Temp\u6po.0.exe "C:\Users\user\AppData\Local\Temp\u6po.0.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: mstask.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: dui70.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: duser.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: chartv.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: oleacc.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: atlthunk.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: explorerframe.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: mstask.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: mpr.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: dui70.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: duser.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: chartv.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: oleacc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: atlthunk.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: textinputframework.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: coreuicomponents.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: coremessaging.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: wtsapi32.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: winsta.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: textshaping.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: propsys.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: iertutil.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: profapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: explorerframe.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: edputil.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: urlmon.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: srvcli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: netutils.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: appresolver.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: bcp47langs.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: slc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: userenv.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: sppc.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: apphelp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: winmm.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: rstrtmgr.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: ncrypt.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: ntasn1.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: d3d11.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: dxgi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: resourcepolicyclient.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: kernel.appcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: d3d10warp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: uxtheme.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: dxcore.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: sspicli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: ntmarta.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: winhttp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: wininet.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: mswsock.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: devobj.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: webio.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: iphlpapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: winnsi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: dnsapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: rasadhlp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: fwpuclnt.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: schannel.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: mskeyprotect.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: ncryptsslp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: msasn1.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: cryptsp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: rsaenh.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: cryptbase.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: gpapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: vaultcli.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: wintypes.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: windows.storage.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: wldp.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: dpapi.dllJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: winmm.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: wininet.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: sspicli.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: iertutil.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: windows.storage.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: wldp.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: profapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: winhttp.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: iphlpapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: mswsock.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: winnsi.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: urlmon.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: srvcli.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: netutils.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: uxtheme.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: propsys.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: edputil.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: windows.staterepositoryps.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: wintypes.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: appresolver.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: bcp47langs.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: slc.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: userenv.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: sppc.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: onecorecommonproxystub.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: onecoreuapcommonproxystub.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: winmm.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: wininet.dll
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSection loaded: kernel.appcore.dll
                                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: wsock32.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: version.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: winmm.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: mpr.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: wininet.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: iphlpapi.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: userenv.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: uxtheme.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: windows.storage.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: wldp.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: propsys.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: profapi.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: edputil.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: urlmon.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: iertutil.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: srvcli.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: netutils.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: windows.staterepositoryps.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: sspicli.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: wintypes.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: appresolver.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: bcp47langs.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: slc.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: sppc.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: onecorecommonproxystub.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: onecoreuapcommonproxystub.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: pcacli.dll
                                Source: C:\Users\user\1000021002\ac861238af.exeSection loaded: sfc_os.dll
                                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                                Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: kernel.appcore.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: ifmon.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: iphlpapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: mprapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rasmontr.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rasapi32.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: fwpuclnt.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: mfc42u.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: authfwcfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: fwpolicyiomgr.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: firewallapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: dnsapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: fwbase.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: dhcpcmonitor.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: dot3cfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: dot3api.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: onex.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: eappcfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: ncrypt.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: eappprxy.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: ntasn1.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: fwcfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: hnetmon.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: netshell.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: nlaapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: netsetupapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: netiohlp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: dhcpcsvc.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: winnsi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: nettrace.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: sspicli.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: nshhttp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: httpapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: nshipsec.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: userenv.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: activeds.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: polstore.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: winipsec.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: adsldpc.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: adsldpc.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: nshwfp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: cabinet.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: p2pnetsh.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: p2p.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: profapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rpcnsh.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wcnnetsh.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wlanapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: whhelper.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: winhttp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wlancfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: cryptsp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wshelper.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wevtapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: mswsock.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wwancfg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wwapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wcmapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: rmclient.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: mobilenetworking.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: peerdistsh.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: uxtheme.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: slc.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: sppc.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: gpapi.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: ktmw32.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: mprmsg.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: windows.storage.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: wldp.dll
                                Source: C:\Windows\System32\netsh.exeSection loaded: msasn1.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeSection loaded: mscoree.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeSection loaded: version.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeSection loaded: vcruntime140_clr0400.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeSection loaded: ucrtbase_clr0400.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeSection loaded: ucrtbase_clr0400.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeSection loaded: cryptsp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeSection loaded: rsaenh.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeSection loaded: cryptbase.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: apphelp.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: webio.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: iphlpapi.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winnsi.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dnsapi.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rasadhlp.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: fwpuclnt.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: schannel.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mskeyprotect.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncryptsslp.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: msasn1.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptsp.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rsaenh.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: cryptbase.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: gpapi.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: vaultcli.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wintypes.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: windows.storage.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wldp.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntmarta.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dpapi.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winmm.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: rstrtmgr.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ncrypt.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ntasn1.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d11.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxgi.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: resourcepolicyclient.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: kernel.appcore.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: d3d10warp.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: uxtheme.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: dxcore.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: sspicli.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winhttp.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: wininet.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: mswsock.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: devobj.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: webio.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: iphlpapi.dll
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSection loaded: winnsi.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dll
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: apphelp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: wininet.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: windows.storage.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: wldp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: uxtheme.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: propsys.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: profapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: edputil.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: urlmon.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: iertutil.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: srvcli.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: netutils.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: windows.staterepositoryps.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: sspicli.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: wintypes.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: appresolver.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: bcp47langs.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: slc.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: userenv.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: sppc.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: onecorecommonproxystub.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: onecoreuapcommonproxystub.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: winhttp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: mswsock.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: iphlpapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: winnsi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: dnsapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: rasadhlp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: fwpuclnt.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: schannel.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: mskeyprotect.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: ntasn1.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: msasn1.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: dpapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: cryptsp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: rsaenh.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: cryptbase.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: gpapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: ncrypt.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeSection loaded: ncryptsslp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: winmm.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: rstrtmgr.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: ncrypt.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: ntasn1.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: d3d11.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: dxgi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: resourcepolicyclient.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: kernel.appcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: d3d10warp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: uxtheme.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: dxcore.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: sspicli.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: winhttp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: wininet.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: mswsock.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: devobj.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: ondemandconnroutehelper.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: webio.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: iphlpapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: winnsi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: dnsapi.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: rasadhlp.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSection loaded: fwpuclnt.dll
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{148BD52A-A2AB-11CE-B11F-00AA00530503}\InProcServer32Jump to behavior
                                Source: Window RecorderWindow detected: More than 3 window changes detected
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                                Source: 1CMweaqlKp.exeStatic file information: File size 1793040 > 1048576
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeFile opened: C:\Windows\SysWOW64\msvcr100.dll
                                Source: 1CMweaqlKp.exeStatic PE information: Raw size of .boot is bigger than: 0x100000 < 0x185000
                                Source: Binary string: freebl3.pdb source: freebl3[1].dll.51.dr
                                Source: Binary string: C:\wutimosolix_62\gowaj\tosusinana-la.pdb source: ISetup8.exe, 00000029.00000003.2151074345.0000000003871000.00000004.00000020.00020000.00000000.sdmp, u6po.0.exe, 00000033.00000000.2149099984.0000000000412000.00000002.00000001.01000000.0000001F.sdmp
                                Source: Binary string: freebl3.pdbp source: freebl3[1].dll.51.dr
                                Source: Binary string: C:\somilixucasoba_pi.pdb source: ISetup8.exe, 00000029.00000000.2055258369.0000000000412000.00000002.00000001.01000000.00000019.sdmp, rVg8HtIzXa4xhJHL7Pn8A6d2.exe.54.dr
                                Source: Binary string: file300un.PDBI: source: file300un.exe, 00000032.00000002.7139604951.000000C2DA0F3000.00000004.00000010.00020000.00000000.sdmp
                                Source: Binary string: C:\rute\dazazef.pdb source: toolspub1.exe, 00000031.00000000.2109256617.0000000000412000.00000002.00000001.01000000.0000001D.sdmp, toolspub1.exe, 00000031.00000002.2197395229.0000000000412000.00000002.00000001.01000000.0000001D.sdmp
                                Source: Binary string: mscorlib.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: System.ni.pdbRSDS source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: C:\dimohisek.pdb source: ppcQqLgPI8Dyy7YykX33fm5x.exe.54.dr
                                Source: Binary string: Croco.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: C:\Users\user\AppData\Local\Temp\1000075001\file300un.PDB source: file300un.exe, 00000032.00000002.7139604951.000000C2DA0F3000.00000004.00000010.00020000.00000000.sdmp
                                Source: Binary string: YC:\rute\dazazef.pdb source: toolspub1.exe, 00000031.00000000.2109256617.0000000000412000.00000002.00000001.01000000.0000001D.sdmp, toolspub1.exe, 00000031.00000002.2197395229.0000000000412000.00000002.00000001.01000000.0000001D.sdmp
                                Source: Binary string: mscorlib.ni.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: ,C:\dimohisek.pdb source: ppcQqLgPI8Dyy7YykX33fm5x.exe.54.dr
                                Source: Binary string: pC:\Users\user\AppData\Local\Temp\1000075001\file300un.PDB source: file300un.exe, 00000032.00000002.7139604951.000000C2DA0F3000.00000004.00000010.00020000.00000000.sdmp
                                Source: Binary string: System.pdb4 source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: System.Core.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: mscorlib.ni.pdbRSDS source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: GC:\somilixucasoba_pi.pdb source: ISetup8.exe, 00000029.00000000.2055258369.0000000000412000.00000002.00000001.01000000.00000019.sdmp, rVg8HtIzXa4xhJHL7Pn8A6d2.exe.54.dr
                                Source: Binary string: System.ni.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: System.pdb source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: System.Core.ni.pdbRSDS source: WERA6A7.tmp.dmp.34.dr
                                Source: Binary string: System.Core.ni.pdb source: WERA6A7.tmp.dmp.34.dr

                                Data Obfuscation

                                barindex
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeUnpacked PE file: 7.2.amert.exe.610000.0.unpack :EW;.rsrc:W;.idata :W; :EW;avcjhwxy:EW;nkwkrymv:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;avcjhwxy:EW;nkwkrymv:EW;.taggant:EW;
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeUnpacked PE file: 9.2.d361f35322.exe.7e0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;agovwish:EW;lcjgmmfi:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;agovwish:EW;lcjgmmfi:EW;.taggant:EW;
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeUnpacked PE file: 11.2.explorha.exe.930000.0.unpack :EW;.rsrc:W;.idata :W; :EW;avcjhwxy:EW;nkwkrymv:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;avcjhwxy:EW;nkwkrymv:EW;.taggant:EW;
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeUnpacked PE file: 27.2.MPGPH131.exe.700000.0.unpack :EW;.rsrc:W;.idata :W; :EW;agovwish:EW;lcjgmmfi:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;agovwish:EW;lcjgmmfi:EW;.taggant:EW;
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeUnpacked PE file: 36.2.d361f35322.exe.7e0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;agovwish:EW;lcjgmmfi:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;agovwish:EW;lcjgmmfi:EW;.taggant:EW;
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeUnpacked PE file: 46.2.RageMP131.exe.890000.0.unpack :EW;.rsrc:W;.idata :W; :EW;agovwish:EW;lcjgmmfi:EW;.taggant:EW; vs :ER;.rsrc:W;.idata :W; :EW;agovwish:EW;lcjgmmfi:EW;.taggant:EW;
                                Source: jok[1].exe.10.drStatic PE information: 0xFC177629 [Thu Jan 10 08:13:29 2104 UTC]
                                Source: initial sampleStatic PE information: section where entry point is pointing to: .boot
                                Source: jok.exe.10.drStatic PE information: real checksum: 0x0 should be: 0x547e4
                                Source: cred64[1].dll.10.drStatic PE information: real checksum: 0x0 should be: 0x147ee8
                                Source: swiiiii[1].exe.10.drStatic PE information: real checksum: 0x562fb should be: 0x5eece
                                Source: sarra[1].exe.1.drStatic PE information: real checksum: 0x255044 should be: 0x255765
                                Source: amert.exe.1.drStatic PE information: real checksum: 0x1d87f7 should be: 0x1d2e57
                                Source: clip64.dll.10.drStatic PE information: real checksum: 0x0 should be: 0x1f783
                                Source: jok[1].exe.10.drStatic PE information: real checksum: 0x0 should be: 0x547e4
                                Source: install.exe.10.drStatic PE information: real checksum: 0x22d33 should be: 0x44be5e
                                Source: swiiii.exe.10.drStatic PE information: real checksum: 0x0 should be: 0x32780
                                Source: install[1].exe.10.drStatic PE information: real checksum: 0x22d33 should be: 0x44be5e
                                Source: cred64.dll.10.drStatic PE information: real checksum: 0x0 should be: 0x147ee8
                                Source: clip64[1].dll.10.drStatic PE information: real checksum: 0x0 should be: 0x1f783
                                Source: NewB.exe.10.drStatic PE information: real checksum: 0x0 should be: 0x6bd55
                                Source: MPGPH131.exe.9.drStatic PE information: real checksum: 0x24c49c should be: 0x254dd7
                                Source: explorha.exe.7.drStatic PE information: real checksum: 0x1d87f7 should be: 0x1d2e57
                                Source: gold.exe.10.drStatic PE information: real checksum: 0x0 should be: 0x9cfd4
                                Source: swiiii[1].exe.10.drStatic PE information: real checksum: 0x0 should be: 0x32780
                                Source: amert[1].exe.1.drStatic PE information: real checksum: 0x1d87f7 should be: 0x1d2e57
                                Source: RageMP131.exe.9.drStatic PE information: real checksum: 0x24c49c should be: 0x254dd7
                                Source: NewB[1].exe.10.drStatic PE information: real checksum: 0x0 should be: 0x6bd55
                                Source: d361f35322.exe.1.drStatic PE information: real checksum: 0x24c49c should be: 0x254dd7
                                Source: gold[1].exe.10.drStatic PE information: real checksum: 0x0 should be: 0x9cfd4
                                Source: alexxxxxxxx.exe.10.drStatic PE information: real checksum: 0x0 should be: 0x2b7dd5
                                Source: alexxxxxxxx[1].exe.10.drStatic PE information: real checksum: 0x0 should be: 0x2b7dd5
                                Source: swiiiii.exe.10.drStatic PE information: real checksum: 0x562fb should be: 0x5eece
                                Source: random[1].exe.1.drStatic PE information: real checksum: 0x24c49c should be: 0x254dd7
                                Source: 1CMweaqlKp.exeStatic PE information: section name:
                                Source: 1CMweaqlKp.exeStatic PE information: section name:
                                Source: 1CMweaqlKp.exeStatic PE information: section name:
                                Source: 1CMweaqlKp.exeStatic PE information: section name:
                                Source: 1CMweaqlKp.exeStatic PE information: section name:
                                Source: 1CMweaqlKp.exeStatic PE information: section name: .vm_sec
                                Source: 1CMweaqlKp.exeStatic PE information: section name: .themida
                                Source: 1CMweaqlKp.exeStatic PE information: section name: .boot
                                Source: explorta.exe.0.drStatic PE information: section name:
                                Source: explorta.exe.0.drStatic PE information: section name:
                                Source: explorta.exe.0.drStatic PE information: section name:
                                Source: explorta.exe.0.drStatic PE information: section name:
                                Source: explorta.exe.0.drStatic PE information: section name:
                                Source: explorta.exe.0.drStatic PE information: section name: .vm_sec
                                Source: explorta.exe.0.drStatic PE information: section name: .themida
                                Source: explorta.exe.0.drStatic PE information: section name: .boot
                                Source: sarra[1].exe.1.drStatic PE information: section name:
                                Source: sarra[1].exe.1.drStatic PE information: section name: .idata
                                Source: sarra[1].exe.1.drStatic PE information: section name:
                                Source: sarra[1].exe.1.drStatic PE information: section name: zhbidvgs
                                Source: sarra[1].exe.1.drStatic PE information: section name: swmxyxsi
                                Source: sarra[1].exe.1.drStatic PE information: section name: .taggant
                                Source: amert[1].exe.1.drStatic PE information: section name:
                                Source: amert[1].exe.1.drStatic PE information: section name: .idata
                                Source: amert[1].exe.1.drStatic PE information: section name:
                                Source: amert[1].exe.1.drStatic PE information: section name: avcjhwxy
                                Source: amert[1].exe.1.drStatic PE information: section name: nkwkrymv
                                Source: amert[1].exe.1.drStatic PE information: section name: .taggant
                                Source: amert.exe.1.drStatic PE information: section name:
                                Source: amert.exe.1.drStatic PE information: section name: .idata
                                Source: amert.exe.1.drStatic PE information: section name:
                                Source: amert.exe.1.drStatic PE information: section name: avcjhwxy
                                Source: amert.exe.1.drStatic PE information: section name: nkwkrymv
                                Source: amert.exe.1.drStatic PE information: section name: .taggant
                                Source: random[1].exe.1.drStatic PE information: section name:
                                Source: random[1].exe.1.drStatic PE information: section name: .idata
                                Source: random[1].exe.1.drStatic PE information: section name:
                                Source: random[1].exe.1.drStatic PE information: section name: agovwish
                                Source: random[1].exe.1.drStatic PE information: section name: lcjgmmfi
                                Source: random[1].exe.1.drStatic PE information: section name: .taggant
                                Source: d361f35322.exe.1.drStatic PE information: section name:
                                Source: d361f35322.exe.1.drStatic PE information: section name: .idata
                                Source: d361f35322.exe.1.drStatic PE information: section name:
                                Source: d361f35322.exe.1.drStatic PE information: section name: agovwish
                                Source: d361f35322.exe.1.drStatic PE information: section name: lcjgmmfi
                                Source: d361f35322.exe.1.drStatic PE information: section name: .taggant
                                Source: explorha.exe.7.drStatic PE information: section name:
                                Source: explorha.exe.7.drStatic PE information: section name: .idata
                                Source: explorha.exe.7.drStatic PE information: section name:
                                Source: explorha.exe.7.drStatic PE information: section name: avcjhwxy
                                Source: explorha.exe.7.drStatic PE information: section name: nkwkrymv
                                Source: explorha.exe.7.drStatic PE information: section name: .taggant
                                Source: RageMP131.exe.9.drStatic PE information: section name:
                                Source: RageMP131.exe.9.drStatic PE information: section name: .idata
                                Source: RageMP131.exe.9.drStatic PE information: section name:
                                Source: RageMP131.exe.9.drStatic PE information: section name: agovwish
                                Source: RageMP131.exe.9.drStatic PE information: section name: lcjgmmfi
                                Source: RageMP131.exe.9.drStatic PE information: section name: .taggant
                                Source: MPGPH131.exe.9.drStatic PE information: section name:
                                Source: MPGPH131.exe.9.drStatic PE information: section name: .idata
                                Source: MPGPH131.exe.9.drStatic PE information: section name:
                                Source: MPGPH131.exe.9.drStatic PE information: section name: agovwish
                                Source: MPGPH131.exe.9.drStatic PE information: section name: lcjgmmfi
                                Source: MPGPH131.exe.9.drStatic PE information: section name: .taggant
                                Source: gold[1].exe.10.drStatic PE information: section name: .DAX
                                Source: gold[1].exe.10.drStatic PE information: section name: .Left
                                Source: gold[1].exe.10.drStatic PE information: section name: .INV
                                Source: gold.exe.10.drStatic PE information: section name: .DAX
                                Source: gold.exe.10.drStatic PE information: section name: .Left
                                Source: gold.exe.10.drStatic PE information: section name: .INV
                                Source: cred64[1].dll.10.drStatic PE information: section name: _RDATA
                                Source: cred64.dll.10.drStatic PE information: section name: _RDATA
                                Source: alexxxxxxxx[1].exe.10.drStatic PE information: section name: .00cfg
                                Source: alexxxxxxxx.exe.10.drStatic PE information: section name: .00cfg
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00813F49 push ecx; ret 9_2_00813F5C
                                Source: 1CMweaqlKp.exeStatic PE information: section name: entropy: 7.9986661792698115
                                Source: 1CMweaqlKp.exeStatic PE information: section name: .boot entropy: 7.955810157618839
                                Source: explorta.exe.0.drStatic PE information: section name: entropy: 7.9986661792698115
                                Source: explorta.exe.0.drStatic PE information: section name: .boot entropy: 7.955810157618839
                                Source: sarra[1].exe.1.drStatic PE information: section name: entropy: 7.9243513655231705
                                Source: sarra[1].exe.1.drStatic PE information: section name: zhbidvgs entropy: 7.912044560062752
                                Source: amert[1].exe.1.drStatic PE information: section name: entropy: 7.986768487395881
                                Source: amert[1].exe.1.drStatic PE information: section name: avcjhwxy entropy: 7.953340978521756
                                Source: amert.exe.1.drStatic PE information: section name: entropy: 7.986768487395881
                                Source: amert.exe.1.drStatic PE information: section name: avcjhwxy entropy: 7.953340978521756
                                Source: random[1].exe.1.drStatic PE information: section name: entropy: 7.924280236056968
                                Source: random[1].exe.1.drStatic PE information: section name: agovwish entropy: 7.911493089854424
                                Source: d361f35322.exe.1.drStatic PE information: section name: entropy: 7.924280236056968
                                Source: d361f35322.exe.1.drStatic PE information: section name: agovwish entropy: 7.911493089854424
                                Source: explorha.exe.7.drStatic PE information: section name: entropy: 7.986768487395881
                                Source: explorha.exe.7.drStatic PE information: section name: avcjhwxy entropy: 7.953340978521756
                                Source: RageMP131.exe.9.drStatic PE information: section name: entropy: 7.924280236056968
                                Source: RageMP131.exe.9.drStatic PE information: section name: agovwish entropy: 7.911493089854424
                                Source: MPGPH131.exe.9.drStatic PE information: section name: entropy: 7.924280236056968
                                Source: MPGPH131.exe.9.drStatic PE information: section name: agovwish entropy: 7.911493089854424
                                Source: swiiiii[1].exe.10.drStatic PE information: section name: .text entropy: 7.992152217310619
                                Source: swiiiii.exe.10.drStatic PE information: section name: .text entropy: 7.992152217310619
                                Source: swiiii[1].exe.10.drStatic PE information: section name: .text entropy: 7.987813915261593
                                Source: swiiii.exe.10.drStatic PE information: section name: .text entropy: 7.987813915261593

                                Persistence and Installation Behavior

                                barindex
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 Blob
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\gX4d2ArXDOHTjofk9CfRb7Jz.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\5nFKWr1EKUheiDEHo671vxm8.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\clip64[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\u6po.0.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\QbkKvIT5uJj3Cx8h0ECIsmUK.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeFile created: C:\Users\user\AppData\Local\Temp\u6po.2\ASUS_WMI.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeFile created: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\gold[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\ISetup8[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\jok[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeFile created: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\9WrQ2c2u5fxH1pcvCwwjGhdd.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\gPQjkT7jjoMSIv7cXyWMW1C4.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\toolspub1[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\C893DEcM3dAA247WrHBz1SDW.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\oqwWhViccQzmDvkS751EZRiG.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\CmCQsbfi77SnYQWckHTzUjRg.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\laQhqKepZhfkS5rQoYOvKJAy.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\g81RdhkO8Pp47pz1l8siHWuN.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\random[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\pScZMSZH0uu2OkUDvWpN2tuz.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\dmmb0z6yJ22pC75a4y49Nfob.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\mBoc1pbzy7gOQT20pyEZL3en.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\1NXbTL9dcUCk55eVv5KRJhmL.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\cred64[1].dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\oXA3lyE6zGyLyvw1CwVKpLsf.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\gmHwlMZnGawtAwStcAU6D1RM.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\NN7y6Ml4QHJBCfpeCmt1XQq3.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\swiiii[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\0co9idnjzay1KSn3DMfCsBSw.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\ULDq5mjQ4b5aNI3V4eIJfMVS.exeJump to dropped file
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeFile created: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeFile created: C:\Users\user\AppData\Local\Temp\u6po.0.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\GIz2DLitsyoTn14REJti2nqN.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\evHtDP9yDvs3XYDQg8lqEVoH.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\qPQ3lJ1fN9DRgfiXtyMpf1ll.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Aghrmi42Lz5QvS8u8U6BiVXQ.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\11xbcpylNeYY4tZ39QN34xGC.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Temp\1000079001\gold.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\iFyHzFXRkeOppMlu3FtGrLYy.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\QcyIEuk7gD7wTlhElB94jgu9.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\tAKreBGDuozTwXSZfhU7cFT3.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\3N5jWnvXHqfYUsxTijnW3Uc5.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\4767d2e713f2021e8fe856e3ea638b58[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\H3bqnZf96LFIOlogieo3h5K9.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\i8dOWYOLtbNAxDJGOQ8Wt9el.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Temp\1000080001\alexxxxxxxx.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\v3efLAgS1BVue6uNuzFECLaH.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeFile created: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\5LzADXbR9e1baIzvWufsCa70.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\xF7m0A44x6KodDxbhAtiDsub.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\X53t1QSznpDGsvX2qLbdQFD1.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Osh3JGbyB69u4I6NltayynfD.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\install[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\swiiiii[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\MtYY7PxoMVCDp1NJbYQga2LV.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\jzMGE9Xb2Ny8jtCWlXWAk3ap.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\de4IGlGSbV9c3J4m0qZtBGm8.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\aYtr3HT3BUqjK6QB6WYpwCcm.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\zWIy5Pdf1kgq9YulaqIKrGGy.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\JcuJCrKoIRAAJIb94uRnhVjr.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Z0V3bHdPFsglc9f9uLbxOZFN.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\9SmQs0R4T5RJUISklvcv02zp.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\leqbtljZtxj2WxVvdmpHiNsI.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\ppcQqLgPI8Dyy7YykX33fm5x.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\S41vy8IsPU7Iudry37c4uNtg.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Temp\1000081001\install.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeFile created: C:\Users\user\AppData\Local\Temp\1000236001\4767d2e713f2021e8fe856e3ea638b58.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeFile created: C:\Users\user\AppData\Local\Temp\u6po.2\AsIO.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\u6po.0.exeFile created: C:\ProgramData\freebl3.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\sarra[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile created: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amert[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeFile created: C:\Users\user\AppData\Local\Temp\u6po.2\ATKEX.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\jfesawdr[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\STUD4CnDuvZtXsKBuBkO31id.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeFile created: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\M4OBi0ywNcuUZRFLcfJ70nUH.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\iO9tAKw78L31Wsbvnq5kt5m1.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\8sXk5E4IG9n4ZHu2M9Littnp.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\f2NBhcBIObRGHagt6xPQoMa2.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\gjVUxsTFUgOAjApkeCU52nGD.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeFile created: C:\Users\user\1000021002\ac861238af.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\rVg8HtIzXa4xhJHL7Pn8A6d2.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Bkg8NSHXvizTVBsjT3dzRvci.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\random[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\v6zcDFD3cRDhmr34kNKDn8tX.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\Jr1vIs8XqAmt0RT7bHMte8ts.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\gKIISy7hixfPFGDeeM7cQzit.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\SjGlviky3CjPwV1vWXl2gdhJ.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\D7t23m0X26bEkZqkCQtNwK5Y.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\s8YO7ScTlLADC9Vt6wr10aY4.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\PHoZl3WswCZ1lCRWCJPBFZtN.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\pl49PSFkcWVTQqBe8TA2VhRW.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\alexxxxxxxx[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\Pictures\7iI5SUAnqRGyB1YdSAO06W1v.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\file300un[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile created: C:\Users\user\AppData\Local\Temp\1000077001\jfesawdr.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\gzxs1MlpU5tnMfkC7kzgvR1h.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\5W1aDm1vpFLN4gyrIiISMc4h.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\LIdx8BlqmZTW07MQOtXboF4f.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeFile created: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\KHojJ9v7XtNSHZfW6gAnnH23.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeFile created: C:\ProgramData\MPGPH131\MPGPH131.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\u6po.0.exeFile created: C:\ProgramData\freebl3.dllJump to dropped file

                                Boot Survival

                                barindex
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders Startup
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeKey value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders Startup
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ac861238af.exeJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run d361f35322.exeJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeWindow searched: window name: FilemonClassJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeWindow searched: window name: RegmonClassJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeWindow searched: window name: FilemonClassJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: FilemonClass
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: RegmonClass
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: FilemonClass
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: Regmonclass
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: Filemonclass
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: Regmonclass
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: FilemonClass
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: RegmonClass
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: FilemonClass
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow searched: window name: PROCMON_WINDOW_CLASS
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeFile created: C:\Windows\Tasks\explorta.jobJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run d361f35322.exeJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run d361f35322.exeJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ac861238af.exeJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ac861238af.exeJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RageMP131Jump to behavior

                                Hooking and other Techniques for Hiding and Protection

                                barindex
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\1000021002\ac861238af.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\1000021002\ac861238af.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\1000021002\ac861238af.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOX

                                Malware Analysis System Evasion

                                barindex
                                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 352, type: MEMORYSTR
                                Source: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeKey enumerated: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\SCSI
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeStalling execution: Execution stalls by calling Sleepgraph_9-69613
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeSystem information queried: FirmwareTableInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSystem information queried: FirmwareTableInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeSystem information queried: FirmwareTableInformationJump to behavior
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: FirmwareTableInformation
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile opened: HKEY_CURRENT_USER\Software\Wine
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile opened: HKEY_CURRENT_USER\Software\Wine
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\Wine
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_CURRENT_USER\Software\Wine
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeFile opened: HKEY_CURRENT_USER\Software\Wine
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_CURRENT_USER\Software\Wine
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                                Source: toolspub1.exe, 00000031.00000002.2228738591.0000000001B1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ASWHOOK
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7E22AF second address: 7E22B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7E22B3 second address: 7E22CC instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569C5h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F59D3 second address: 7F59D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F59D9 second address: 7F59E3 instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0D755569B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F5C99 second address: 7F5CA5 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0D7471B5DEh 0x00000008 push eax 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F5CA5 second address: 7F5CC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 pushad 0x0000000a popad 0x0000000b push edi 0x0000000c pop edi 0x0000000d jng 00007F0D755569B6h 0x00000013 popad 0x00000014 pushad 0x00000015 push edi 0x00000016 pop edi 0x00000017 push ebx 0x00000018 pop ebx 0x00000019 push edx 0x0000001a pop edx 0x0000001b popad 0x0000001c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F5CC1 second address: 7F5CC7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F5CC7 second address: 7F5CCD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F5CCD second address: 7F5CD1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F600E second address: 7F602E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0D755569C9h 0x00000009 push ebx 0x0000000a pop ebx 0x0000000b popad 0x0000000c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F602E second address: 7F604A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7471B5E6h 0x00000007 push eax 0x00000008 push edx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F604A second address: 7F6050 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F88DE second address: 7F88FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 mov eax, dword ptr [eax] 0x00000008 jmp 00007F0D7471B5DEh 0x0000000d mov dword ptr [esp+04h], eax 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F88FD second address: 7F8904 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8948 second address: 7F8984 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7471B5E7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a jmp 00007F0D7471B5E2h 0x0000000f push ebx 0x00000010 pop ebx 0x00000011 popad 0x00000012 popad 0x00000013 push eax 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 jng 00007F0D7471B5D6h 0x0000001d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8984 second address: 7F8A29 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jnp 00007F0D755569BCh 0x0000000f jl 00007F0D755569B6h 0x00000015 popad 0x00000016 nop 0x00000017 mov dword ptr [ebp+122D1BDFh], edi 0x0000001d push 00000000h 0x0000001f mov dword ptr [ebp+122D2D87h], ecx 0x00000025 or dl, FFFFFFE3h 0x00000028 push 4B0C8EAEh 0x0000002d jp 00007F0D755569CAh 0x00000033 push ebx 0x00000034 jmp 00007F0D755569C2h 0x00000039 pop ebx 0x0000003a xor dword ptr [esp], 4B0C8E2Eh 0x00000041 and edx, dword ptr [ebp+122D39C7h] 0x00000047 push 00000003h 0x00000049 mov edx, 0FCA41BAh 0x0000004e push 00000000h 0x00000050 mov ecx, dword ptr [ebp+122D3A87h] 0x00000056 push 00000003h 0x00000058 call 00007F0D755569C0h 0x0000005d mov dword ptr [ebp+122D1847h], esi 0x00000063 pop edx 0x00000064 mov dword ptr [ebp+122D3105h], eax 0x0000006a call 00007F0D755569B9h 0x0000006f push eax 0x00000070 push edx 0x00000071 jnc 00007F0D755569BCh 0x00000077 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8A29 second address: 7F8ABB instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7471B5E4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push ebx 0x0000000b pushad 0x0000000c push edx 0x0000000d pop edx 0x0000000e push edi 0x0000000f pop edi 0x00000010 popad 0x00000011 pop ebx 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 jmp 00007F0D7471B5DCh 0x0000001b mov eax, dword ptr [eax] 0x0000001d jng 00007F0D7471B5DCh 0x00000023 mov dword ptr [esp+04h], eax 0x00000027 push ecx 0x00000028 push eax 0x00000029 push edi 0x0000002a pop edi 0x0000002b pop eax 0x0000002c pop ecx 0x0000002d pop eax 0x0000002e call 00007F0D7471B5DDh 0x00000033 jo 00007F0D7471B5DCh 0x00000039 mov dword ptr [ebp+122D3168h], ecx 0x0000003f pop esi 0x00000040 add dword ptr [ebp+122D2F35h], ecx 0x00000046 lea ebx, dword ptr [ebp+1244D822h] 0x0000004c mov edx, 576335DFh 0x00000051 xchg eax, ebx 0x00000052 pushad 0x00000053 push eax 0x00000054 push edx 0x00000055 jmp 00007F0D7471B5E9h 0x0000005a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8B4B second address: 7F8B64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0D755569C4h 0x00000009 popad 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8B64 second address: 7F8BC8 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F0D7471B5ECh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b ja 00007F0D7471B5ECh 0x00000011 nop 0x00000012 sbb edx, 661256BFh 0x00000018 push 00000000h 0x0000001a sub dword ptr [ebp+122D30A3h], esi 0x00000020 call 00007F0D7471B5D9h 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F0D7471B5DDh 0x0000002c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8BC8 second address: 7F8C04 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 jmp 00007F0D755569BAh 0x00000008 pop ebx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jng 00007F0D755569BCh 0x00000013 pop edx 0x00000014 mov eax, dword ptr [esp+04h] 0x00000018 push eax 0x00000019 push edx 0x0000001a jmp 00007F0D755569C7h 0x0000001f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8C04 second address: 7F8C21 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D7471B5E9h 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8C21 second address: 7F8C30 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov eax, dword ptr [eax] 0x0000000a push ebx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8D21 second address: 7F8D25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8D25 second address: 7F8D2B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8D2B second address: 7F8D2F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8DD5 second address: 7F8DDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8DDC second address: 7F8ED5 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F0D7471B5E2h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b jmp 00007F0D7471B5DBh 0x00000010 nop 0x00000011 mov edx, esi 0x00000013 push 00000000h 0x00000015 mov edx, dword ptr [ebp+122D39E7h] 0x0000001b call 00007F0D7471B5D9h 0x00000020 jmp 00007F0D7471B5DDh 0x00000025 push eax 0x00000026 push eax 0x00000027 jmp 00007F0D7471B5DEh 0x0000002c pop eax 0x0000002d mov eax, dword ptr [esp+04h] 0x00000031 pushad 0x00000032 jmp 00007F0D7471B5E2h 0x00000037 jns 00007F0D7471B5DCh 0x0000003d popad 0x0000003e mov eax, dword ptr [eax] 0x00000040 jg 00007F0D7471B5F0h 0x00000046 pushad 0x00000047 jmp 00007F0D7471B5E6h 0x0000004c pushad 0x0000004d popad 0x0000004e popad 0x0000004f mov dword ptr [esp+04h], eax 0x00000053 jnl 00007F0D7471B5E0h 0x00000059 pop eax 0x0000005a mov cx, si 0x0000005d push 00000003h 0x0000005f ja 00007F0D7471B5DCh 0x00000065 mov dword ptr [ebp+122D32CFh], ebx 0x0000006b push 00000000h 0x0000006d mov edi, dword ptr [ebp+122D39D7h] 0x00000073 jmp 00007F0D7471B5DAh 0x00000078 push 00000003h 0x0000007a mov ecx, edx 0x0000007c call 00007F0D7471B5D9h 0x00000081 jng 00007F0D7471B5E4h 0x00000087 push eax 0x00000088 push eax 0x00000089 push edx 0x0000008a push esi 0x0000008b push eax 0x0000008c push edx 0x0000008d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8ED5 second address: 7F8EDA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8EDA second address: 7F8F26 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7471B5E5h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [esp+04h] 0x0000000d push ecx 0x0000000e push eax 0x0000000f pushad 0x00000010 popad 0x00000011 pop eax 0x00000012 pop ecx 0x00000013 mov eax, dword ptr [eax] 0x00000015 push esi 0x00000016 jmp 00007F0D7471B5E8h 0x0000001b pop esi 0x0000001c mov dword ptr [esp+04h], eax 0x00000020 pushad 0x00000021 push ecx 0x00000022 pushad 0x00000023 popad 0x00000024 pop ecx 0x00000025 push eax 0x00000026 push edx 0x00000027 push edx 0x00000028 pop edx 0x00000029 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F8F26 second address: 7F8F5E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569BFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a pop eax 0x0000000b adc cx, 0876h 0x00000010 lea ebx, dword ptr [ebp+1244D836h] 0x00000016 call 00007F0D755569C2h 0x0000001b pop ecx 0x0000001c push eax 0x0000001d push ebx 0x0000001e pushad 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 80B79D second address: 80B7A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 80B7A3 second address: 80B7AB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push edx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 80B7AB second address: 80B7CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 popad 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jno 00007F0D7471B5EBh 0x0000000f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 81793E second address: 817944 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 817944 second address: 81794A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 81794A second address: 817967 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F0D755569C4h 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 817BD8 second address: 817BDC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 817BDC second address: 817C0D instructions: 0x00000000 rdtsc 0x00000002 jnc 00007F0D755569B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F0D755569C7h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0D755569BEh 0x00000016 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 817C0D second address: 817C11 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 817C11 second address: 817C23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F0D755569B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d push ecx 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 817C23 second address: 817C29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 817C29 second address: 817C2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 817EA3 second address: 817EAE instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 push ebx 0x00000008 push ebx 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8183E0 second address: 8183F5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569C1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8183F5 second address: 818407 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop edi 0x00000005 push ecx 0x00000006 pop ecx 0x00000007 je 00007F0D7471B5D6h 0x0000000d popad 0x0000000e push eax 0x0000000f push edx 0x00000010 push edx 0x00000011 pop edx 0x00000012 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 818407 second address: 81843C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569C4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0D755569C9h 0x00000012 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8185BD second address: 8185CF instructions: 0x00000000 rdtsc 0x00000002 ja 00007F0D7471B5D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jc 00007F0D7471B5DEh 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 818723 second address: 818769 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jnc 00007F0D755569C6h 0x0000000b jmp 00007F0D755569C1h 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 pop eax 0x00000014 jmp 00007F0D755569C6h 0x00000019 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 818B26 second address: 818B2A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 818B2A second address: 818B5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push esi 0x00000007 jnl 00007F0D755569B6h 0x0000000d pushad 0x0000000e popad 0x0000000f pop esi 0x00000010 pushad 0x00000011 push edi 0x00000012 pop edi 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007F0D755569C2h 0x0000001a popad 0x0000001b push eax 0x0000001c push edx 0x0000001d pushad 0x0000001e popad 0x0000001f jc 00007F0D755569B6h 0x00000025 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 818B5C second address: 818B60 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 818B60 second address: 818B9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007F0D755569B6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c popad 0x0000000d pushad 0x0000000e jmp 00007F0D755569C3h 0x00000013 push ecx 0x00000014 pushad 0x00000015 popad 0x00000016 jmp 00007F0D755569C0h 0x0000001b pop ecx 0x0000001c push eax 0x0000001d je 00007F0D755569B6h 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 81945F second address: 819466 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop esi 0x00000007 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82026E second address: 820273 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 820273 second address: 820287 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0D7471B5DFh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8213E1 second address: 821402 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 popad 0x0000000a popad 0x0000000b mov eax, dword ptr [eax] 0x0000000d js 00007F0D755569CAh 0x00000013 push eax 0x00000014 push edx 0x00000015 jmp 00007F0D755569BCh 0x0000001a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 821402 second address: 82141E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0D7471B5E0h 0x00000011 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82141E second address: 821424 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 825070 second address: 82507A instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0D7471B5DCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7EF854 second address: 7EF85A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8247BD second address: 8247C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8247C1 second address: 8247CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 js 00007F0D755569B6h 0x0000000d pop edx 0x0000000e rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8247CF second address: 8247E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 pushad 0x00000006 popad 0x00000007 push eax 0x00000008 pop eax 0x00000009 popad 0x0000000a ja 00007F0D7471B5DEh 0x00000010 pushad 0x00000011 popad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 824E7E second address: 824E84 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 824E84 second address: 824EAA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7471B5DCh 0x00000007 js 00007F0D7471B5D6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f jnc 00007F0D7471B5D8h 0x00000015 push eax 0x00000016 push edx 0x00000017 jnp 00007F0D7471B5D6h 0x0000001d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 824EAA second address: 824EAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 824EAE second address: 824EBD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 824EBD second address: 824EC1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 824EC1 second address: 824ECB instructions: 0x00000000 rdtsc 0x00000002 jns 00007F0D7471B5D6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 824ECB second address: 824EEA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0D755569C9h 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 824EEA second address: 824EEF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 824EEF second address: 824F09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0D755569C4h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 824F09 second address: 824F1D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007F0D7471B5DDh 0x0000000c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 827C04 second address: 827C1A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 js 00007F0D755569D4h 0x0000000e push eax 0x0000000f push edx 0x00000010 jne 00007F0D755569B6h 0x00000016 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 827D01 second address: 827D05 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 827D05 second address: 827D09 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 827D09 second address: 827D0F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 828B11 second address: 828B15 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 828B15 second address: 828B23 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop ebx 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 828B23 second address: 828B27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 828B27 second address: 828B3B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7471B5E0h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 828D3F second address: 828D46 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 828D46 second address: 828D67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b pushad 0x0000000c popad 0x0000000d jmp 00007F0D7471B5E3h 0x00000012 popad 0x00000013 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 828D67 second address: 828D6D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 828D6D second address: 828D71 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 829537 second address: 82953E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 829EFE second address: 829F02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 829D71 second address: 829D77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push edx 0x00000005 pop edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82BAAA second address: 82BAAE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82A78D second address: 82A793 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82B85A second address: 82B875 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7471B5E7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82B875 second address: 82B87B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82C491 second address: 82C49B instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0D7471B5D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82C49B second address: 82C4CF instructions: 0x00000000 rdtsc 0x00000002 je 00007F0D755569C2h 0x00000008 jmp 00007F0D755569BCh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edi 0x00000011 pushad 0x00000012 jmp 00007F0D755569C9h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82C4CF second address: 82C568 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edi 0x00000006 nop 0x00000007 push 00000000h 0x00000009 push esi 0x0000000a call 00007F0D7471B5D8h 0x0000000f pop esi 0x00000010 mov dword ptr [esp+04h], esi 0x00000014 add dword ptr [esp+04h], 0000001Bh 0x0000001c inc esi 0x0000001d push esi 0x0000001e ret 0x0000001f pop esi 0x00000020 ret 0x00000021 sbb esi, 3B6CAB57h 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push ebx 0x0000002c call 00007F0D7471B5D8h 0x00000031 pop ebx 0x00000032 mov dword ptr [esp+04h], ebx 0x00000036 add dword ptr [esp+04h], 0000001Bh 0x0000003e inc ebx 0x0000003f push ebx 0x00000040 ret 0x00000041 pop ebx 0x00000042 ret 0x00000043 jno 00007F0D7471B5EAh 0x00000049 push 00000000h 0x0000004b je 00007F0D7471B5DCh 0x00000051 mov edi, dword ptr [ebp+122D39ABh] 0x00000057 jng 00007F0D7471B5DCh 0x0000005d and edi, 260D0A92h 0x00000063 xchg eax, ebx 0x00000064 push eax 0x00000065 push edx 0x00000066 jmp 00007F0D7471B5DDh 0x0000006b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82C568 second address: 82C577 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e pop eax 0x0000000f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82CF59 second address: 82CF5F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82D9E3 second address: 82D9EA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82D9EA second address: 82DA08 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edi 0x00000009 pushad 0x0000000a jmp 00007F0D7471B5E2h 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82E222 second address: 82E23E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0D755569C4h 0x0000000d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82E23E second address: 82E248 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jc 00007F0D7471B5D6h 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82EDD7 second address: 82EDDB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82EDDB second address: 82EDFD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edi 0x00000007 push eax 0x00000008 ja 00007F0D7471B5F0h 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0D7471B5E2h 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 830BF9 second address: 830BFE instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83134A second address: 83136F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7471B5E7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edi 0x0000000b push eax 0x0000000c push edx 0x0000000d jne 00007F0D7471B5D6h 0x00000013 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83136F second address: 831373 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8358F1 second address: 8358F8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ecx 0x00000004 pop ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8358F8 second address: 83591A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0D755569C4h 0x00000009 popad 0x0000000a pushad 0x0000000b jbe 00007F0D755569B6h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 836FB4 second address: 836FCA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 jns 00007F0D7471B5D6h 0x0000000f jne 00007F0D7471B5D6h 0x00000015 popad 0x00000016 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 838F8F second address: 838F95 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 838F95 second address: 838F9F instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0D7471B5DCh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8380BC second address: 8380C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8380C0 second address: 8380C6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 839F55 second address: 839F59 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8391AF second address: 8391B3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 7F135A second address: 7F1368 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F0D755569B6h 0x0000000a push edx 0x0000000b pop edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83A159 second address: 83A15D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83A15D second address: 83A178 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0D755569C3h 0x0000000d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83C561 second address: 83C56B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jp 00007F0D7471B5D6h 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83C6EE second address: 83C71B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569BCh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jbe 00007F0D755569CAh 0x00000012 jmp 00007F0D755569C4h 0x00000017 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83E631 second address: 83E649 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F0D7471B5DEh 0x0000000f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83E649 second address: 83E64D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83E64D second address: 83E660 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0D7471B5DBh 0x0000000d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83E7CB second address: 83E7CF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83F6F4 second address: 83F75E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 popad 0x00000006 push eax 0x00000007 push ebx 0x00000008 push ebx 0x00000009 pushad 0x0000000a popad 0x0000000b pop ebx 0x0000000c pop ebx 0x0000000d nop 0x0000000e push dword ptr fs:[00000000h] 0x00000015 push 00000000h 0x00000017 push eax 0x00000018 call 00007F0D7471B5D8h 0x0000001d pop eax 0x0000001e mov dword ptr [esp+04h], eax 0x00000022 add dword ptr [esp+04h], 0000001Dh 0x0000002a inc eax 0x0000002b push eax 0x0000002c ret 0x0000002d pop eax 0x0000002e ret 0x0000002f push esi 0x00000030 add dword ptr [ebp+124492C8h], esi 0x00000036 pop ebx 0x00000037 mov dword ptr fs:[00000000h], esp 0x0000003e adc edi, 1E84177Bh 0x00000044 mov eax, dword ptr [ebp+122D0745h] 0x0000004a clc 0x0000004b push FFFFFFFFh 0x0000004d mov bx, 16F6h 0x00000051 push eax 0x00000052 push eax 0x00000053 push edx 0x00000054 jmp 00007F0D7471B5DBh 0x00000059 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83F75E second address: 83F764 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 842591 second address: 842597 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 83D724 second address: 83D728 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 842597 second address: 8425F0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b push 00000000h 0x0000000d push ebp 0x0000000e call 00007F0D7471B5D8h 0x00000013 pop ebp 0x00000014 mov dword ptr [esp+04h], ebp 0x00000018 add dword ptr [esp+04h], 00000015h 0x00000020 inc ebp 0x00000021 push ebp 0x00000022 ret 0x00000023 pop ebp 0x00000024 ret 0x00000025 push 00000000h 0x00000027 push 00000000h 0x00000029 push esi 0x0000002a call 00007F0D7471B5D8h 0x0000002f pop esi 0x00000030 mov dword ptr [esp+04h], esi 0x00000034 add dword ptr [esp+04h], 00000014h 0x0000003c inc esi 0x0000003d push esi 0x0000003e ret 0x0000003f pop esi 0x00000040 ret 0x00000041 mov ebx, 746D7CF6h 0x00000046 push 00000000h 0x00000048 mov edi, dword ptr [ebp+1244E01Ch] 0x0000004e xchg eax, esi 0x0000004f push ecx 0x00000050 push eax 0x00000051 push edx 0x00000052 pushad 0x00000053 popad 0x00000054 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 841812 second address: 841817 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 841817 second address: 841821 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 js 00007F0D7471B5D6h 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 841821 second address: 841825 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8427C7 second address: 8427EF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F0D7471B5E4h 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jbe 00007F0D7471B5DCh 0x00000014 jnl 00007F0D7471B5D6h 0x0000001a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8427EF second address: 8427F6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 84386F second address: 843873 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 84A4DC second address: 84A4E0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 84D3AD second address: 84D3C1 instructions: 0x00000000 rdtsc 0x00000002 js 00007F0D7471B5D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a jmp 00007F0D7471B5DAh 0x0000000f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 84D6D3 second address: 84D6E5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569BEh 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 84D858 second address: 84D85C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 84D85C second address: 84D87C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007F0D755569BCh 0x0000000d jmp 00007F0D755569BCh 0x00000012 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 84D87C second address: 84D880 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 810B05 second address: 810B27 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0D755569BDh 0x00000009 pop ebx 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d pushad 0x0000000e popad 0x0000000f je 00007F0D755569B6h 0x00000015 pop eax 0x00000016 push edi 0x00000017 pushad 0x00000018 popad 0x00000019 pop edi 0x0000001a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8569B9 second address: 8569BF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8569BF second address: 8569C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 js 00007F0D755569B6h 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85764E second address: 85766A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 pushad 0x00000006 popad 0x00000007 jmp 00007F0D7471B5E3h 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85CFA4 second address: 85CFAF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jns 00007F0D755569B6h 0x0000000a popad 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D110 second address: 85D12E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7471B5E3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D12E second address: 85D132 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D256 second address: 85D25C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D25C second address: 85D260 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D260 second address: 85D26B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D26B second address: 85D271 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D271 second address: 85D286 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 push esi 0x0000000a pushad 0x0000000b popad 0x0000000c pop esi 0x0000000d push eax 0x0000000e push edx 0x0000000f jnc 00007F0D7471B5D6h 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D286 second address: 85D290 instructions: 0x00000000 rdtsc 0x00000002 jng 00007F0D755569B6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D290 second address: 85D2A0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f popad 0x00000010 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D2A0 second address: 85D2A6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D3C7 second address: 85D3CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D3CD second address: 85D3D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 85D3D7 second address: 85D3DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 811628 second address: 81164F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569BFh 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a popad 0x0000000b jmp 00007F0D755569C2h 0x00000010 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8618AC second address: 8618B6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pushad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8265AD second address: 8265B1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8265B1 second address: 810B27 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7471B5DAh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop esi 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push eax 0x0000000e call 00007F0D7471B5D8h 0x00000013 pop eax 0x00000014 mov dword ptr [esp+04h], eax 0x00000018 add dword ptr [esp+04h], 00000015h 0x00000020 inc eax 0x00000021 push eax 0x00000022 ret 0x00000023 pop eax 0x00000024 ret 0x00000025 xor dx, 0FCDh 0x0000002a call 00007F0D7471B5DDh 0x0000002f sub dword ptr [ebp+122D1BECh], eax 0x00000035 pop edx 0x00000036 call dword ptr [ebp+122D27D7h] 0x0000003c jnl 00007F0D7471B5EBh 0x00000042 push eax 0x00000043 push edx 0x00000044 push eax 0x00000045 pushad 0x00000046 popad 0x00000047 je 00007F0D7471B5D6h 0x0000004d pop eax 0x0000004e push edi 0x0000004f pushad 0x00000050 popad 0x00000051 pop edi 0x00000052 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82668A second address: 82668E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 826A6E second address: 826A78 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F0D7471B5D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 826A78 second address: 826A7E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 826A7E second address: 826A82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 826B78 second address: 826B7C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 826F7B second address: 826F80 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 826F80 second address: 826F96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jmp 00007F0D755569BCh 0x0000000f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 827078 second address: 8270D5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jg 00007F0D7471B5D6h 0x00000009 push ecx 0x0000000a pop ecx 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e nop 0x0000000f jg 00007F0D7471B5DCh 0x00000015 push 00000004h 0x00000017 push 00000000h 0x00000019 push ebp 0x0000001a call 00007F0D7471B5D8h 0x0000001f pop ebp 0x00000020 mov dword ptr [esp+04h], ebp 0x00000024 add dword ptr [esp+04h], 00000019h 0x0000002c inc ebp 0x0000002d push ebp 0x0000002e ret 0x0000002f pop ebp 0x00000030 ret 0x00000031 jmp 00007F0D7471B5E4h 0x00000036 mov edx, dword ptr [ebp+122D3C7Bh] 0x0000003c push eax 0x0000003d push edi 0x0000003e push edi 0x0000003f push eax 0x00000040 push edx 0x00000041 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82744A second address: 82745C instructions: 0x00000000 rdtsc 0x00000002 jnl 00007F0D755569B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e pushad 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82777C second address: 82779C instructions: 0x00000000 rdtsc 0x00000002 jns 00007F0D7471B5DCh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov eax, dword ptr [esp+04h] 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0D7471B5DAh 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82779C second address: 8277A1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8277A1 second address: 8277A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82785F second address: 827919 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F0D755569BEh 0x0000000a popad 0x0000000b push eax 0x0000000c jnc 00007F0D755569D8h 0x00000012 nop 0x00000013 push 00000000h 0x00000015 push edx 0x00000016 call 00007F0D755569B8h 0x0000001b pop edx 0x0000001c mov dword ptr [esp+04h], edx 0x00000020 add dword ptr [esp+04h], 0000001Bh 0x00000028 inc edx 0x00000029 push edx 0x0000002a ret 0x0000002b pop edx 0x0000002c ret 0x0000002d jmp 00007F0D755569C8h 0x00000032 mov cx, 4B59h 0x00000036 lea eax, dword ptr [ebp+1247B356h] 0x0000003c jmp 00007F0D755569C8h 0x00000041 sub ecx, dword ptr [ebp+122D28AEh] 0x00000047 nop 0x00000048 jmp 00007F0D755569BEh 0x0000004d push eax 0x0000004e jp 00007F0D755569BEh 0x00000054 push eax 0x00000055 push eax 0x00000056 push edx 0x00000057 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 827919 second address: 827962 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 nop 0x00000006 push 00000000h 0x00000008 push ebx 0x00000009 call 00007F0D7471B5D8h 0x0000000e pop ebx 0x0000000f mov dword ptr [esp+04h], ebx 0x00000013 add dword ptr [esp+04h], 0000001Ch 0x0000001b inc ebx 0x0000001c push ebx 0x0000001d ret 0x0000001e pop ebx 0x0000001f ret 0x00000020 jmp 00007F0D7471B5DCh 0x00000025 lea eax, dword ptr [ebp+1247B312h] 0x0000002b movsx ecx, ax 0x0000002e push eax 0x0000002f pushad 0x00000030 push eax 0x00000031 push edx 0x00000032 jno 00007F0D7471B5D6h 0x00000038 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 827962 second address: 827966 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 827966 second address: 82796F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82796F second address: 827975 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 827975 second address: 811628 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 mov dword ptr [esp], eax 0x00000009 mov edi, dword ptr [ebp+122D3B47h] 0x0000000f mov edx, ebx 0x00000011 call dword ptr [ebp+122D59A4h] 0x00000017 push eax 0x00000018 push edx 0x00000019 push ebx 0x0000001a push ebx 0x0000001b pop ebx 0x0000001c jmp 00007F0D7471B5DCh 0x00000021 pop ebx 0x00000022 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 861DD8 second address: 861DDC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8620AE second address: 8620C6 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 jmp 00007F0D7471B5DEh 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e pop ecx 0x0000000f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8620C6 second address: 8620CC instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8620CC second address: 8620E6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0D7471B5E6h 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8620E6 second address: 8620EC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 86B312 second address: 86B338 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007F0D7471B5E6h 0x00000008 push edx 0x00000009 pop edx 0x0000000a pop edx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f jl 00007F0D7471B5D6h 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 86A181 second address: 86A186 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 86A2D3 second address: 86A2F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0D7471B5E9h 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 86A2F0 second address: 86A310 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push edx 0x0000000a jmp 00007F0D755569C5h 0x0000000f pop edx 0x00000010 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 86A310 second address: 86A316 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 86A450 second address: 86A458 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 86A458 second address: 86A46D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jg 00007F0D7471B5D6h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d ja 00007F0D7471B5D6h 0x00000013 push ebx 0x00000014 pop ebx 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 86A46D second address: 86A47F instructions: 0x00000000 rdtsc 0x00000002 je 00007F0D755569B6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jg 00007F0D755569B6h 0x00000012 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 86A47F second address: 86A485 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 86AB30 second address: 86AB36 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 871264 second address: 8712B0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 popad 0x00000007 pushad 0x00000008 push edi 0x00000009 pop edi 0x0000000a jmp 00007F0D7471B5DFh 0x0000000f jmp 00007F0D7471B5E4h 0x00000014 jmp 00007F0D7471B5E3h 0x00000019 popad 0x0000001a jnp 00007F0D7471B610h 0x00000020 pushad 0x00000021 push edx 0x00000022 pop edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 874421 second address: 874425 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 874425 second address: 87443F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnl 00007F0D75558556h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d jnl 00007F0D75558556h 0x00000013 ja 00007F0D75558556h 0x00000019 popad 0x0000001a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 87443F second address: 874453 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 je 00007F0D755569D6h 0x00000009 jbe 00007F0D755569D6h 0x0000000f pop ebx 0x00000010 push eax 0x00000011 push edx 0x00000012 push esi 0x00000013 pop esi 0x00000014 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 874453 second address: 874457 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 874457 second address: 87445D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 87445D second address: 874469 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 873CC7 second address: 873CE6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E8h 0x00000007 push esi 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 87955F second address: 879575 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 ja 00007F0D75558556h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push edx 0x0000000f pop edx 0x00000010 js 00007F0D75558556h 0x00000016 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879575 second address: 879579 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879579 second address: 879581 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879581 second address: 87958B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jnp 00007F0D755569D6h 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 87958B second address: 879595 instructions: 0x00000000 rdtsc 0x00000002 jno 00007F0D75558556h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879595 second address: 8795E1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jno 00007F0D755569D8h 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f jnp 00007F0D755569DEh 0x00000015 pushad 0x00000016 popad 0x00000017 je 00007F0D755569D6h 0x0000001d jc 00007F0D755569DAh 0x00000023 push edx 0x00000024 pop edx 0x00000025 push ebx 0x00000026 pop ebx 0x00000027 jmp 00007F0D755569E5h 0x0000002c push eax 0x0000002d push edx 0x0000002e jmp 00007F0D755569DCh 0x00000033 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879A18 second address: 879A20 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879A20 second address: 879A24 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879A24 second address: 879A3A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 jp 00007F0D75558556h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jne 00007F0D75558556h 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879A3A second address: 879A3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879A3E second address: 879A42 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879A42 second address: 879A48 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879A48 second address: 879A64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a jnp 00007F0D75558562h 0x00000010 jnl 00007F0D75558556h 0x00000016 jc 00007F0D75558556h 0x0000001c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879D2F second address: 879D8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0D755569DFh 0x00000009 popad 0x0000000a push edi 0x0000000b jmp 00007F0D755569E6h 0x00000010 jmp 00007F0D755569E7h 0x00000015 pop edi 0x00000016 jmp 00007F0D755569E7h 0x0000001b push eax 0x0000001c push edx 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879D8D second address: 879D93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 827285 second address: 827293 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D755569DAh 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 827293 second address: 82731B instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp], eax 0x0000000b jmp 00007F0D75558567h 0x00000010 mov ebx, dword ptr [ebp+1247B351h] 0x00000016 xor dword ptr [ebp+122D28F8h], edi 0x0000001c add eax, ebx 0x0000001e mov dword ptr [ebp+122D295Eh], ebx 0x00000024 sub edx, 57973125h 0x0000002a nop 0x0000002b pushad 0x0000002c push edi 0x0000002d push eax 0x0000002e pop eax 0x0000002f pop edi 0x00000030 push ebx 0x00000031 push edi 0x00000032 pop edi 0x00000033 pop ebx 0x00000034 popad 0x00000035 push eax 0x00000036 jbe 00007F0D7555855Ah 0x0000003c nop 0x0000003d or ecx, 5FFEA9EBh 0x00000043 push 00000004h 0x00000045 push 00000000h 0x00000047 push edi 0x00000048 call 00007F0D75558558h 0x0000004d pop edi 0x0000004e mov dword ptr [esp+04h], edi 0x00000052 add dword ptr [esp+04h], 00000015h 0x0000005a inc edi 0x0000005b push edi 0x0000005c ret 0x0000005d pop edi 0x0000005e ret 0x0000005f push eax 0x00000060 push eax 0x00000061 push edx 0x00000062 push eax 0x00000063 push edx 0x00000064 jmp 00007F0D7555855Bh 0x00000069 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82731B second address: 827325 instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0D755569D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 879F01 second address: 879F3E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0D75558565h 0x00000009 pop edi 0x0000000a push esi 0x0000000b jnp 00007F0D75558556h 0x00000011 jmp 00007F0D75558568h 0x00000016 pop esi 0x00000017 push eax 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 87A0AF second address: 87A0B4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 87D858 second address: 87D85E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8810BB second address: 8810C1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8811EF second address: 8811FD instructions: 0x00000000 rdtsc 0x00000002 jo 00007F0D75558556h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8811FD second address: 881207 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0D755569D6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8814BF second address: 8814C5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 889CE1 second address: 889CFE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F0D755569DDh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e popad 0x0000000f jne 00007F0D755569D6h 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 889CFE second address: 889D02 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 889D02 second address: 889D17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 jng 00007F0D755569DCh 0x0000000f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 889D17 second address: 889D31 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0D75558565h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 887F61 second address: 887F69 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8888FA second address: 8888FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8888FE second address: 888902 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 888902 second address: 888921 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0D75558569h 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 888BDC second address: 888BE0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 888E55 second address: 888E5B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 888E5B second address: 888E79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007F0D755569E7h 0x0000000c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 888E79 second address: 888E8B instructions: 0x00000000 rdtsc 0x00000002 jp 00007F0D7555855Ch 0x00000008 jno 00007F0D75558556h 0x0000000e push eax 0x0000000f push edx 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 888E8B second address: 888E8F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 888E8F second address: 888E95 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 889A1D second address: 889A29 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jl 00007F0D755569D6h 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8932C9 second address: 8932D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 push ebx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8932D3 second address: 8932F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jnp 00007F0D755569D8h 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jmp 00007F0D755569E1h 0x00000014 pushad 0x00000015 popad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8932F9 second address: 8932FE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89245E second address: 892462 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 892753 second address: 89275E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007F0D75558556h 0x0000000a popad 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89275E second address: 89277C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E9h 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89277C second address: 892788 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 push edx 0x00000009 pushad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 892788 second address: 89278E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89278E second address: 892796 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 892796 second address: 89279B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8928EB second address: 8928F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop edi 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8928F8 second address: 892917 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007F0D755569E2h 0x0000000b pushad 0x0000000c push ebx 0x0000000d pop ebx 0x0000000e push esi 0x0000000f pop esi 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 892D69 second address: 892D6F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 892D6F second address: 892D8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0D755569E8h 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 892EB9 second address: 892EBD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 899D45 second address: 899D49 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89A2C1 second address: 89A2C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89A43F second address: 89A44F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007F0D755569DAh 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89A44F second address: 89A46F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0D75558569h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89A7A5 second address: 89A7D1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569DBh 0x00000007 push eax 0x00000008 push edi 0x00000009 pop edi 0x0000000a pop eax 0x0000000b pop edx 0x0000000c pop eax 0x0000000d pushad 0x0000000e jmp 00007F0D755569E5h 0x00000013 push eax 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89AB77 second address: 89AB7F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89AB7F second address: 89AB93 instructions: 0x00000000 rdtsc 0x00000002 jc 00007F0D755569D6h 0x00000008 je 00007F0D755569D6h 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89AB93 second address: 89AB97 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89AB97 second address: 89ABB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007F0D755569D6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 je 00007F0D755569DAh 0x00000016 pushad 0x00000017 popad 0x00000018 pushad 0x00000019 popad 0x0000001a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89ABB1 second address: 89ABB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89B2B4 second address: 89B2BB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89B2BB second address: 89B2D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edx 0x00000005 pop edx 0x00000006 ja 00007F0D75558556h 0x0000000c popad 0x0000000d pop eax 0x0000000e push ecx 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0D7555855Bh 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89B2D9 second address: 89B2DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 89987E second address: 899894 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jmp 00007F0D7555855Dh 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 899894 second address: 8998CE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E6h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0D755569E9h 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8998CE second address: 8998D2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8998D2 second address: 8998DA instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8998DA second address: 8998E2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8998E2 second address: 8998E6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8998E6 second address: 8998F2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8998F2 second address: 899906 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007F0D755569E0h 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 899906 second address: 89990A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8A31CF second address: 8A31F9 instructions: 0x00000000 rdtsc 0x00000002 jne 00007F0D755569D6h 0x00000008 jmp 00007F0D755569E6h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pushad 0x00000010 pushad 0x00000011 jns 00007F0D755569D6h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8B0344 second address: 8B0352 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 jp 00007F0D75558556h 0x0000000e rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8B3B05 second address: 8B3B09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8B3B09 second address: 8B3B0D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8B34B0 second address: 8B34B5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8B364D second address: 8B3654 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8B3654 second address: 8B3667 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D755569DFh 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8B3667 second address: 8B366B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8B366B second address: 8B3674 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8B5B53 second address: 8B5B59 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8B5843 second address: 8B5847 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8B5847 second address: 8B584D instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CCFB1 second address: 8CCFB5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CCFB5 second address: 8CCFD5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jnp 00007F0D7555856Ah 0x0000000c jns 00007F0D75558556h 0x00000012 jmp 00007F0D7555855Eh 0x00000017 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CD119 second address: 8CD11F instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CD268 second address: 8CD26E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CD26E second address: 8CD272 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CD272 second address: 8CD27E instructions: 0x00000000 rdtsc 0x00000002 jbe 00007F0D75558556h 0x00000008 pushad 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CD27E second address: 8CD289 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jnp 00007F0D755569D6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CD64C second address: 8CD651 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CD651 second address: 8CD657 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CD657 second address: 8CD682 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 jmp 00007F0D7555855Ah 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0D75558565h 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CD682 second address: 8CD68D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007F0D755569D6h 0x0000000a pop edx 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8CD95E second address: 8CD962 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8D13AA second address: 8D13B1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8E4086 second address: 8E40C0 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnp 00007F0D75558556h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 jl 00007F0D75558556h 0x00000016 jp 00007F0D75558556h 0x0000001c push eax 0x0000001d pop eax 0x0000001e popad 0x0000001f pushad 0x00000020 jc 00007F0D75558556h 0x00000026 push edx 0x00000027 pop edx 0x00000028 jmp 00007F0D75558561h 0x0000002d popad 0x0000002e rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8E40C0 second address: 8E40DD instructions: 0x00000000 rdtsc 0x00000002 jnp 00007F0D755569E8h 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8E3E76 second address: 8E3E9A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 pop edi 0x00000006 pop esi 0x00000007 push eax 0x00000008 push edx 0x00000009 jmp 00007F0D75558569h 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8E3E9A second address: 8E3E9E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8E3E9E second address: 8E3EC7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007F0D75558569h 0x0000000d popad 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 push edx 0x00000012 pop edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8E3EC7 second address: 8E3ECB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8E3ECB second address: 8E3ECF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8E1412 second address: 8E1421 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 jng 00007F0D755569D6h 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8F1350 second address: 8F1354 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8F1354 second address: 8F135A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8F135A second address: 8F137D instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7555855Fh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pushad 0x0000000a pushad 0x0000000b jnp 00007F0D75558556h 0x00000011 js 00007F0D75558556h 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8F137D second address: 8F1387 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 push ebx 0x00000006 pushad 0x00000007 popad 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8F0EAC second address: 8F0EC8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0D75558567h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8F0EC8 second address: 8F0ECE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8F0ECE second address: 8F0F00 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jne 00007F0D75558558h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 ja 00007F0D7555856Ch 0x00000016 push eax 0x00000017 push edx 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8F0F00 second address: 8F0F04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 8F1084 second address: 8F108C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 90B9E5 second address: 90BA0E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 popad 0x00000007 pop esi 0x00000008 push eax 0x00000009 push edx 0x0000000a jg 00007F0D755569EFh 0x00000010 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 90BA0E second address: 90BA18 instructions: 0x00000000 rdtsc 0x00000002 js 00007F0D7555855Eh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 90BB68 second address: 90BB6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 90BB6E second address: 90BB74 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 90BE47 second address: 90BE4B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 90C28F second address: 90C2E6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558564h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007F0D75558566h 0x0000000e jbe 00007F0D7555855Ch 0x00000014 push eax 0x00000015 push edx 0x00000016 jmp 00007F0D75558569h 0x0000001b pushad 0x0000001c popad 0x0000001d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 90C494 second address: 90C498 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 910C76 second address: 910C8D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D75558563h 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 910F96 second address: 91102B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E7h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 popad 0x0000000a mov dword ptr [esp], eax 0x0000000d jmp 00007F0D755569E2h 0x00000012 push dword ptr [ebp+122D29ACh] 0x00000018 xor dword ptr [ebp+122D29A6h], edx 0x0000001e call 00007F0D755569D9h 0x00000023 jnc 00007F0D755569E5h 0x00000029 push eax 0x0000002a jng 00007F0D755569E9h 0x00000030 jmp 00007F0D755569E3h 0x00000035 mov eax, dword ptr [esp+04h] 0x00000039 jnc 00007F0D755569E2h 0x0000003f mov eax, dword ptr [eax] 0x00000041 push eax 0x00000042 push edx 0x00000043 pushad 0x00000044 push edx 0x00000045 pop edx 0x00000046 push eax 0x00000047 pop eax 0x00000048 popad 0x00000049 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 91102B second address: 911040 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 jnp 00007F0D75558556h 0x00000009 pop esi 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 913E43 second address: 913E53 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 jng 00007F0D755569D6h 0x0000000f pop edx 0x00000010 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 913E53 second address: 913E73 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0D7555855Ch 0x00000008 pushad 0x00000009 popad 0x0000000a push esi 0x0000000b pop esi 0x0000000c pushad 0x0000000d popad 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 je 00007F0D75558556h 0x00000019 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 913E73 second address: 913E77 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 9139BD second address: 9139C8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push edi 0x00000005 push eax 0x00000006 push edx 0x00000007 pushad 0x00000008 popad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 9139C8 second address: 9139CC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FD0021 second address: 4FD0026 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FD0026 second address: 4FD002C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FD002C second address: 4FD0030 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FD0030 second address: 4FD0054 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569DEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d movsx ebx, cx 0x00000010 mov ch, 59h 0x00000012 popad 0x00000013 xchg eax, ebp 0x00000014 push eax 0x00000015 push edx 0x00000016 pushad 0x00000017 pushad 0x00000018 popad 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FD0054 second address: 4FD0059 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FD0059 second address: 4FD0089 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0D755569E5h 0x00000012 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0DA1 second address: 4FB0DB6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D75558561h 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0DB6 second address: 4FB0DDD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0D755569DDh 0x00000013 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0DDD second address: 4FB0E6D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0D75558567h 0x00000009 sub si, 7DAEh 0x0000000e jmp 00007F0D75558569h 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 push eax 0x00000018 pushad 0x00000019 push esi 0x0000001a pushad 0x0000001b popad 0x0000001c pop edx 0x0000001d call 00007F0D75558564h 0x00000022 pushfd 0x00000023 jmp 00007F0D75558562h 0x00000028 and al, FFFFFF88h 0x0000002b jmp 00007F0D7555855Bh 0x00000030 popfd 0x00000031 pop ecx 0x00000032 popad 0x00000033 xchg eax, ebp 0x00000034 push eax 0x00000035 push edx 0x00000036 jmp 00007F0D75558562h 0x0000003b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0E6D second address: 4FB0E9A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0D755569DCh 0x00000009 xor eax, 06CD4718h 0x0000000f jmp 00007F0D755569DBh 0x00000014 popfd 0x00000015 popad 0x00000016 pop edx 0x00000017 pop eax 0x00000018 mov ebp, esp 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e pushad 0x0000001f popad 0x00000020 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0E9A second address: 4FB0E9E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0E9E second address: 4FB0EA4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0EA4 second address: 4FB0EA9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 500000E second address: 50000E3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0D755569E1h 0x00000009 add ecx, 57196D96h 0x0000000f jmp 00007F0D755569E1h 0x00000014 popfd 0x00000015 pushad 0x00000016 popad 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebp 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F0D755569DAh 0x00000022 add eax, 2A93D5B8h 0x00000028 jmp 00007F0D755569DBh 0x0000002d popfd 0x0000002e pushfd 0x0000002f jmp 00007F0D755569E8h 0x00000034 and si, 9018h 0x00000039 jmp 00007F0D755569DBh 0x0000003e popfd 0x0000003f popad 0x00000040 push eax 0x00000041 jmp 00007F0D755569E9h 0x00000046 xchg eax, ebp 0x00000047 pushad 0x00000048 movzx ecx, di 0x0000004b pushfd 0x0000004c jmp 00007F0D755569E9h 0x00000051 sbb cx, 9316h 0x00000056 jmp 00007F0D755569E1h 0x0000005b popfd 0x0000005c popad 0x0000005d mov ebp, esp 0x0000005f push eax 0x00000060 push edx 0x00000061 push eax 0x00000062 push edx 0x00000063 push eax 0x00000064 push edx 0x00000065 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 50000E3 second address: 50000E7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 50000E7 second address: 50000EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 50000EB second address: 50000F1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F9014F second address: 4F90154 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90154 second address: 4F901BD instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558567h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a jmp 00007F0D75558566h 0x0000000f push eax 0x00000010 pushad 0x00000011 mov ebx, 75369F14h 0x00000016 pushfd 0x00000017 jmp 00007F0D7555855Dh 0x0000001c jmp 00007F0D7555855Bh 0x00000021 popfd 0x00000022 popad 0x00000023 xchg eax, ebp 0x00000024 push eax 0x00000025 push edx 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007F0D75558560h 0x0000002d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F901BD second address: 4F901C1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F901C1 second address: 4F901C7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0B78 second address: 4FB0BD6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b mov ch, dl 0x0000000d mov edx, esi 0x0000000f popad 0x00000010 xchg eax, ebp 0x00000011 jmp 00007F0D755569E2h 0x00000016 mov ebp, esp 0x00000018 push eax 0x00000019 push edx 0x0000001a pushad 0x0000001b pushfd 0x0000001c jmp 00007F0D755569DDh 0x00000021 xor cx, 9536h 0x00000026 jmp 00007F0D755569E1h 0x0000002b popfd 0x0000002c mov cx, 9127h 0x00000030 popad 0x00000031 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB07A9 second address: 4FB07AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB07AD second address: 4FB07F5 instructions: 0x00000000 rdtsc 0x00000002 mov ah, 4Ch 0x00000004 pop edx 0x00000005 pop eax 0x00000006 call 00007F0D755569DFh 0x0000000b mov si, AD5Fh 0x0000000f pop eax 0x00000010 popad 0x00000011 push eax 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F0D755569E0h 0x00000019 adc ecx, 0DF9DDC8h 0x0000001f jmp 00007F0D755569DBh 0x00000024 popfd 0x00000025 pushad 0x00000026 mov ecx, 3E933555h 0x0000002b push eax 0x0000002c push edx 0x0000002d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB07F5 second address: 4FB080B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 popad 0x00000006 xchg eax, ebp 0x00000007 pushad 0x00000008 mov cl, 37h 0x0000000a movsx edi, cx 0x0000000d popad 0x0000000e mov ebp, esp 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB080B second address: 4FB080F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB080F second address: 4FB0813 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0813 second address: 4FB0819 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB06F7 second address: 4FB0757 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007F0D75558563h 0x00000009 mov edi, eax 0x0000000b pop ecx 0x0000000c popad 0x0000000d xchg eax, ebp 0x0000000e pushad 0x0000000f mov esi, edx 0x00000011 push edx 0x00000012 pushad 0x00000013 popad 0x00000014 pop ecx 0x00000015 popad 0x00000016 mov ebp, esp 0x00000018 pushad 0x00000019 movsx ebx, cx 0x0000001c pushad 0x0000001d mov ecx, 1FA6E7A9h 0x00000022 pushfd 0x00000023 jmp 00007F0D75558566h 0x00000028 xor ax, BF78h 0x0000002d jmp 00007F0D7555855Bh 0x00000032 popfd 0x00000033 popad 0x00000034 popad 0x00000035 pop ebp 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 push eax 0x0000003a push edx 0x0000003b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0757 second address: 4FB075F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov si, di 0x00000007 popad 0x00000008 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0503 second address: 4FB0509 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0509 second address: 4FB050D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB050D second address: 4FB053E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558563h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0D75558565h 0x00000013 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FC01F1 second address: 4FC01F7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FC01F7 second address: 4FC01FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FC01FD second address: 4FC025F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c jmp 00007F0D755569E0h 0x00000011 push eax 0x00000012 pushad 0x00000013 pushfd 0x00000014 jmp 00007F0D755569E1h 0x00000019 and eax, 63D39056h 0x0000001f jmp 00007F0D755569E1h 0x00000024 popfd 0x00000025 push eax 0x00000026 push edx 0x00000027 mov ecx, 6AB4CB1Dh 0x0000002c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF0F14 second address: 4FF0F73 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558561h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, ebp 0x0000000a pushad 0x0000000b push eax 0x0000000c jmp 00007F0D75558563h 0x00000011 pop eax 0x00000012 jmp 00007F0D75558569h 0x00000017 popad 0x00000018 push eax 0x00000019 jmp 00007F0D75558561h 0x0000001e xchg eax, ebp 0x0000001f push eax 0x00000020 push edx 0x00000021 push eax 0x00000022 push edx 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF0F73 second address: 4FF0F77 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF0F77 second address: 4FF0F7B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF0F7B second address: 4FF0F81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF0F81 second address: 4FF0F87 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF0F87 second address: 4FF0F8B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FD0302 second address: 4FD0357 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edi 0x00000005 call 00007F0D7555855Bh 0x0000000a pop eax 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push ebx 0x0000000f pushad 0x00000010 mov ax, 2611h 0x00000014 pushad 0x00000015 push ecx 0x00000016 pop ebx 0x00000017 popad 0x00000018 popad 0x00000019 mov dword ptr [esp], ebp 0x0000001c pushad 0x0000001d mov ch, 22h 0x0000001f mov dx, C180h 0x00000023 popad 0x00000024 mov ebp, esp 0x00000026 jmp 00007F0D7555855Fh 0x0000002b mov eax, dword ptr [ebp+08h] 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007F0D75558565h 0x00000035 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FD0357 second address: 4FD03CA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0D755569DAh 0x00000009 sub ax, 0228h 0x0000000e jmp 00007F0D755569DBh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 and dword ptr [eax], 00000000h 0x0000001a jmp 00007F0D755569E6h 0x0000001f and dword ptr [eax+04h], 00000000h 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007F0D755569DAh 0x0000002a or ah, FFFFFFB8h 0x0000002d jmp 00007F0D755569DBh 0x00000032 popfd 0x00000033 popad 0x00000034 pop ebp 0x00000035 push eax 0x00000036 push edx 0x00000037 jmp 00007F0D755569E5h 0x0000003c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0626 second address: 4FB062A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB062A second address: 4FB0630 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0630 second address: 4FB0636 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0636 second address: 4FB0652 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007F0D755569DFh 0x00000012 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0652 second address: 4FB0656 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0656 second address: 4FB065C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB065C second address: 4FB066B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D7555855Bh 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF0768 second address: 4FF076E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF076E second address: 4FF07A2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558567h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0D75558564h 0x00000013 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF07A2 second address: 4FF07A7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF07A7 second address: 4FF083E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov bx, E8C2h 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c pushad 0x0000000d pushfd 0x0000000e jmp 00007F0D7555855Fh 0x00000013 and eax, 2F0F17BEh 0x00000019 jmp 00007F0D75558569h 0x0000001e popfd 0x0000001f mov ah, 21h 0x00000021 popad 0x00000022 mov ebp, esp 0x00000024 pushad 0x00000025 pushfd 0x00000026 jmp 00007F0D75558569h 0x0000002b add cx, B4A6h 0x00000030 jmp 00007F0D75558561h 0x00000035 popfd 0x00000036 push eax 0x00000037 push edx 0x00000038 pushfd 0x00000039 jmp 00007F0D7555855Eh 0x0000003e sub eax, 6EEEEA48h 0x00000044 jmp 00007F0D7555855Bh 0x00000049 popfd 0x0000004a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF083E second address: 4FF08AE instructions: 0x00000000 rdtsc 0x00000002 call 00007F0D755569E8h 0x00000007 pop eax 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c jmp 00007F0D755569DEh 0x00000011 mov dword ptr [esp], ecx 0x00000014 jmp 00007F0D755569E0h 0x00000019 mov eax, dword ptr [76FB65FCh] 0x0000001e jmp 00007F0D755569E0h 0x00000023 test eax, eax 0x00000025 push eax 0x00000026 push edx 0x00000027 jmp 00007F0D755569E7h 0x0000002c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF08AE second address: 4FF08FC instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edx, 0253C60Ah 0x00000008 push edi 0x00000009 pop eax 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d je 00007F0DE749B601h 0x00000013 pushad 0x00000014 mov ecx, edx 0x00000016 push ebx 0x00000017 movzx esi, di 0x0000001a pop edx 0x0000001b popad 0x0000001c mov ecx, eax 0x0000001e jmp 00007F0D7555855Ah 0x00000023 xor eax, dword ptr [ebp+08h] 0x00000026 jmp 00007F0D75558561h 0x0000002b and ecx, 1Fh 0x0000002e push eax 0x0000002f push edx 0x00000030 jmp 00007F0D7555855Dh 0x00000035 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF08FC second address: 4FF0923 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov bl, EBh 0x00000005 jmp 00007F0D755569E8h 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d ror eax, cl 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF0923 second address: 4FF093C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 call 00007F0D75558563h 0x00000009 pop esi 0x0000000a popad 0x0000000b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF093C second address: 4FF0942 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FF0942 second address: 4FF0946 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA001D second address: 4FA00AA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pushfd 0x00000006 jmp 00007F0D755569E8h 0x0000000b and ah, 00000048h 0x0000000e jmp 00007F0D755569DBh 0x00000013 popfd 0x00000014 popad 0x00000015 push eax 0x00000016 pushad 0x00000017 push edx 0x00000018 mov ax, A851h 0x0000001c pop eax 0x0000001d mov si, bx 0x00000020 popad 0x00000021 xchg eax, ebp 0x00000022 pushad 0x00000023 call 00007F0D755569DFh 0x00000028 pop edx 0x00000029 pushfd 0x0000002a jmp 00007F0D755569E4h 0x0000002f adc esi, 4D1E1308h 0x00000035 jmp 00007F0D755569DBh 0x0000003a popfd 0x0000003b popad 0x0000003c mov ebp, esp 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007F0D755569E5h 0x00000045 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA00AA second address: 4FA00CF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558561h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 and esp, FFFFFFF8h 0x0000000c pushad 0x0000000d mov edi, eax 0x0000000f mov edx, eax 0x00000011 popad 0x00000012 xchg eax, ecx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA00CF second address: 4FA00D3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA00D3 second address: 4FA00EA instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558563h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA00EA second address: 4FA015F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b pushfd 0x0000000c jmp 00007F0D755569E7h 0x00000011 add cx, 4C1Eh 0x00000016 jmp 00007F0D755569E9h 0x0000001b popfd 0x0000001c popad 0x0000001d xchg eax, ecx 0x0000001e jmp 00007F0D755569DDh 0x00000023 xchg eax, ebx 0x00000024 push eax 0x00000025 push edx 0x00000026 jmp 00007F0D755569DDh 0x0000002b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA015F second address: 4FA016F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D7555855Ch 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA016F second address: 4FA01CE instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c pushad 0x0000000d push ebx 0x0000000e pushfd 0x0000000f jmp 00007F0D755569E2h 0x00000014 xor ax, 96D8h 0x00000019 jmp 00007F0D755569DBh 0x0000001e popfd 0x0000001f pop ecx 0x00000020 movsx edx, ax 0x00000023 popad 0x00000024 xchg eax, ebx 0x00000025 jmp 00007F0D755569E0h 0x0000002a mov ebx, dword ptr [ebp+10h] 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 jmp 00007F0D755569DAh 0x00000036 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA01CE second address: 4FA01D4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA01D4 second address: 4FA01E5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D755569DDh 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA01E5 second address: 4FA0237 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558561h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, esi 0x0000000c pushad 0x0000000d mov esi, 064700E3h 0x00000012 mov di, ax 0x00000015 popad 0x00000016 push eax 0x00000017 jmp 00007F0D75558565h 0x0000001c xchg eax, esi 0x0000001d pushad 0x0000001e push edi 0x0000001f pushad 0x00000020 popad 0x00000021 pop esi 0x00000022 popad 0x00000023 mov esi, dword ptr [ebp+08h] 0x00000026 push eax 0x00000027 push edx 0x00000028 jmp 00007F0D7555855Eh 0x0000002d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0237 second address: 4FA0259 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569DBh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 xchg eax, edi 0x0000000a pushad 0x0000000b mov ebx, 3C2B8BF6h 0x00000010 popad 0x00000011 push eax 0x00000012 push eax 0x00000013 push edx 0x00000014 pushad 0x00000015 mov bx, B1FCh 0x00000019 mov bl, F1h 0x0000001b popad 0x0000001c rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0259 second address: 4FA0291 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 60961600h 0x00000008 pushfd 0x00000009 jmp 00007F0D75558569h 0x0000000e jmp 00007F0D7555855Bh 0x00000013 popfd 0x00000014 popad 0x00000015 pop edx 0x00000016 pop eax 0x00000017 xchg eax, edi 0x00000018 push eax 0x00000019 push edx 0x0000001a push eax 0x0000001b push edx 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0291 second address: 4FA0295 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0295 second address: 4FA02B0 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558567h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA02B0 second address: 4FA030E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0D755569DFh 0x00000009 xor cl, FFFFFFEEh 0x0000000c jmp 00007F0D755569E9h 0x00000011 popfd 0x00000012 pushfd 0x00000013 jmp 00007F0D755569E0h 0x00000018 adc eax, 35775B68h 0x0000001e jmp 00007F0D755569DBh 0x00000023 popfd 0x00000024 popad 0x00000025 pop edx 0x00000026 pop eax 0x00000027 test esi, esi 0x00000029 push eax 0x0000002a push edx 0x0000002b push eax 0x0000002c push edx 0x0000002d pushad 0x0000002e popad 0x0000002f rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA030E second address: 4FA0312 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0312 second address: 4FA0318 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0318 second address: 4FA035F instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7555855Ah 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F0DE74E6845h 0x0000000f pushad 0x00000010 pushfd 0x00000011 jmp 00007F0D7555855Eh 0x00000016 adc si, 18F8h 0x0000001b jmp 00007F0D7555855Bh 0x00000020 popfd 0x00000021 mov si, 8E2Fh 0x00000025 popad 0x00000026 cmp dword ptr [esi+08h], DDEEDDEEh 0x0000002d push eax 0x0000002e push edx 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 popad 0x00000033 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA035F second address: 4FA0365 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0365 second address: 4FA03E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov ecx, 4ED4F03Bh 0x00000008 pushfd 0x00000009 jmp 00007F0D75558560h 0x0000000e sbb eax, 61A16288h 0x00000014 jmp 00007F0D7555855Bh 0x00000019 popfd 0x0000001a popad 0x0000001b pop edx 0x0000001c pop eax 0x0000001d je 00007F0DE74E67EEh 0x00000023 pushad 0x00000024 mov ebx, ecx 0x00000026 mov ecx, 4F362AF7h 0x0000002b popad 0x0000002c mov edx, dword ptr [esi+44h] 0x0000002f push eax 0x00000030 push edx 0x00000031 pushad 0x00000032 pushfd 0x00000033 jmp 00007F0D7555855Fh 0x00000038 sbb cx, 077Eh 0x0000003d jmp 00007F0D75558569h 0x00000042 popfd 0x00000043 jmp 00007F0D75558560h 0x00000048 popad 0x00000049 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA03E8 second address: 4FA0414 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushfd 0x00000004 jmp 00007F0D755569E1h 0x00000009 sbb ch, 00000066h 0x0000000c jmp 00007F0D755569E1h 0x00000011 popfd 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0414 second address: 4FA0433 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 or edx, dword ptr [ebp+0Ch] 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0D75558563h 0x00000011 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0433 second address: 4FA0465 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 test edx, 61000000h 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007F0D755569DDh 0x00000016 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0465 second address: 4FA046B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA046B second address: 4FA04BD instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jne 00007F0DE74E4BEBh 0x0000000e jmp 00007F0D755569DFh 0x00000013 test byte ptr [esi+48h], 00000001h 0x00000017 pushad 0x00000018 movzx esi, di 0x0000001b popad 0x0000001c jne 00007F0DE74E4BE6h 0x00000022 jmp 00007F0D755569DAh 0x00000027 test bl, 00000007h 0x0000002a push eax 0x0000002b push edx 0x0000002c jmp 00007F0D755569E7h 0x00000031 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F908C1 second address: 4F908C7 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F908C7 second address: 4F908F3 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E4h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov ebp, esp 0x0000000b pushad 0x0000000c push eax 0x0000000d movsx ebx, ax 0x00000010 pop ecx 0x00000011 mov dl, D2h 0x00000013 popad 0x00000014 and esp, FFFFFFF8h 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b push eax 0x0000001c push edx 0x0000001d rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F908F3 second address: 4F908F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F908F7 second address: 4F9090A instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569DFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F9090A second address: 4F9093D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 movsx edx, ax 0x00000006 pushfd 0x00000007 jmp 00007F0D75558560h 0x0000000c add esi, 32756E58h 0x00000012 jmp 00007F0D7555855Bh 0x00000017 popfd 0x00000018 popad 0x00000019 pop edx 0x0000001a pop eax 0x0000001b xchg eax, ebx 0x0000001c push eax 0x0000001d push edx 0x0000001e push eax 0x0000001f push edx 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F9093D second address: 4F90941 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90941 second address: 4F9095C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558567h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F9095C second address: 4F909DA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov edi, 61598CDAh 0x00000008 pushfd 0x00000009 jmp 00007F0D755569DBh 0x0000000e adc cl, 0000007Eh 0x00000011 jmp 00007F0D755569E9h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a push eax 0x0000001b jmp 00007F0D755569E1h 0x00000020 xchg eax, ebx 0x00000021 push eax 0x00000022 push edx 0x00000023 pushad 0x00000024 pushfd 0x00000025 jmp 00007F0D755569E3h 0x0000002a sbb ch, 0000003Eh 0x0000002d jmp 00007F0D755569E9h 0x00000032 popfd 0x00000033 pushad 0x00000034 popad 0x00000035 popad 0x00000036 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F909DA second address: 4F90A4C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, bx 0x00000006 mov edi, 5AD05D4Ch 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push esi 0x0000000f pushad 0x00000010 call 00007F0D7555855Eh 0x00000015 mov bx, ax 0x00000018 pop esi 0x00000019 pushfd 0x0000001a jmp 00007F0D75558567h 0x0000001f adc ch, FFFFFFAEh 0x00000022 jmp 00007F0D75558569h 0x00000027 popfd 0x00000028 popad 0x00000029 mov dword ptr [esp], esi 0x0000002c jmp 00007F0D7555855Eh 0x00000031 mov esi, dword ptr [ebp+08h] 0x00000034 push eax 0x00000035 push edx 0x00000036 push eax 0x00000037 push edx 0x00000038 pushad 0x00000039 popad 0x0000003a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90A4C second address: 4F90A69 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90A69 second address: 4F90AB9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007F0D75558567h 0x00000008 call 00007F0D75558568h 0x0000000d pop eax 0x0000000e popad 0x0000000f pop edx 0x00000010 pop eax 0x00000011 mov ebx, 00000000h 0x00000016 jmp 00007F0D7555855Eh 0x0000001b test esi, esi 0x0000001d push eax 0x0000001e push edx 0x0000001f pushad 0x00000020 push eax 0x00000021 push edx 0x00000022 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90AB9 second address: 4F90AC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov edx, 0E499ADEh 0x00000009 popad 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90AC3 second address: 4F90AE7 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558564h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 je 00007F0DE74EDE09h 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 pushad 0x00000013 popad 0x00000014 popad 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90AE7 second address: 4F90B31 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569DFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 cmp dword ptr [esi+08h], DDEEDDEEh 0x00000010 pushad 0x00000011 pushad 0x00000012 mov ax, B5A1h 0x00000016 pushfd 0x00000017 jmp 00007F0D755569DEh 0x0000001c xor ah, 00000038h 0x0000001f jmp 00007F0D755569DBh 0x00000024 popfd 0x00000025 popad 0x00000026 mov di, cx 0x00000029 popad 0x0000002a mov ecx, esi 0x0000002c push eax 0x0000002d push edx 0x0000002e pushad 0x0000002f push eax 0x00000030 push edx 0x00000031 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90B31 second address: 4F90B5C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushfd 0x00000005 jmp 00007F0D7555855Dh 0x0000000a sbb ecx, 4C556BD6h 0x00000010 jmp 00007F0D75558561h 0x00000015 popfd 0x00000016 popad 0x00000017 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90B5C second address: 4F90B6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D755569DCh 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90B6C second address: 4F90BB1 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D7555855Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b je 00007F0DE74EDD7Ch 0x00000011 jmp 00007F0D75558566h 0x00000016 test byte ptr [76FB6968h], 00000002h 0x0000001d pushad 0x0000001e call 00007F0D7555855Eh 0x00000023 push eax 0x00000024 push edx 0x00000025 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90BB1 second address: 4F90C17 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 popad 0x00000006 jne 00007F0DE74EC1D5h 0x0000000c pushad 0x0000000d jmp 00007F0D755569E8h 0x00000012 movzx eax, bx 0x00000015 popad 0x00000016 mov edx, dword ptr [ebp+0Ch] 0x00000019 jmp 00007F0D755569DDh 0x0000001e xchg eax, ebx 0x0000001f pushad 0x00000020 pushfd 0x00000021 jmp 00007F0D755569DCh 0x00000026 sbb cx, 3848h 0x0000002b jmp 00007F0D755569DBh 0x00000030 popfd 0x00000031 mov eax, 581553BFh 0x00000036 popad 0x00000037 push eax 0x00000038 push eax 0x00000039 push edx 0x0000003a push eax 0x0000003b push edx 0x0000003c push eax 0x0000003d push edx 0x0000003e rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90C17 second address: 4F90C1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90C1B second address: 4F90C1F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90C1F second address: 4F90C25 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90C25 second address: 4F90CBA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edi 0x00000004 pop ecx 0x00000005 pushfd 0x00000006 jmp 00007F0D755569DBh 0x0000000b or eax, 7CD0CB3Eh 0x00000011 jmp 00007F0D755569E9h 0x00000016 popfd 0x00000017 popad 0x00000018 pop edx 0x00000019 pop eax 0x0000001a xchg eax, ebx 0x0000001b pushad 0x0000001c pushfd 0x0000001d jmp 00007F0D755569DCh 0x00000022 add si, 2838h 0x00000027 jmp 00007F0D755569DBh 0x0000002c popfd 0x0000002d pushfd 0x0000002e jmp 00007F0D755569E8h 0x00000033 sbb cl, FFFFFF98h 0x00000036 jmp 00007F0D755569DBh 0x0000003b popfd 0x0000003c popad 0x0000003d xchg eax, ebx 0x0000003e push eax 0x0000003f push edx 0x00000040 jmp 00007F0D755569E5h 0x00000045 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90CBA second address: 4F90CCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D7555855Ch 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90CCA second address: 4F90D2D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c pushfd 0x0000000d jmp 00007F0D755569E3h 0x00000012 or esi, 3F69D56Eh 0x00000018 jmp 00007F0D755569E9h 0x0000001d popfd 0x0000001e pushfd 0x0000001f jmp 00007F0D755569E0h 0x00000024 sbb ax, 78E8h 0x00000029 jmp 00007F0D755569DBh 0x0000002e popfd 0x0000002f popad 0x00000030 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90D2D second address: 4F90D33 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4F90D33 second address: 4F90D37 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0A2B second address: 4FA0A81 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558569h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007F0D75558567h 0x00000010 mov cx, 175Fh 0x00000014 popad 0x00000015 xchg eax, ebp 0x00000016 jmp 00007F0D75558562h 0x0000001b mov ebp, esp 0x0000001d push eax 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 pushad 0x00000022 popad 0x00000023 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0A81 second address: 4FA0A85 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FA0A85 second address: 4FA0A8B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 502069D second address: 50206A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 50206A3 second address: 50206A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 50206A7 second address: 50206AB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82A9F9 second address: 82A9FD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 82ADC9 second address: 82ADCF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010675 second address: 501067B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 501067B second address: 501067F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 501067F second address: 5010695 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F0D7555855Bh 0x00000010 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010695 second address: 501069B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 501069B second address: 501069F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 501069F second address: 50106A3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 50106A3 second address: 50106B9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a mov al, 39h 0x0000000c mov bx, BDDCh 0x00000010 popad 0x00000011 xchg eax, ebp 0x00000012 pushad 0x00000013 push ebx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 50106B9 second address: 50106D6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 mov dh, 85h 0x00000007 popad 0x00000008 mov ebp, esp 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007F0D755569E1h 0x00000011 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0278 second address: 4FB0282 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 mov ebx, 0413528Eh 0x00000009 popad 0x0000000a rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0282 second address: 4FB0291 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D755569DBh 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB0291 second address: 4FB02BF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D75558569h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0D7555855Ch 0x00000013 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB02BF second address: 4FB02C5 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB02C5 second address: 4FB02C9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 4FB02C9 second address: 4FB02E8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 xchg eax, ebp 0x00000009 push eax 0x0000000a push edx 0x0000000b jmp 00007F0D755569E4h 0x00000010 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 50109EE second address: 50109F2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 50109F2 second address: 50109F8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 50109F8 second address: 5010A07 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D7555855Bh 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010A07 second address: 5010A36 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E9h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b xchg eax, ebp 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007F0D755569DDh 0x00000013 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010A36 second address: 5010A3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010A3C second address: 5010AA6 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E3h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b mov ebp, esp 0x0000000d jmp 00007F0D755569E6h 0x00000012 push dword ptr [ebp+0Ch] 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 mov si, di 0x0000001b pushfd 0x0000001c jmp 00007F0D755569E9h 0x00000021 xor ah, FFFFFFF6h 0x00000024 jmp 00007F0D755569E1h 0x00000029 popfd 0x0000002a popad 0x0000002b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010AA6 second address: 5010ABE instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov eax, edi 0x00000005 mov di, 667Eh 0x00000009 popad 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push dword ptr [ebp+08h] 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 push ecx 0x00000013 pop edx 0x00000014 mov di, ax 0x00000017 popad 0x00000018 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010ABE second address: 5010AC4 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010AC4 second address: 5010AC8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010AC8 second address: 5010ADB instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push DC8A490Eh 0x0000000d push eax 0x0000000e push edx 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010ADB second address: 5010ADF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010ADF second address: 5010AE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010B60 second address: 5010B66 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010B66 second address: 5010B6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010B6C second address: 5010B70 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010B70 second address: 5010B99 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F0D755569E1h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b movzx eax, al 0x0000000e push eax 0x0000000f push edx 0x00000010 jmp 00007F0D755569DDh 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeRDTSC instruction interceptor: First address: 5010B99 second address: 5010BAA instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 mov cx, bx 0x00000006 push edx 0x00000007 pop ecx 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pop ebp 0x0000000c pushad 0x0000000d push eax 0x0000000e push edx 0x0000000f mov bh, 07h 0x00000011 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRDTSC instruction interceptor: First address: 978065 second address: 97807B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007F0D755569E2h 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRDTSC instruction interceptor: First address: AF82CE second address: AF82D4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRDTSC instruction interceptor: First address: AF72CC second address: AF72F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 jmp 00007F0D755569DEh 0x0000000b jmp 00007F0D755569E2h 0x00000010 popad 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 pop esi 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRDTSC instruction interceptor: First address: AF72F7 second address: AF72FB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRDTSC instruction interceptor: First address: AF72FB second address: AF730B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jng 00007F0D755569D6h 0x0000000e push edx 0x0000000f pop edx 0x00000010 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRDTSC instruction interceptor: First address: AF730B second address: AF7311 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRDTSC instruction interceptor: First address: AF7457 second address: AF7481 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 popad 0x00000008 jnp 00007F0D755569FCh 0x0000000e push ecx 0x0000000f push ecx 0x00000010 pop ecx 0x00000011 jmp 00007F0D755569E4h 0x00000016 pop ecx 0x00000017 push eax 0x00000018 push edx 0x00000019 push eax 0x0000001a push edx 0x0000001b rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRDTSC instruction interceptor: First address: AF7481 second address: AF7485 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRDTSC instruction interceptor: First address: AF78AC second address: AF78B1 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRDTSC instruction interceptor: First address: AF7B2A second address: AF7B3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push edi 0x00000006 push edi 0x00000007 pop edi 0x00000008 jnc 00007F0D75558556h 0x0000000e pop edi 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 pushad 0x00000014 popad 0x00000015 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRDTSC instruction interceptor: First address: AF7B3F second address: AF7B48 instructions: 0x00000000 rdtsc 0x00000002 push edi 0x00000003 pop edi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ebx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSpecial instruction interceptor: First address: 67ED86 instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSpecial instruction interceptor: First address: 821255 instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSpecial instruction interceptor: First address: 81FCCE instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSpecial instruction interceptor: First address: 67C582 instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSpecial instruction interceptor: First address: 826705 instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSpecial instruction interceptor: First address: 8AA845 instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSpecial instruction interceptor: First address: 99ED86 instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSpecial instruction interceptor: First address: B41255 instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSpecial instruction interceptor: First address: B3FCCE instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSpecial instruction interceptor: First address: 975256 instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSpecial instruction interceptor: First address: 99C582 instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSpecial instruction interceptor: First address: B46705 instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeSpecial instruction interceptor: First address: B9599A instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeSpecial instruction interceptor: First address: BCA845 instructions caused by: Self-modifying code
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: 895256 instructions caused by: Self-modifying code
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeSpecial instruction interceptor: First address: AB599A instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: A25256 instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeSpecial instruction interceptor: First address: C4599A instructions caused by: Self-modifying code
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory allocated: 2BD0000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory allocated: 2C90000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory allocated: 4C90000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeMemory allocated: 1180000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeMemory allocated: 2CB0000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeMemory allocated: 2AB0000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeMemory allocated: 11A0000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeMemory allocated: 2CB0000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeMemory allocated: 2AE0000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeMemory allocated: 1F3F4990000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeMemory allocated: 1F3F62B0000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 12B0000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2AB0000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 4AB0000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 7200000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 8200000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 8390000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 9390000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 97F0000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: B070000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: C470000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 97B0000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: D470000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: E470000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: EAA0000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: FAA0000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 8300000 memory reserve | memory write watch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 9500000 memory reserve | memory write watch
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeCode function: 7_2_05010B4F rdtsc 7_2_05010B4F
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeThread delayed: delay time: 180000Jump to behavior
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeThread delayed: delay time: 180000
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeThread delayed: delay time: 922337203685477
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599675
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597269
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596933
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 300000
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596417
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596128
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595880
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595737
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595611
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595269
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 592613
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 592174
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 591863
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 591362
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 588551
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 587988
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 587538
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 587006
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 586598
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 584013
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 583347
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 582588
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 579810
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 579036
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 578371
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 574082
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 573153
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 572475
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 571559
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 570854
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 570174
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 569384
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 568678
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 291318
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeWindow / User API: threadDelayed 1173Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeWindow / User API: threadDelayed 1141Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeWindow / User API: threadDelayed 1144Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeWindow / User API: threadDelayed 1326Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeWindow / User API: threadDelayed 944
                                Source: C:\Users\user\1000021002\ac861238af.exeWindow / User API: threadDelayed 662
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 2567
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 2264
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 2236
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 2236
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 4717
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeWindow / User API: threadDelayed 4830
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 9256
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeWindow / User API: threadDelayed 830
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeWindow / User API: threadDelayed 2276
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeWindow / User API: threadDelayed 2299
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeWindow / User API: threadDelayed 2268
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeWindow / User API: threadDelayed 2284
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 356
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_9-69633
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\X53t1QSznpDGsvX2qLbdQFD1.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Osh3JGbyB69u4I6NltayynfD.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\gX4d2ArXDOHTjofk9CfRb7Jz.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\5nFKWr1EKUheiDEHo671vxm8.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\clip64[1].dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\QbkKvIT5uJj3Cx8h0ECIsmUK.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\u6po.0.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\freebl3[1].dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\u6po.2\ASUS_WMI.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\install[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\gold[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\MtYY7PxoMVCDp1NJbYQga2LV.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\jzMGE9Xb2Ny8jtCWlXWAk3ap.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\de4IGlGSbV9c3J4m0qZtBGm8.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\9WrQ2c2u5fxH1pcvCwwjGhdd.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\aYtr3HT3BUqjK6QB6WYpwCcm.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\zWIy5Pdf1kgq9YulaqIKrGGy.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\JcuJCrKoIRAAJIb94uRnhVjr.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\gPQjkT7jjoMSIv7cXyWMW1C4.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Z0V3bHdPFsglc9f9uLbxOZFN.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\leqbtljZtxj2WxVvdmpHiNsI.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\9SmQs0R4T5RJUISklvcv02zp.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\ppcQqLgPI8Dyy7YykX33fm5x.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\S41vy8IsPU7Iudry37c4uNtg.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1000081001\install.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1000236001\4767d2e713f2021e8fe856e3ea638b58.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\u6po.2\AsIO.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\u6po.0.exeDropped PE file which has not been started: C:\ProgramData\freebl3.dllJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\sarra[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\C893DEcM3dAA247WrHBz1SDW.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\CmCQsbfi77SnYQWckHTzUjRg.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\oqwWhViccQzmDvkS751EZRiG.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\u6po.2\ATKEX.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\laQhqKepZhfkS5rQoYOvKJAy.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\g81RdhkO8Pp47pz1l8siHWuN.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\pScZMSZH0uu2OkUDvWpN2tuz.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\dmmb0z6yJ22pC75a4y49Nfob.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\mBoc1pbzy7gOQT20pyEZL3en.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\STUD4CnDuvZtXsKBuBkO31id.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\jfesawdr[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\1NXbTL9dcUCk55eVv5KRJhmL.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\oXA3lyE6zGyLyvw1CwVKpLsf.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\cred64[1].dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\iO9tAKw78L31Wsbvnq5kt5m1.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\M4OBi0ywNcuUZRFLcfJ70nUH.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\gmHwlMZnGawtAwStcAU6D1RM.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\8sXk5E4IG9n4ZHu2M9Littnp.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\NN7y6Ml4QHJBCfpeCmt1XQq3.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\f2NBhcBIObRGHagt6xPQoMa2.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\gjVUxsTFUgOAjApkeCU52nGD.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\rVg8HtIzXa4xhJHL7Pn8A6d2.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Bkg8NSHXvizTVBsjT3dzRvci.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\0co9idnjzay1KSn3DMfCsBSw.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\ULDq5mjQ4b5aNI3V4eIJfMVS.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\v6zcDFD3cRDhmr34kNKDn8tX.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\GIz2DLitsyoTn14REJti2nqN.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\evHtDP9yDvs3XYDQg8lqEVoH.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\Jr1vIs8XqAmt0RT7bHMte8ts.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\qPQ3lJ1fN9DRgfiXtyMpf1ll.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\gKIISy7hixfPFGDeeM7cQzit.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Aghrmi42Lz5QvS8u8U6BiVXQ.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\SjGlviky3CjPwV1vWXl2gdhJ.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\D7t23m0X26bEkZqkCQtNwK5Y.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dllJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\s8YO7ScTlLADC9Vt6wr10aY4.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\11xbcpylNeYY4tZ39QN34xGC.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1000079001\gold.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\iFyHzFXRkeOppMlu3FtGrLYy.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\QcyIEuk7gD7wTlhElB94jgu9.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\tAKreBGDuozTwXSZfhU7cFT3.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\PHoZl3WswCZ1lCRWCJPBFZtN.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\pl49PSFkcWVTQqBe8TA2VhRW.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\3N5jWnvXHqfYUsxTijnW3Uc5.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\alexxxxxxxx[1].exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\H3bqnZf96LFIOlogieo3h5K9.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\7iI5SUAnqRGyB1YdSAO06W1v.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\4767d2e713f2021e8fe856e3ea638b58[1].exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1000077001\jfesawdr.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\gzxs1MlpU5tnMfkC7kzgvR1h.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\i8dOWYOLtbNAxDJGOQ8Wt9el.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\5W1aDm1vpFLN4gyrIiISMc4h.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\1000080001\alexxxxxxxx.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\Pictures\v3efLAgS1BVue6uNuzFECLaH.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\LIdx8BlqmZTW07MQOtXboF4f.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\5LzADXbR9e1baIzvWufsCa70.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\KHojJ9v7XtNSHZfW6gAnnH23.exeJump to dropped file
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\xF7m0A44x6KodDxbhAtiDsub.exeJump to dropped file
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe TID: 6792Thread sleep count: 1173 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe TID: 6792Thread sleep time: -35190000s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe TID: 6872Thread sleep time: -180000s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 1072Thread sleep count: 52 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 1072Thread sleep time: -104052s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 3804Thread sleep count: 1141 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 3804Thread sleep time: -2283141s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 5804Thread sleep count: 66 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 2828Thread sleep count: 1144 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 2828Thread sleep time: -2289144s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 5804Thread sleep count: 253 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 2756Thread sleep count: 1326 > 30Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 2756Thread sleep time: -2653326s >= -30000sJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 7508Thread sleep count: 76 > 30
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 7508Thread sleep time: -152076s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 5600Thread sleep count: 49 > 30
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 5600Thread sleep time: -98049s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 5776Thread sleep count: 944 > 30
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 5776Thread sleep time: -28320000s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 8068Thread sleep count: 120 > 30
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 8068Thread sleep time: -240120s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 8128Thread sleep count: 111 > 30
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 8128Thread sleep time: -222111s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 7916Thread sleep count: 111 > 30
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 7916Thread sleep time: -222111s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 5012Thread sleep count: 108 > 30
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 5012Thread sleep time: -216108s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 5100Thread sleep count: 100 > 30
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 5100Thread sleep time: -200100s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 8072Thread sleep count: 112 > 30
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe TID: 8072Thread sleep time: -224112s >= -30000s
                                Source: C:\Windows\SysWOW64\rundll32.exe TID: 8056Thread sleep count: 33 > 30
                                Source: C:\Windows\SysWOW64\rundll32.exe TID: 8056Thread sleep time: -33000s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8416Thread sleep count: 37 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8416Thread sleep time: -74037s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8420Thread sleep count: 40 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8420Thread sleep time: -80040s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8436Thread sleep count: 2567 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8436Thread sleep time: -5136567s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8424Thread sleep count: 2264 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8424Thread sleep time: -4530264s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5808Thread sleep count: 163 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5808Thread sleep count: 119 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8440Thread sleep count: 36 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8440Thread sleep time: -72036s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8444Thread sleep count: 35 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8444Thread sleep time: -70035s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8432Thread sleep count: 2236 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8432Thread sleep time: -4474236s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8428Thread sleep count: 2236 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8428Thread sleep time: -4474236s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8544Thread sleep count: 47 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8544Thread sleep time: -94047s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8548Thread sleep count: 56 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8548Thread sleep time: -112056s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8564Thread sleep count: 4717 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8564Thread sleep time: -9438717s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8568Thread sleep count: 53 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8568Thread sleep time: -106053s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 5752Thread sleep count: 39 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8556Thread sleep time: -56028s >= -30000s
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8560Thread sleep count: 4830 > 30
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exe TID: 8560Thread sleep time: -9664830s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2740Thread sleep time: -180000s >= -30000s
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8516Thread sleep time: -8301034833169293s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe TID: 3896Thread sleep count: 830 > 30
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe TID: 3896Thread sleep time: -24900000s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe TID: 8268Thread sleep time: -720000s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8344Thread sleep count: 75 > 30
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8344Thread sleep time: -150075s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8348Thread sleep count: 69 > 30
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8348Thread sleep time: -138069s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8332Thread sleep count: 2276 > 30
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8332Thread sleep time: -4554276s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8204Thread sleep count: 210 > 30
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8324Thread sleep count: 2299 > 30
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8324Thread sleep time: -4600299s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8320Thread sleep count: 2268 > 30
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8320Thread sleep time: -4538268s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8328Thread sleep count: 2284 > 30
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8328Thread sleep time: -4570284s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8336Thread sleep count: 74 > 30
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe TID: 8336Thread sleep time: -148074s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exe TID: 7472Thread sleep time: -922337203685477s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe TID: 8996Thread sleep time: -922337203685477s >= -30000s
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 9036Thread sleep time: -46023s >= -30000s
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 9040Thread sleep time: -38019s >= -30000s
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 9028Thread sleep time: -44022s >= -30000s
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8968Thread sleep count: 77 > 30
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 9048Thread sleep time: -36018s >= -30000s
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 9044Thread sleep time: -32016s >= -30000s
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 8968Thread sleep count: 134 > 30
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 9032Thread sleep time: -36018s >= -30000s
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 9052Thread sleep time: -36018s >= -30000s
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exe TID: 9056Thread sleep time: -48024s >= -30000s
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 9204Thread sleep time: -922337203685477s >= -30000s
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 9204Thread sleep time: -922337203685477s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -922337203685477s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -600000s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -599675s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -597269s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -596933s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 8744Thread sleep time: -900000s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -596417s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -596128s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -595880s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -595737s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -595611s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -595269s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -592613s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -592174s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -591863s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -591362s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -588551s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -587988s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -587538s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -587006s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -586598s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -584013s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -583347s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -582588s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -579810s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -579036s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -578371s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -574082s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -573153s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -572475s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -571559s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -570854s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -570174s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -569384s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -568678s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -291318s >= -30000s
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2908Thread sleep time: -922337203685477s >= -30000s
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeLast function: Thread delayed
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeLast function: Thread delayed
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeLast function: Thread delayed
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                                Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeLast function: Thread delayed
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeLast function: Thread delayed
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeFile Volume queried: C:\Users\user\AppData\Local\Temp FullSizeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008A33B0 FindFirstFileA,FindNextFileA,9_2_008A33B0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008C3B20 FindFirstFileA,FindNextFileA,SetFileAttributesA,RemoveDirectoryA,std::_Throw_Cpp_error,std::_Throw_Cpp_error,9_2_008C3B20
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00811F8C FindFirstFileExW,9_2_00811F8C
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008BD2B0 RegOpenKeyExA,RegQueryValueExA,RegOpenKeyExA,RegQueryValueExA,GetLocalTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,GetSystemInfo,GlobalMemoryStatusEx,CreateToolhelp32Snapshot,RegOpenKeyExA,RegEnumKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,9_2_008BD2B0
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeThread delayed: delay time: 30000Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeThread delayed: delay time: 180000Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeThread delayed: delay time: 30000
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeThread delayed: delay time: 30000
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeThread delayed: delay time: 180000
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeThread delayed: delay time: 922337203685477
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599675
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597269
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596933
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 300000
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596417
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596128
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595880
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595737
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595611
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595269
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 592613
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 592174
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 591863
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 591362
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 588551
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 587988
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 587538
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 587006
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 586598
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 584013
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 583347
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 582588
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 579810
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 579036
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 578371
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 574082
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 573153
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 572475
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 571559
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 570854
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 570174
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 569384
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 568678
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 291318
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\userJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\user\AppDataJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                                Source: d361f35322.exe, 00000024.00000003.2762447424.0000000001447000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                                Source: MPGPH131.exe, 0000001B.00000002.3350736971.0000000001466000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Dk&Ven_VMware&P
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                                Source: MPGPH131.exe, 0000001B.00000003.3206691270.0000000008155000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NSB268R9S0jYt4RkfcsbwCi8b/me+Id1GWEHfcsbCyywb3nLGt63vEoK6zPCwH1LiO1bQmzfEpL0LSG8bwlRfUuI6Ft4qrK34myq2u1Ou91pp93JdVAzExFYJ6xLBQXWCaONCqwThe8NrBOKH/X+ObCnB79/DiSNfv8ciu5//xyMHu7TFz76gnz6wqmjfPqiZXh9+iJkRIRECRvxgSFRwogjQ6JESfCFRAmVEB4wIsmkFRQwIglfVMCIpHK9ASMSyQ2Pxhk43wZF4wwkjIrGGYrsjcYZjBw+VsJn/6CxEk4dNVaiZXjHSoSM8Mk2bMkJmmzDaKMm2yh872Qbin/Jia+RtPj9FRMJkjIDr7NVw3n
                                Source: d361f35322.exe, 00000009.00000003.2770271909.0000000007DE7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000002.3073575028.0000000001418000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942487367.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941258327.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940853881.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001447000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943456957.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934755710.0000000001477000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000001D.00000002.2226894863.0000000000CAA000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000001D.00000002.2226894863.0000000000CFB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                                Source: ac861238af.exe, 00000010.00000003.7189145681.0000000000C76000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\'C:\WINDOWS\system32\drivers\vmmouse.sys&C:\WINDOWS\system32\drivers\vmhgfs.sys
                                Source: amert.exe, 00000007.00000003.1859371747.00000000011C1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}w
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001418000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000;
                                Source: RageMP131.exe, 0000002E.00000003.2194989877.0000000001011000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                                Source: MPGPH131.exe, 0000001B.00000002.3354975509.0000000008120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}SModulePath=%ProgramFiles(x86)%\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows
                                Source: 1CMweaqlKp.exe, 00000000.00000003.1640238021.000000000113E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}y
                                Source: amert.exe, 00000007.00000003.1866578225.00000000011B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c73
                                Source: netsh.exe, 00000016.00000003.1948196297.00000284B17C5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllUU
                                Source: MPGPH131.exe, 0000001B.00000002.3350736971.00000000013ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
                                Source: MPGPH131.exe, 0000001B.00000003.3207696960.0000000008157000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: F9yfql/YAw6y7rQAN4mT6KSsNSB268R9S0jYt4RkfcsbwCi8b/me+Id1GWEHfcsbCyywb3nLGt63vEoK6zPCwH1LiO1bQmzfEpL0LSG8bwlRfUuI6Ft4qrK34myq2u1Ou91pp93JdVAzExFYJ6xLBQXWCaONCqwThe8NrBOKH/X+ObCnB79/DiSNfv8ciu5//xyMHu7TFz76gnz6wqmjfPqiZXh9+iJkRIRECRvxgSFRwogjQ6JESfCFRAmVEB4wIsmkFRQwIglfVMCIpHK9ASMSyQ2Pxhk43wZF4wwkjIrGGYrsjcYZjBw+VsJn/6CxEk4dNVaiZXjHSoSM8Mk2bMkJmmzDaKMm2yh872Qbin/Jia+RtPj9FRMJkjIDr7NVw3n
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
                                Source: MPGPH131.exe, 0000001B.00000002.3350736971.0000000001466000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_ABA40470mm
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                                Source: MPGPH131.exe, 0000001B.00000003.3248220823.0000000007CD6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}jp,w.jp,x.jp,y.jp,z.jp,a.za,b.za,c.za,d.za,e.za,f.za,g.za,h.za,i.za,j.za,k.za,l.za,m.za,n.za,o.za,p.za,q.z
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
                                Source: MPGPH131.exe, 0000001C.00000003.2505158116.00000000012C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91e
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}es=C:\Program Files (x86)ProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=C:\Program Files (x86)\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSESSIONNAME=ConsoleSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windowsee
                                Source: RageMP131.exe, 0000002E.00000002.2637513543.000000000100E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Y
                                Source: RegAsm.exe, 0000002F.00000002.2105971476.0000000000F0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMware
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noValueButYesKey)C:\WINDOWS\system32\drivers\VBoxMouse.sys
                                Source: d361f35322.exe, 00000024.00000002.3081226044.0000000001440000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_ABA40470
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
                                Source: d361f35322.exe, 00000024.00000003.2762447424.0000000001447000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JwZo/8MwiwHqIvXEAOVpRY7WnVBhrODe/dgRQYX3uczos12TJGMgUcbRf8jrvikd/VczY83oKOZAMzqKgTejI6EDzeg4bDERNuftnqULxoXXPfG6v9krfDbdf0XoQLjCXaLpea2NXecnZXJn9gK/7u4bACHwMWEsF/+YMF5I4GPCRFLE5FKoUgv0RsC+xv1D14mzjXDWhOP4HkVDCCuw0TOg7ZoSe+IcDxF44hzPxp84JxATeOKcTI44gBz6tsBxz8kV3Mr9ySGQd6AQBIufA8mBljGr2c5LvboJrUlkjspoX0E2zmf8Wi7uCKu66bwVcqk7OT/SRzGzI8Fb4KGABhhMsrgTyXTudeKduS4BCrZLqtu5HCGjWWcBWT2zygyOzYKzWCB4Jda5PJQz8Bg1lJo/Rg0HDTxGjUQV41HdqVdyXOqVkn1e8dO8sqbbOolfg2AmVM0VryhWWcGcYcoKpvYpKwQ0TFnhqGI8amAyr3+9rX+lgDhnc2WN9VR7E/PZPX17mOSQ+bU93mgEU2hPoeE4CGTPhOwddnXof5xFfl5co7tcTE3iOHouxpfJr06qt2mtqWrYr3D+gjeU0Eqvi09rsYc3LTTeHa+hFdn7HjKUcFxD7a0pHdlY9wZ6cvN0VG0ObsC25C2riwgNYAv7HbHjH6+S+pQT0NqEUKNKMPsnM9F0i4ZT0ONhHH4K0iLOkQ+ptqEq0HRdBaJVFho0AvqstqJ34CR2TTVURHTY1TUmlt0dI7LXcHzzF9yfql/YAw6y7rQAN4mT6KSsNSB268R9S0jYt4RkfcsbwCi8b/me+Id1GWEHfcsbCyywb3nLGt63vEoK6zPCwH1LiO1bQmzfEpL0LSG8bwlRfUuI6Ft4qrK34myq2u1Ou91pp93JdVAzExFYJ6xLBQXWCaONCqwThe8NrBOKH/X+ObCnB79/DiSNfv8ciu5//xyMHu7TFz76gnz6wqmjfPqiZXh9+iJkRIRECRvxgSFRwogjQ6JESfCFRAmVEB4wIsmkFRQwIglfVMCIpHK9ASMSyQ2Pxhk43wZF4wwkjIrGGYrsjcYZjBw+VsJn/6CxEk4dNVaiZXjHSoSM8Mk2bMkJmmzDaKMm2yh872Qbin/Jia+RtPj9FRMJkjIDr7NVw3n8
                                Source: amert.exe, amert.exe, 00000007.00000002.1869091189.00000000007FE000.00000040.00000001.01000000.0000000B.sdmp, d361f35322.exe, d361f35322.exe, 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmp, explorha.exe, 0000000B.00000002.1945729188.0000000000B1E000.00000040.00000001.01000000.0000000D.sdmp, MPGPH131.exe, 0000001B.00000002.3349608067.0000000000A20000.00000040.00000001.01000000.00000012.sdmp, d361f35322.exe, 00000024.00000002.3073507178.0000000000B00000.00000040.00000001.01000000.0000000C.sdmp, RageMP131.exe, 0000002E.00000002.2634385282.0000000000BB0000.00000040.00000001.01000000.0000001B.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                                Source: RegAsm.exe, 0000002F.00000002.2105971476.0000000000F0A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareVMwareO#
                                Source: RageMP131.exe, 0000002E.00000003.2194989877.0000000001009000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}yr
                                Source: explorta.exe, 00000005.00000002.1735792403.0000000001288000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                                Source: d361f35322.exe, 00000024.00000002.3088709368.0000000007C69000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}es=C:\Program Files (x86)ProgramFiles(x86)=C:\Program Files (x86)ProgramW6432=C:\Program FilesPSModulePath=C:\Program Files (x86)\WindowsPowerShell\Modules;C:\Windows\system32\WindowsPowerShell\v1.0\Modules;C:\Program Files (x86)\AutoIt3\AutoItXPUBLIC=C:\Users\PublicSESSIONNAME=ConsoleSystemDrive=C:SystemRoot=C:\WindowsTEMP=C:\Users\user\AppData\Local\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windowsdd
                                Source: d361f35322.exe, 00000024.00000003.2819365667.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kQ+ptqEq0HRdBaJVFho0AvqstqJ34CR2TTVURHTY1TUmlt0dI7LXcHzzF9yfql/YAw6y7rQAN4mT6KSsNSB268R9S0jYt4RkfcsbwCi8b/me+Id1GWEHfcsbCyywb3nLGt63vEoK6zPCwH1LiO1bQmzfEpL0LSG8bwlRfUuI6Ft4qrK34myq2u1Ou91pp93JdVAzExFYJ6xLBQXWCaONCqwThe8NrBOKH/X+ObCnB79/DiSNfv8ciu5//xyMHu7TFz76gnz6wqmjfPqiZXh9+iJkRIRECRvxgSFRwogjQ6JESfCFRAmVEB4wIsmkFRQwIglfVMCIpHK9ASMSyQ2Pxhk43wZF4wwkjIrGGYrsjcYZjBw+VsJn/6CxEk4dNVaiZXjHSoSM8Mk2bMkJmmzDaKMm2yh872Qbin/Jia+RtPj9FRMJkjIDr7NVw3n8
                                Source: d361f35322.exe, 00000009.00000003.1936676269.000000000142F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                                Source: d361f35322.exe, 00000024.00000003.2819365667.000000000144A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kQ+ptqEq0HRdBaJVFho0AvqstqJ34CR2TTVURHTY1TUmlt0dI7LXcHzzF9yfql/YAw6y7rQAN4mT6KSsNSB268R9S0jYt4RkfcsbwCi8b/me+Id1GWEHfcsbCyywb3nLGt63vEoK6zPCwH1LiO1bQmzfEpL0LSG8bwlRfUuI6Ft4qrK34myq2u1Ou91pp93JdVAzExFYJ6xLBQXWCaONCqwThe8NrBOKH/X+ObCnB79/DiSNfv8ciu5//xyMHu7TFz76gnz6wqmjfPqiZXh9+iJkRIRECRvxgSFRwogjQ6JESfCFRAmVEB4wIsmkFRQwIglfVMCIpHK9ASMSyQ2Pxhk43wZF4wwkjIrGGYrsjcYZjBw+VsJn/6CxEk4dNVaiZXjHSoSM8Mk2bMkJmmzDaKMm2yh872Qbin/Jia+RtPj9FRMJkjIDr7NVw3n
                                Source: file300un.exe, 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                                Source: d361f35322.exe, 00000009.00000003.2912737740.0000000007DE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 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
                                Source: d361f35322.exe, 00000024.00000002.3079225585.00000000013F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
                                Source: amert.exe, 00000007.00000002.1869091189.00000000007FE000.00000040.00000001.01000000.0000000B.sdmp, d361f35322.exe, 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmp, explorha.exe, 0000000B.00000002.1945729188.0000000000B1E000.00000040.00000001.01000000.0000000D.sdmp, MPGPH131.exe, 0000001B.00000002.3349608067.0000000000A20000.00000040.00000001.01000000.00000012.sdmp, d361f35322.exe, 00000024.00000002.3073507178.0000000000B00000.00000040.00000001.01000000.0000000C.sdmp, RageMP131.exe, 0000002E.00000002.2634385282.0000000000BB0000.00000040.00000001.01000000.0000001B.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                                Source: d361f35322.exe, 00000009.00000002.3073575028.00000000013E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9e146be9-c76a-4720-bcdb-53011b87bd06_{a33c7340-61ca-11ee-8c18-806e6f6e6963}_\\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}_ABA40470}
                                Source: RageMP131.exe, 0000002E.00000002.2637513543.0000000000FF9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeSystem information queried: ModuleInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeProcess information queried: ProcessInformationJump to behavior

                                Anti Debugging

                                barindex
                                Source: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeSystem information queried: CodeIntegrityInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeThread information set: HideFromDebuggerJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeThread information set: HideFromDebuggerJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeThread information set: HideFromDebugger
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeThread information set: HideFromDebugger
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebugger
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeThread information set: HideFromDebugger
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeThread information set: HideFromDebugger
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeThread information set: HideFromDebugger
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_052D03D1 Start: 052D06B7 End: 052D04619_2_052D03D1
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeOpen window title or class name: regmonclass
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: gbdyllo
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeOpen window title or class name: procmon_window_class
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeOpen window title or class name: ollydbg
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeOpen window title or class name: filemonclass
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: NTICE
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SICE
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: SIWVID
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess queried: DebugPortJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess queried: DebugPort
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPort
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPort
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPort
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPort
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPort
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPort
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPort
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess queried: DebugPort
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeCode function: 7_2_05010B4F rdtsc 7_2_05010B4F
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008A4130 mov eax, dword ptr fs:[00000030h]9_2_008A4130
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_00871A60 mov eax, dword ptr fs:[00000030h]9_2_00871A60
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeProcess token adjusted: Debug
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess token adjusted: Debug
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory allocated: page read and write | page guard

                                HIPS / PFW / Operating System Protection Evasion

                                barindex
                                Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 193.233.132.56 80
                                Source: swiiiii[1].exe.10.dr, Angelo.csReference to suspicious API methods: Program.GetProcAddress(Program.GetModuleHandle(aScsrhgtr), "FreeConsole")
                                Source: swiiiii[1].exe.10.dr, Angelo.csReference to suspicious API methods: Program.GetProcAddress(Program.GetModuleHandle(aScsrhgtr), "VirtualProtectEx")
                                Source: file300un[1].exe.10.dr, -.csReference to suspicious API methods: _FDDD_FDFD_FBD0_066C_FDD3_0611_FDFC_FDD9.LoadLibrary(_FDD4_FD3E_06D8(_FD42_066A_061F_FBB7_060E_066D._0650_FBBC_FDE8))
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and write
                                Source: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeThread created: unknown EIP: 34419A0
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5A
                                Source: RegAsm.exe, 0000001D.00000002.2189256789.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: pillowbrocccolipe.shop
                                Source: RegAsm.exe, 0000001D.00000002.2189256789.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: communicationgenerwo.shop
                                Source: RegAsm.exe, 0000001D.00000002.2189256789.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: diskretainvigorousiw.shop
                                Source: RegAsm.exe, 0000001D.00000002.2189256789.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: affordcharmcropwo.shop
                                Source: RegAsm.exe, 0000001D.00000002.2189256789.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: dismissalcylinderhostw.shop
                                Source: RegAsm.exe, 0000001D.00000002.2189256789.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: enthusiasimtitleow.shop
                                Source: RegAsm.exe, 0000001D.00000002.2189256789.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: worryfillvolcawoi.shop
                                Source: RegAsm.exe, 0000001D.00000002.2189256789.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: cleartotalfisherwo.shop
                                Source: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeSection loaded: NULL target: unknown protection: read write
                                Source: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exeSection loaded: NULL target: unknown protection: execute and read
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeSection unmapped: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base address: 400000
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 439000
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 43C000
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 447000
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 629008
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41B000
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 423000
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 636000
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: BF3008
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 404000
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 406000
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: BDB008
                                Source: C:\Users\user\Desktop\1CMweaqlKp.exeProcess created: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe "C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe "C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\AppData\Local\Temp\1000019001\amert.exe "C:\Users\user\AppData\Local\Temp\1000019001\amert.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe "C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeProcess created: C:\Users\user\1000021002\ac861238af.exe "C:\Users\user\1000021002\ac861238af.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000019001\amert.exeProcess created: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe "C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe" Jump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe "C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe"
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe"
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000071001\jok.exe "C:\Users\user\AppData\Local\Temp\1000071001\jok.exe"
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe "C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe"
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe"
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: unknown unknown
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: unknown unknown
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeProcess created: unknown unknown
                                Source: C:\Users\user\1000021002\ac861238af.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
                                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profiles
                                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe" /F
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess created: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe "C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess created: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe "C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeProcess created: unknown unknown
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeProcess created: C:\Users\user\AppData\Local\Temp\u6po.0.exe "C:\Users\user\AppData\Local\Temp\u6po.0.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: unknown unknown
                                Source: ac861238af.exe, 00000010.00000000.1932011901.0000000000762000.00000002.00000001.01000000.0000000E.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                                Source: RageMP131.exe, 0000002E.00000002.2634385282.0000000000BB0000.00000040.00000001.01000000.0000001B.sdmpBinary or memory string: QProgram Manager
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                                Source: C:\Users\user\AppData\Local\Temp\u6po.0.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                                Source: C:\Users\user\AppData\Local\Temp\u6po.0.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeQueries volume information: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000019001\amert.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000019001\amert.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeQueries volume information: C:\Users\user\1000021002\ac861238af.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exeQueries volume information: C:\Users\user\1000021002\ac861238af.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeQueries volume information: C:\ VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeQueries volume information: unknown VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000071001\jok.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000071001\jok.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000077001\jfesawdr.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000077001\jfesawdr.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000079001\gold.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000079001\gold.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000080001\alexxxxxxxx.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000080001\alexxxxxxxx.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000081001\install.exe VolumeInformationJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000081001\install.exe VolumeInformationJump to behavior
                                Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Users\user\Desktop\AIXACVYBSB.docx VolumeInformation
                                Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Users\user\Desktop\DTBZGIOOSO.docx VolumeInformation
                                Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Users\user\Desktop\DTBZGIOOSO.xlsx VolumeInformation
                                Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Users\user\Desktop\HTAGVDFUIE.xlsx VolumeInformation
                                Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU.docx VolumeInformation
                                Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Users\user\Desktop\ONBQCLYSPU.xlsx VolumeInformation
                                Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Users\user\Desktop\UMMBDNEQBN.xlsx VolumeInformation
                                Source: C:\Windows\System32\rundll32.exeQueries volume information: C:\Users\user\Desktop\XZXHAVGRAG.docx VolumeInformation
                                Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe VolumeInformation
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite VolumeInformation
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: unknown VolumeInformation
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000236001\4767d2e713f2021e8fe856e3ea638b58.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000236001\4767d2e713f2021e8fe856e3ea638b58.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000071001\jok.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exeQueries volume information: C:\Users\user\AppData\Local\Temp\u6po.1.zip VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeQueries volume information: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\u6po.0.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\u6po.0.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformation
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008BD2B0 RegOpenKeyExA,RegQueryValueExA,RegOpenKeyExA,RegQueryValueExA,GetLocalTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,GetSystemInfo,GlobalMemoryStatusEx,CreateToolhelp32Snapshot,RegOpenKeyExA,RegEnumKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,9_2_008BD2B0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeCode function: 9_2_008BD2B0 RegOpenKeyExA,RegQueryValueExA,RegOpenKeyExA,RegQueryValueExA,GetLocalTime,GetTimeZoneInformation,TzSpecificLocalTimeToSystemTime,RegOpenKeyExA,RegQueryValueExA,GetSystemInfo,GlobalMemoryStatusEx,CreateToolhelp32Snapshot,RegOpenKeyExA,RegEnumKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,9_2_008BD2B0
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                                Lowering of HIPS / PFW / Operating System Security Settings

                                barindex
                                Source: C:\Users\user\AppData\Local\Temp\1000075001\file300un.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUA
                                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profiles
                                Source: RegAsm.exe, 0000001D.00000002.2278813474.0000000002E44000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000001D.00000002.2274630744.0000000000D77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                                Stealing of Sensitive Information

                                barindex
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\clip64[1].dll, type: DROPPED
                                Source: Yara matchFile source: 35.0.NewB.exe.e50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 39.0.NewB.exe.e50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 11.2.explorha.exe.930000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 39.2.NewB.exe.e50000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 7.2.amert.exe.610000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0.2.1CMweaqlKp.exe.730000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 5.2.explorta.exe.700000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000005.00000003.1721215690.00000000011E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000027.00000000.2050930258.0000000000E51000.00000020.00000001.01000000.00000015.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000023.00000000.2011865777.0000000000E51000.00000020.00000001.01000000.00000015.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000003.1626992485.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000003.1904362561.0000000004F10000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000001.00000003.1663910421.0000000000C90000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000007.00000002.1868102298.0000000000611000.00000040.00000001.01000000.0000000B.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000000.00000002.1663899661.0000000000731000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000007.00000003.1826787054.0000000004E00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000005.00000002.1732128904.0000000000701000.00000020.00000001.01000000.00000007.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000027.00000002.2069776940.0000000000E51000.00000020.00000001.01000000.00000015.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000B.00000002.1945079164.0000000000931000.00000040.00000001.01000000.0000000D.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000000A.00000003.1894101326.0000000005260000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\cred64[1].dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\clip64[1].dll, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, type: DROPPED
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5348, type: MEMORYSTR
                                Source: Yara matchFile source: 47.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 47.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 51.3.u6po.0.exe.3680000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 44.2.swiiii.exe.3cb5570.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 51.3.u6po.0.exe.3680000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 44.2.swiiii.exe.3cb5570.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0000002C.00000002.2151525456.0000000003CB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000033.00000003.2152173443.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000002F.00000002.2102303995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 40.0.jok.exe.7c0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000028.00000000.2051081332.00000000007C2000.00000002.00000001.01000000.00000018.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: jok.exe PID: 8672, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\jok[1].exe, type: DROPPED
                                Source: Yara matchFile source: 00000024.00000003.2840876152.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000024.00000003.2839845792.0000000007CE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001B.00000002.3354975509.0000000008152000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000024.00000002.3088709368.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000009.00000002.3082656269.0000000007D70000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000024.00000003.2839809905.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000024.00000003.2840195887.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000024.00000003.2839878527.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: d361f35322.exe PID: 5772, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6636, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: d361f35322.exe PID: 8200, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 8964, type: MEMORYSTR
                                Source: Yara matchFile source: 00000031.00000002.2229022734.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000031.00000002.2229087093.0000000003661000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: 47.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 47.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 51.3.u6po.0.exe.3680000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 44.2.swiiii.exe.3cb5570.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 44.2.swiiii.exe.3cb5570.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 51.3.u6po.0.exe.3680000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0000002C.00000002.2151525456.0000000003CB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000033.00000003.2152173443.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000002F.00000002.2102303995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Electrum\wallets
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\ElectronCash\wallets
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\com.liberty.jaxx
                                Source: RegAsm.exe, 0000001D.00000002.2226894863.0000000000CFB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: window-state.json
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.walletRE
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ethereum\wallets
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Exodus\exodus.walletRE
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Binance\app-store.jsons8
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\Ethereum\wallets
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                                Source: d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: C:\Users\user\AppData\Roaming\MultiDoge\multidoge.wallet
                                Source: RegAsm.exe, 0000001D.00000002.2196300199.00000000008F7000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: 5AWallets/ExodusAC:\Users\user\AppData\Roaming\Exodus\exodus.wallet4Y)A%appdata%\Exodus\exodus.walletAkeystore
                                Source: MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CD7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ledger Live
                                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profiles
                                Source: C:\Windows\System32\rundll32.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profiles
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\History
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnm
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\Application Data\Mozilla\Firefox
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_cjelfplplebdjjenllpjcblmjkfcffne_0.indexeddb.leveldb\CURRENT
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafa
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdo
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoa
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopg
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdph
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkld
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolaf
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfci
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjeh
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemg
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhae
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.db
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliof
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmon
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhm
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcm
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjh
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbg
                                Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Cookies
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahd
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhk
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\History
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi\CURRENT
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login Data
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgn
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\blnieiiffboillknjnepogjhkgnoapac\CURRENT
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Orbitum\User Data\Default\Login Data
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifb
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgk
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkd
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For Account
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\CocCoc\Browser\User Data\Default\Login Data
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For Account
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjk
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Chromium\User Data\Default\Login Data
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihd
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcje
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaoc
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdno
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\logins.json
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdaf
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.db
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkm
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqlite
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\chrome-extension_blnieiiffboillknjnepogjhkgnoapac_0.indexeddb.leveldb\CURRENT
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj\CURRENT
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn\CURRENT
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\CentBrowser\User Data\Default\Login Data
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbic
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoadd
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhi
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeap
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihoh
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpa
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.json
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbn
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilc
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclg
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Comodo\Dragon\User Data\Default\Login Data
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoa
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchh
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\signons.sqlite
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\Cookies
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfdd
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Chedot\User Data\Default\Login Data
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\key4.db
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpo
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblb
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbm
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbch
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfe
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklk
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdma
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohao\CURRENT
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kncchdigobghenbbaddojjnnaogfppfj\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdil
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.ini
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\signons.sqlite
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnkno
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\formhistory.sqlite
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec\CURRENT
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.ini
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncg
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolb
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcob
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\z6bny8rn.default\logins.json
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnba
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbai\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddfffla
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcge
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgik
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Vivaldi\User Data\Default\Login Data
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhad
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgef
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\kpfopkelmapcoipemfendmdcghnegimn\CURRENT
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbb
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm\CURRENT
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.ini
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkp
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcellj
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\sitemanager.xml
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Ledger Live
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldb
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\wallets
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Binance
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\System32\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\ImmersiveControlPanel\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\System32\oobe\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Program Files (x86)\kwTJRnYVwAQEhcNiCzeUXAdMAbCUXdSzVvyfmsqkGAXe\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Temp\5454e6f062\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Program Files\Google\Chrome\Application\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Temp\1000020001\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\AppData\Local\Temp\09fd851a4f\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\1000021002\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Windows\SysWOW64\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\Users\user\Desktop\{6D809377-6AF0-444B-8957-A3773F02200E}\Common Files\microsoft shared\ClickToRun\.purple\accounts.xml
                                Source: C:\Windows\System32\rundll32.exeFile opened: C:\.purple\accounts.xml
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                                Source: C:\ProgramData\MPGPH131\MPGPH131.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                                Source: C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                                Source: C:\Users\user\AppData\Local\RageMP131\RageMP131.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.ini
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSB
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPS
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPU
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOL
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUND
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSB
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUND
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEY
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSB
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIE
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKI
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOL
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAG
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAH
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKI
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOL
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUND
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAG
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSB
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\CURQNKVOIX
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSO
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIE
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPS
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPU
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOL
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUND
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAG
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEY
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAH
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPU
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSB
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSO
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIE
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPS
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKI
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ONBQCLYSPU
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOL
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUND
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAG
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEY
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\AIXACVYBSB
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\DTBZGIOOSO
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\HTAGVDFUIE
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\KATAXZVCPS
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\KZWFNRXYKI
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOL
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUND
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAG
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAH
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\SFPUSAFIOL
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUND
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\XZXHAVGRAG
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEY
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\Documents\ZQIXMVQGAH
                                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: number of queries: 1081
                                Source: Yara matchFile source: 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: d361f35322.exe PID: 5772, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6636, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5348, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: d361f35322.exe PID: 8200, type: MEMORYSTR

                                Remote Access Functionality

                                barindex
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5348, type: MEMORYSTR
                                Source: Yara matchFile source: 47.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 47.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 51.3.u6po.0.exe.3680000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 44.2.swiiii.exe.3cb5570.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 51.3.u6po.0.exe.3680000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 44.2.swiiii.exe.3cb5570.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0000002C.00000002.2151525456.0000000003CB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000033.00000003.2152173443.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000002F.00000002.2102303995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 40.0.jok.exe.7c0000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 00000028.00000000.2051081332.00000000007C2000.00000002.00000001.01000000.00000018.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: jok.exe PID: 8672, type: MEMORYSTR
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exe, type: DROPPED
                                Source: Yara matchFile source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\jok[1].exe, type: DROPPED
                                Source: Yara matchFile source: 00000024.00000003.2840876152.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000024.00000003.2839845792.0000000007CE8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000001B.00000002.3354975509.0000000008152000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000024.00000002.3088709368.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000009.00000002.3082656269.0000000007D70000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000024.00000003.2839809905.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000024.00000003.2840195887.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000024.00000003.2839878527.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: Process Memory Space: d361f35322.exe PID: 5772, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: MPGPH131.exe PID: 6636, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: d361f35322.exe PID: 8200, type: MEMORYSTR
                                Source: Yara matchFile source: Process Memory Space: RageMP131.exe PID: 8964, type: MEMORYSTR
                                Source: Yara matchFile source: 00000031.00000002.2229022734.0000000003640000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000031.00000002.2229087093.0000000003661000.00000004.10000000.00040000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                                Source: Yara matchFile source: 47.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 47.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 51.3.u6po.0.exe.3680000.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 44.2.swiiii.exe.3cb5570.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 44.2.swiiii.exe.3cb5570.0.raw.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 51.3.u6po.0.exe.3680000.0.unpack, type: UNPACKEDPE
                                Source: Yara matchFile source: 0000002C.00000002.2151525456.0000000003CB5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 00000033.00000003.2152173443.0000000003680000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                                Source: Yara matchFile source: 0000002F.00000002.2102303995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                                Windows Management Instrumentation
                                1
                                DLL Side-Loading
                                1
                                DLL Side-Loading
                                31
                                Disable or Modify Tools
                                2
                                OS Credential Dumping
                                2
                                System Time Discovery
                                Remote Services11
                                Archive Collected Data
                                1
                                Ingress Tool Transfer
                                Exfiltration Over Other Network MediumAbuse Accessibility Features
                                CredentialsDomainsDefault Accounts1
                                Native API
                                11
                                Scheduled Task/Job
                                712
                                Process Injection
                                111
                                Deobfuscate/Decode Files or Information
                                11
                                Input Capture
                                23
                                File and Directory Discovery
                                Remote Desktop Protocol41
                                Data from Local System
                                2
                                Encrypted Channel
                                Exfiltration Over BluetoothNetwork Denial of Service
                                Email AddressesDNS ServerDomain Accounts1
                                Shared Modules
                                21
                                Registry Run Keys / Startup Folder
                                11
                                Scheduled Task/Job
                                4
                                Obfuscated Files or Information
                                1
                                Credentials in Registry
                                328
                                System Information Discovery
                                SMB/Windows Admin Shares1
                                Email Collection
                                1
                                Application Layer Protocol
                                Automated ExfiltrationData Encrypted for Impact
                                Employee NamesVirtual Private ServerLocal Accounts2
                                Command and Scripting Interpreter
                                Login Hook21
                                Registry Run Keys / Startup Folder
                                1
                                Install Root Certificate
                                1
                                Credentials In Files
                                1
                                Query Registry
                                Distributed Component Object Model11
                                Input Capture
                                Protocol ImpersonationTraffic DuplicationData Destruction
                                Gather Victim Network InformationServerCloud Accounts11
                                Scheduled Task/Job
                                Network Logon ScriptNetwork Logon Script13
                                Software Packing
                                LSA Secrets1371
                                Security Software Discovery
                                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                                Domain PropertiesBotnetReplication Through Removable Media1
                                PowerShell
                                RC ScriptsRC Scripts1
                                Timestomp
                                Cached Domain Credentials671
                                Virtualization/Sandbox Evasion
                                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                                DLL Side-Loading
                                DCSync3
                                Process Discovery
                                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                                Masquerading
                                Proc Filesystem1
                                Application Window Discovery
                                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt671
                                Virtualization/Sandbox Evasion
                                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron712
                                Process Injection
                                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                                Rundll32
                                Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                                Hide Legend

                                Legend:

                                • Process
                                • Signature
                                • Created File
                                • DNS/IP Info
                                • Is Dropped
                                • Is Windows Process
                                • Number of created Registry Values
                                • Number of created Files
                                • Visual Basic
                                • Delphi
                                • Java
                                • .Net C# or VB.NET
                                • C, C++ or other language
                                • Is malicious
                                • Internet
                                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1436254 Sample: 1CMweaqlKp.exe Startdate: 04/05/2024 Architecture: WINDOWS Score: 100 237 Multi AV Scanner detection for domain / URL 2->237 239 Found malware configuration 2->239 241 Malicious sample detected (through community Yara rule) 2->241 243 29 other signatures 2->243 12 1CMweaqlKp.exe 5 2->12         started        16 MPGPH131.exe 2->16         started        18 RageMP131.exe 2->18         started        21 6 other processes 2->21 process3 dnsIp4 145 C:\Users\user\AppData\Local\...\explorta.exe, PE32 12->145 dropped 301 Query firmware table information (likely to detect VMs) 12->301 303 Tries to detect sandboxes / dynamic malware analysis system (registry check) 12->303 23 explorta.exe 2 23 12->23         started        305 Multi AV Scanner detection for dropped file 16->305 307 Detected unpacking (changes PE section rights) 16->307 309 Tries to steal Mail credentials (via file / registry access) 16->309 321 2 other signatures 16->321 161 34.117.186.192 GOOGLE-AS-APGoogleAsiaPacificPteLtdSG United States 18->161 163 104.26.5.15 CLOUDFLARENETUS United States 18->163 311 Tries to detect sandboxes and other dynamic analysis tools (window names) 18->311 313 Tries to harvest and steal browser information (history, passwords, etc) 18->313 315 Tries to evade debugger and weak emulator (self modifying code) 18->315 165 192.168.2.4 unknown unknown 21->165 167 239.255.255.250 unknown Reserved 21->167 317 Hides threads from debuggers 21->317 319 Tries to detect process monitoring tools (Task Manager, Process Explorer etc.) 21->319 28 chrome.exe 21->28         started        30 chrome.exe 21->30         started        file5 signatures6 process7 dnsIp8 185 193.233.132.56 FREE-NET-ASFREEnetEU Russian Federation 23->185 187 193.233.132.139 FREE-NET-ASFREEnetEU Russian Federation 23->187 129 C:\Users\user\AppData\...\d361f35322.exe, PE32 23->129 dropped 131 C:\Users\user\AppData\Local\...\amert.exe, PE32 23->131 dropped 133 C:\Users\user\AppData\Local\...\random[1].exe, PE32 23->133 dropped 135 4 other malicious files 23->135 dropped 269 Query firmware table information (likely to detect VMs) 23->269 271 Creates multiple autostart registry keys 23->271 273 Tries to detect sandboxes / dynamic malware analysis system (registry check) 23->273 32 amert.exe 4 23->32         started        36 d361f35322.exe 1 60 23->36         started        39 ac861238af.exe 23->39         started        41 explorta.exe 23->41         started        189 142.250.189.14 GOOGLEUS United States 28->189 191 142.250.68.68 GOOGLEUS United States 28->191 195 5 other IPs or domains 28->195 193 142.250.72.131 GOOGLEUS United States 30->193 file9 signatures10 process11 dnsIp12 107 C:\Users\user\AppData\Local\...\explorha.exe, PE32 32->107 dropped 213 Detected unpacking (changes PE section rights) 32->213 215 Tries to evade debugger and weak emulator (self modifying code) 32->215 217 Tries to detect virtualization through RDTSC time measurements 32->217 233 3 other signatures 32->233 43 explorha.exe 45 32->43         started        169 147.45.47.93 FREE-NET-ASFREEnetEU Russian Federation 36->169 109 C:\Users\user\AppData\Local\...\RageMP131.exe, PE32 36->109 dropped 111 C:\ProgramData\MPGPH131\MPGPH131.exe, PE32 36->111 dropped 219 Tries to steal Mail credentials (via file / registry access) 36->219 221 Found many strings related to Crypto-Wallets (likely being stolen) 36->221 223 Found stalling execution ending in API Sleep call 36->223 235 3 other signatures 36->235 48 schtasks.exe 36->48         started        50 schtasks.exe 36->50         started        225 Antivirus detection for dropped file 39->225 227 Multi AV Scanner detection for dropped file 39->227 229 Binary is likely a compiled AutoIt script file 39->229 231 Machine Learning detection for dropped file 39->231 52 chrome.exe 39->52         started        file13 signatures14 process15 dnsIp16 205 185.172.128.19 NADYMSS-ASRU Russian Federation 43->205 207 77.221.151.47 INFOBOX-ASInfoboxruAutonomousSystemRU Russian Federation 43->207 209 193.233.132.234 FREE-NET-ASFREEnetEU Russian Federation 43->209 147 C:\Users\user\AppData\Roaming\...\cred64.dll, PE32+ 43->147 dropped 149 C:\Users\user\AppData\Roaming\...\clip64.dll, PE32 43->149 dropped 151 C:\Users\user\AppData\Local\...\install.exe, PE32 43->151 dropped 153 19 other malicious files 43->153 dropped 323 Detected unpacking (changes PE section rights) 43->323 325 Tries to detect sandboxes and other dynamic analysis tools (window names) 43->325 327 Tries to evade debugger and weak emulator (self modifying code) 43->327 329 3 other signatures 43->329 54 file300un.exe 43->54         started        57 NewB.exe 43->57         started        61 swiiiii.exe 43->61         started        67 4 other processes 43->67 63 conhost.exe 48->63         started        65 conhost.exe 50->65         started        file17 signatures18 process19 dnsIp20 249 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 54->249 251 Writes to foreign memory regions 54->251 253 Allocates memory in foreign processes 54->253 265 3 other signatures 54->265 69 RegAsm.exe 54->69         started        73 powershell.exe 54->73         started        197 185.172.128.59 NADYMSS-ASRU Russian Federation 57->197 199 104.21.84.71 CLOUDFLARENETUS United States 57->199 203 2 other IPs or domains 57->203 137 C:\...\4767d2e713f2021e8fe856e3ea638b58.exe, PE32 57->137 dropped 139 C:\Users\user\AppData\Local\...\toolspub1.exe, PE32 57->139 dropped 141 C:\Users\user\AppData\Local\...\ISetup8.exe, PE32 57->141 dropped 143 3 other malicious files 57->143 dropped 255 Creates an undocumented autostart registry key 57->255 76 ISetup8.exe 57->76         started        78 toolspub1.exe 57->78         started        80 schtasks.exe 57->80         started        257 Injects a PE file into a foreign processes 61->257 82 RegAsm.exe 61->82         started        86 2 other processes 61->86 201 185.215.113.67 WHOLESALECONNECTIONSNL Portugal 67->201 259 System process connects to network (likely due to code injection or exploit) 67->259 261 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 67->261 263 Installs new ROOT certificates 67->263 267 2 other signatures 67->267 84 rundll32.exe 67->84         started        88 2 other processes 67->88 file21 signatures22 process23 dnsIp24 171 189.195.132.134 MegaCableSAdeCVMX Mexico 69->171 183 9 other IPs or domains 69->183 113 C:\Users\...\zWIy5Pdf1kgq9YulaqIKrGGy.exe, PE32 69->113 dropped 115 C:\Users\...\v6zcDFD3cRDhmr34kNKDn8tX.exe, MS-DOS 69->115 dropped 117 C:\Users\...\v3efLAgS1BVue6uNuzFECLaH.exe, PE32 69->117 dropped 127 64 other malicious files 69->127 dropped 275 Loading BitLocker PowerShell Module 73->275 90 conhost.exe 73->90         started        173 185.172.128.228 NADYMSS-ASRU Russian Federation 76->173 175 185.172.128.90 NADYMSS-ASRU Russian Federation 76->175 177 176.97.76.106 INTRAFFIC-ASUA United Kingdom 76->177 119 C:\Users\user\AppData\Local\Temp\...\AsIO.dll, PE32 76->119 dropped 121 C:\Users\user\AppData\Local\...\ATKEX.dll, PE32 76->121 dropped 123 C:\Users\user\AppData\Local\...\ASUS_WMI.dll, PE32 76->123 dropped 125 C:\Users\user\AppData\Local\Temp\u6po.0.exe, PE32 76->125 dropped 92 u6po.0.exe 76->92         started        277 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 78->277 279 Checks for kernel code integrity (NtQuerySystemInformation(CodeIntegrityInformation)) 78->279 281 Maps a DLL or memory area into another process 78->281 295 2 other signatures 78->295 96 conhost.exe 80->96         started        179 104.21.67.211 CLOUDFLARENETUS United States 82->179 283 Query firmware table information (likely to detect VMs) 82->283 285 Creates HTML files with .exe extension (expired dropper behavior) 82->285 287 Found many strings related to Crypto-Wallets (likely being stolen) 82->287 297 2 other signatures 82->297 289 Tries to steal Instant Messenger accounts or passwords 84->289 291 Uses netsh to modify the Windows network and firewall settings 84->291 293 Tries to harvest and steal ftp login credentials 84->293 299 2 other signatures 84->299 98 powershell.exe 84->98         started        101 netsh.exe 84->101         started        181 13.89.179.12 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 86->181 file25 signatures26 process27 dnsIp28 211 185.172.128.150 NADYMSS-ASRU Russian Federation 92->211 155 C:\Users\user\AppData\...\freebl3[1].dll, PE32 92->155 dropped 157 C:\ProgramData\freebl3.dll, PE32 92->157 dropped 159 C:\Users\user\...\246122658369_Desktop.zip, Zip 98->159 dropped 245 Installs new ROOT certificates 98->245 247 Loading BitLocker PowerShell Module 98->247 103 conhost.exe 98->103         started        105 conhost.exe 101->105         started        file29 signatures30 process31

                                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                windows-stand
                                SourceDetectionScannerLabelLink
                                1CMweaqlKp.exe50%ReversingLabsWin32.Trojan.Amadey
                                1CMweaqlKp.exe44%VirustotalBrowse
                                1CMweaqlKp.exe100%AviraTR/Crypt.XPACK.Gen
                                1CMweaqlKp.exe100%Joe Sandbox ML
                                SourceDetectionScannerLabelLink
                                C:\Users\user\1000021002\ac861238af.exe100%AviraTR/AutoIt.zstul
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amert[1].exe100%AviraTR/Crypt.TPM.Gen
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exe100%AviraTR/Redcap.pernp
                                C:\Users\user\AppData\Local\9WrQ2c2u5fxH1pcvCwwjGhdd.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\5W1aDm1vpFLN4gyrIiISMc4h.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Bkg8NSHXvizTVBsjT3dzRvci.exe100%Joe Sandbox ML
                                C:\Users\user\1000021002\ac861238af.exe100%Joe Sandbox ML
                                C:\ProgramData\MPGPH131\MPGPH131.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\KHojJ9v7XtNSHZfW6gAnnH23.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\sarra[1].exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\file300un[1].exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\9SmQs0R4T5RJUISklvcv02zp.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\5LzADXbR9e1baIzvWufsCa70.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Aghrmi42Lz5QvS8u8U6BiVXQ.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\C893DEcM3dAA247WrHBz1SDW.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\8sXk5E4IG9n4ZHu2M9Littnp.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\CmCQsbfi77SnYQWckHTzUjRg.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\4767d2e713f2021e8fe856e3ea638b58[1].exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\GIz2DLitsyoTn14REJti2nqN.exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amert[1].exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exe100%Joe Sandbox ML
                                C:\Users\user\AppData\Local\H3bqnZf96LFIOlogieo3h5K9.exe100%Joe Sandbox ML
                                C:\ProgramData\MPGPH131\MPGPH131.exe53%VirustotalBrowse
                                C:\ProgramData\freebl3.dll0%ReversingLabs
                                C:\ProgramData\freebl3.dll0%VirustotalBrowse
                                C:\Users\user\1000021002\ac861238af.exe35%VirustotalBrowse
                                C:\Users\user\AppData\Local\5LzADXbR9e1baIzvWufsCa70.exe34%ReversingLabs
                                C:\Users\user\AppData\Local\5LzADXbR9e1baIzvWufsCa70.exe44%VirustotalBrowse
                                C:\Users\user\AppData\Local\5W1aDm1vpFLN4gyrIiISMc4h.exe32%ReversingLabs
                                C:\Users\user\AppData\Local\5W1aDm1vpFLN4gyrIiISMc4h.exe43%VirustotalBrowse
                                C:\Users\user\AppData\Local\8sXk5E4IG9n4ZHu2M9Littnp.exe75%ReversingLabsWin32.Trojan.Operaloader
                                C:\Users\user\AppData\Local\8sXk5E4IG9n4ZHu2M9Littnp.exe72%VirustotalBrowse
                                C:\Users\user\AppData\Local\9SmQs0R4T5RJUISklvcv02zp.exe32%ReversingLabs
                                C:\Users\user\AppData\Local\9SmQs0R4T5RJUISklvcv02zp.exe43%VirustotalBrowse
                                C:\Users\user\AppData\Local\9WrQ2c2u5fxH1pcvCwwjGhdd.exe75%ReversingLabsWin32.Trojan.Operaloader
                                C:\Users\user\AppData\Local\9WrQ2c2u5fxH1pcvCwwjGhdd.exe72%VirustotalBrowse
                                C:\Users\user\AppData\Local\Aghrmi42Lz5QvS8u8U6BiVXQ.exe43%ReversingLabsWin32.Packed.Generic
                                C:\Users\user\AppData\Local\Aghrmi42Lz5QvS8u8U6BiVXQ.exe43%VirustotalBrowse
                                C:\Users\user\AppData\Local\Bkg8NSHXvizTVBsjT3dzRvci.exe75%ReversingLabsWin32.Trojan.Operaloader
                                C:\Users\user\AppData\Local\Bkg8NSHXvizTVBsjT3dzRvci.exe72%VirustotalBrowse
                                C:\Users\user\AppData\Local\C893DEcM3dAA247WrHBz1SDW.exe43%ReversingLabsWin32.Packed.Generic
                                C:\Users\user\AppData\Local\C893DEcM3dAA247WrHBz1SDW.exe43%VirustotalBrowse
                                C:\Users\user\AppData\Local\CmCQsbfi77SnYQWckHTzUjRg.exe34%ReversingLabs
                                C:\Users\user\AppData\Local\CmCQsbfi77SnYQWckHTzUjRg.exe44%VirustotalBrowse
                                C:\Users\user\AppData\Local\H3bqnZf96LFIOlogieo3h5K9.exe34%ReversingLabs
                                C:\Users\user\AppData\Local\H3bqnZf96LFIOlogieo3h5K9.exe44%VirustotalBrowse
                                C:\Users\user\AppData\Local\KHojJ9v7XtNSHZfW6gAnnH23.exe32%ReversingLabs
                                C:\Users\user\AppData\Local\KHojJ9v7XtNSHZfW6gAnnH23.exe43%VirustotalBrowse
                                C:\Users\user\AppData\Local\LIdx8BlqmZTW07MQOtXboF4f.exe42%ReversingLabsWin64.Trojan.Generic
                                C:\Users\user\AppData\Local\LIdx8BlqmZTW07MQOtXboF4f.exe37%VirustotalBrowse
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\4767d2e713f2021e8fe856e3ea638b58[1].exe34%ReversingLabs
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\4767d2e713f2021e8fe856e3ea638b58[1].exe44%VirustotalBrowse
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exe91%ReversingLabsWin32.Trojan.Malgent
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exe85%VirustotalBrowse
                                C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\amert[1].exe58%VirustotalBrowse
                                No Antivirus matches
                                No Antivirus matches
                                SourceDetectionScannerLabelLink
                                http://trade-inmyus.com/index.php0%URL Reputationsafe
                                http://trade-inmyus.com/index.php0%URL Reputationsafe
                                https://api.ip.sb/ip0%URL Reputationsafe
                                http://trad-einmyus.com/index.php0%URL Reputationsafe
                                https://mozilla.org0/0%URL Reputationsafe
                                http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
                                https://contoso.com/Icon0%URL Reputationsafe
                                https://contoso.com/License0%URL Reputationsafe
                                http://tradein-myus.com/index.php0%URL Reputationsafe
                                https://contoso.com/0%URL Reputationsafe
                                pillowbrocccolipe.shop0%Avira URL Cloudsafe
                                https://junglethomas.com/b3e2dbff31c451a3fa7323ca95e661ba/4767d2e713f2021e8fe856e3ea638b58.exev0%Avira URL Cloudsafe
                                https://junglethomas.com/b3e2dbff31c451a3fa7323ca95e661ba/4767d2e713f2021e8fe856e3ea638b58.exe0%Avira URL Cloudsafe
                                https://youtube.comVISITOR_INFO1_LIVE/0%Avira URL Cloudsafe
                                185.215.113.67:26260100%Avira URL Cloudmalware
                                https://youtube.comVISITOR_PRIVACY_METADATAv100%Avira URL Cloudsafe
                                http://185.172.128.150/c698e1bc8a2f5e6d.php0%Avira URL Cloudsafe
                                cleartotalfisherwo.shop0%Avira URL Cloudsafe
                                185.215.113.67:2626016%VirustotalBrowse
                                http://193.233.132.56/cost/lenin.exe10%Avira URL Cloudsafe
                                pillowbrocccolipe.shop18%VirustotalBrowse
                                cleartotalfisherwo.shop18%VirustotalBrowse
                                communicationgenerwo.shop0%Avira URL Cloudsafe
                                https://affordcharmcropwo.shop/d0%Avira URL Cloudsafe
                                http://193.233.132.56/cost/lenin.exe;x0%Avira URL Cloudsafe
                                http://193.233.132.56/cost/go.exe4x0%Avira URL Cloudsafe
                                http://185.172.128.150/c698e1bc8a2f5e6d.php20%VirustotalBrowse
                                https://affordcharmcropwo.shop/z0%Avira URL Cloudsafe
                                https://affordcharmcropwo.shop/d10%VirustotalBrowse
                                worryfillvolcawoi.shop0%Avira URL Cloudsafe
                                https://youtube.comYSC/)?0%Avira URL Cloudsafe
                                diskretainvigorousiw.shop0%Avira URL Cloudsafe
                                https://junglethomas.com/0%Avira URL Cloudsafe
                                http://147.45.47.102:57893/hera/amadka.exe100%Avira URL Cloudmalware
                                worryfillvolcawoi.shop18%VirustotalBrowse
                                https://affordcharmcropwo.shop/z13%VirustotalBrowse
                                http://147.45.47.102:57893/hera/amadka.exer.dbl0%Avira URL Cloudsafe
                                http://193.233.132.56/cost/lenin.exe122%VirustotalBrowse
                                http://193.233.132.56/cost/go.exehCorel.ba0%Avira URL Cloudsafe
                                https://affordcharmcropwo.shop/apitemb0%Avira URL Cloudsafe
                                diskretainvigorousiw.shop18%VirustotalBrowse
                                http://193.233.132.56/cost/go.exe0%Avira URL Cloudsafe
                                affordcharmcropwo.shop0%Avira URL Cloudsafe
                                communicationgenerwo.shop17%VirustotalBrowse
                                https://youtube.comVISITOR_PRIVACY_METADATA/(90%Avira URL Cloudsafe
                                http://147.45.47.102:57893/hera/amadka.exe20%VirustotalBrowse
                                http://193.233.132.56/cost/lenin.exew.s0%Avira URL Cloudsafe
                                http://193.233.132.56/cost/lenin.exea.exe68.0l0%Avira URL Cloudsafe
                                https://junglethomas.com/12%VirustotalBrowse
                                http://193.233.132.56/cost/go.exe25%VirustotalBrowse
                                http://193.233.132.56/cost/go.exemadka.ex0%Avira URL Cloudsafe
                                affordcharmcropwo.shop17%VirustotalBrowse
                                https://youtube.comYSCv100%Avira URL Cloudsafe
                                https://accounts.googl0%Avira URL Cloudsafe
                                https://affordcharmcropwo.shop:443/apiNAME=userUSERPROFILE=C:0%Avira URL Cloudsafe
                                https://youtube.comVISITOR_INFO1_LIVEv10%0%Avira URL Cloudsafe
                                enthusiasimtitleow.shop0%Avira URL Cloudsafe
                                http://193.233.132.56/cost/go.exemadka.ex22%VirustotalBrowse
                                https://affordcharmcropwo.shop/api0%Avira URL Cloudsafe
                                http://147.45.47.102:57893/hera/amadka.exe.lv0%Avira URL Cloudsafe
                                enthusiasimtitleow.shop17%VirustotalBrowse
                                https://affordcharmcropwo.shop/api22%VirustotalBrowse
                                No contacted domains info
                                NameMaliciousAntivirus DetectionReputation
                                http://trade-inmyus.com/index.phptrue
                                • URL Reputation: safe
                                • URL Reputation: safe
                                unknown
                                pillowbrocccolipe.shoptrue
                                • 18%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                185.215.113.67:26260true
                                • 16%, Virustotal, Browse
                                • Avira URL Cloud: malware
                                unknown
                                http://185.172.128.150/c698e1bc8a2f5e6d.phptrue
                                • 20%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                cleartotalfisherwo.shoptrue
                                • 18%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                http://trad-einmyus.com/index.phptrue
                                • URL Reputation: safe
                                unknown
                                communicationgenerwo.shoptrue
                                • 17%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                worryfillvolcawoi.shoptrue
                                • 18%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                diskretainvigorousiw.shoptrue
                                • 18%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                http://tradein-myus.com/index.phptrue
                                • URL Reputation: safe
                                unknown
                                affordcharmcropwo.shoptrue
                                • 17%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                enthusiasimtitleow.shoptrue
                                • 17%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://duckduckgo.com/chrome_newtabd361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://junglethomas.com/b3e2dbff31c451a3fa7323ca95e661ba/4767d2e713f2021e8fe856e3ea638b58.exevNewB.exe, 00000023.00000003.2221273909.0000000000C97000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://duckduckgo.com/ac/?q=d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://db-ip.com/d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824519132.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762153720.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758759334.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2874193365.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3081226044.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759980015.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760938757.0000000001442000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760535342.0000000001441000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825526740.0000000001443000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762501264.0000000001441000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://t.me/RiseProSUPPORTo5#RageMP131.exe, 0000002E.00000002.2637513543.0000000000F9E000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://ipinfo.io/widget/demo/81.181.54.104d361f35322.exe, 00000009.00000002.3073575028.00000000013FA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942487367.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941258327.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940853881.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943456957.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001429000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934755710.0000000001477000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3079225585.00000000013F2000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3079225585.000000000139F000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.0000000000FDB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://db-ip.com/demo/home.php?s=81.181.54.1042d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://db-ip.com/demo/home.php?s=81.181.54.1045MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://junglethomas.com/b3e2dbff31c451a3fa7323ca95e661ba/4767d2e713f2021e8fe856e3ea638b58.exeNewB.exe, 00000023.00000003.2221273909.0000000000C97000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://nuget.org/nuget.exepowershell.exe, 0000001E.00000002.2315360912.000001D42EE5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001E.00000002.2095956248.000001D4207A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://t.me/RiseProSUPPORTId361f35322.exe, 00000024.00000003.2840876152.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3088709368.0000000007C6E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  https://youtube.comVISITOR_INFO1_LIVE/MPGPH131.exe, 0000001B.00000003.3204849861.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819272725.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819336338.0000000007CE0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  low
                                                  https://youtube.comVISITOR_PRIVACY_METADATAv10u6po.0.exe, 00000033.00000003.2232787568.00000000220DC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  • Avira URL Cloud: safe
                                                  low
                                                  https://ipinfo.io:443/widget/demo/81.181.54.1048MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942487367.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941258327.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940853881.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943456957.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934755710.0000000001477000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://193.233.132.56/cost/lenin.exe1RageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    • 22%, Virustotal, Browse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000001E.00000002.2095956248.000001D41EDE1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://db-ip.com/demo/home.php?s=81.181.54.104d361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942487367.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941258327.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940853881.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943456957.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934755710.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824519132.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3079225585.000000000140C000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762153720.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758759334.000000000143F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://aka.ms/winsvr-2022-pshelppowershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001E.00000002.2095956248.000001D420547000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://api.ip.sb/ipjok.exe, 00000028.00000000.2051081332.00000000007C2000.00000002.00000001.01000000.00000018.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://www.youtube.com/account/v/MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820673524.0000000007C6A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820817674.000000000144A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820817674.0000000001443000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://mozilla.org0/freebl3[1].dll.51.drfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmptrue
                                                            • URL Reputation: malware
                                                            unknown
                                                            http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://db-ip.com:443/demo/home.php?s=81.181.54.104MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942487367.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941258327.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940853881.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943456957.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934755710.0000000001477000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://affordcharmcropwo.shop/dRegAsm.exe, 0000001D.00000002.2273817779.0000000000D4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • 10%, Virustotal, Browse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://contoso.com/Iconpowershell.exe, 0000001E.00000002.2095956248.000001D4207A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • URL Reputation: safe
                                                                  unknown
                                                                  https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dlld361f35322.exe, 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, MPGPH131.exe, 0000001B.00000003.2069728672.0000000004FF0000.00000004.00001000.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3349331204.0000000000701000.00000040.00000001.01000000.00000012.sdmp, MPGPH131.exe, 0000001C.00000003.2070120899.0000000005180000.00000004.00001000.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2021888097.00000000050E0000.00000004.00001000.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3072062602.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, RageMP131.exe, 0000002E.00000003.2138214229.0000000004C70000.00000004.00001000.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2634123106.0000000000891000.00000040.00000001.01000000.0000001B.sdmpfalse
                                                                    high
                                                                    http://193.233.132.56/cost/lenin.exe;xd361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://193.233.132.56/cost/go.exe4xd361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://t.me/RiseProSUPPORTd361f35322.exe, 00000009.00000002.3082656269.0000000007D70000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000002.3073575028.00000000013BE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354975509.0000000008152000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.00000000013ED000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840876152.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2839845792.0000000007CE8000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3088709368.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2839809905.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3079225585.000000000136B000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.0000000000F9E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://affordcharmcropwo.shop/zRegAsm.exe, 0000001D.00000002.2273817779.0000000000D4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • 13%, Virustotal, Browse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://www.ecosia.org/newtab/d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brRageMP131.exe, 0000002E.00000002.2671632274.000000000795D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://github.com/Pester/Pesterpowershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://www.youtube.com/accountd361f35322.exe, 00000009.00000003.2912274365.0000000007DC2000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.7189686015.0000000000C7C000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.2320418390.000000000336C000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.2320275710.0000000003355000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.2320347999.0000000003358000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.7258589510.0000000000C7D000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.7259110109.0000000000C7E000.00000004.00000020.00020000.00000000.sdmp, ac861238af.exe, 00000010.00000003.7189145681.0000000000C76000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3205947734.0000000007CEB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3206133655.0000000008153000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2828616710.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820488974.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2826400120.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840128095.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2832748402.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2836881277.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2873758197.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2840628725.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2830540798.0000000007CDD000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://www.youtube.com/accountkOMPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://yip.su/RNWPd.exeChttps://pastebin.com/raw/E0rY26ni5https://iplogger.com/1lyxzfile300un.exe, 00000032.00000002.7140120246.000001F380091000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    https://ipinfo.io/RageMP131.exe, 0000002E.00000002.2637513543.0000000000FE0000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      https://t.me/risepro_botrisepro4.104MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://www.maxmind.com/en/locate-my-ip-addressd361f35322.exefalse
                                                                                          high
                                                                                          http://schemas.xmlsoap.org/wsdl/powershell.exe, 0000001E.00000002.2095956248.000001D41F008000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://ipinfo.io/5d361f35322.exe, 00000009.00000002.3073575028.00000000013E7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://youtube.comYSC/)?d361f35322.exe, 00000009.00000003.2912110551.0000000007DBC000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3204849861.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819272725.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819336338.0000000007CE0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              • Avira URL Cloud: safe
                                                                                              unknown
                                                                                              https://t.me/RiseProSUPPORTxRd361f35322.exe, 00000024.00000002.3079225585.000000000136B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://junglethomas.com/NewB.exe, 00000023.00000003.2221273909.0000000000C97000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                • 12%, Virustotal, Browse
                                                                                                • Avira URL Cloud: safe
                                                                                                unknown
                                                                                                https://ipinfo.io:443/widget/demo/81.181.54.104Uzd361f35322.exe, 00000024.00000002.3079225585.000000000136B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  https://db-ip.com/demo/home.php?s=81.181.54.104XNNRageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://ipinfo.io:443/widget/demo/81.181.54.104d361f35322.exe, 00000009.00000002.3073575028.0000000001449000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.000000000102A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDFRageMP131.exe, 0000002E.00000002.2671632274.000000000795D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        http://147.45.47.102:57893/hera/amadka.exed361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824519132.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762153720.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758759334.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2874193365.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3081226044.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759980015.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760938757.0000000001442000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760535342.0000000001441000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825526740.0000000001443000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        • 20%, Virustotal, Browse
                                                                                                        • Avira URL Cloud: malware
                                                                                                        unknown
                                                                                                        http://147.45.47.102:57893/hera/amadka.exer.dbld361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        https://contoso.com/Licensepowershell.exe, 0000001E.00000002.2095956248.000001D4207A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://www.youtube.com/accountYouTubeMPGPH131.exe, 0000001B.00000003.3206207533.0000000008124000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820488974.0000000007CDD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820609546.0000000007CE1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            http://193.233.132.56/cost/go.exehCorel.baMPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            • Avira URL Cloud: safe
                                                                                                            unknown
                                                                                                            https://affordcharmcropwo.shop/apitembRegAsm.exe, 0000001D.00000002.2274630744.0000000000D56000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            • Avira URL Cloud: safe
                                                                                                            unknown
                                                                                                            https://ipinfo.io/widget/demo/81.181.54.104Td361f35322.exe, 00000009.00000002.3073575028.0000000001449000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.000000000102A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              https://t.me/risepro_botPMPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                http://193.233.132.56/cost/go.exed361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2824519132.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762153720.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758759334.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2874193365.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3081226044.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759980015.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760938757.0000000001442000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760535342.0000000001441000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825526740.0000000001443000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                • 25%, Virustotal, Browse
                                                                                                                • Avira URL Cloud: safe
                                                                                                                unknown
                                                                                                                https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchd361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://contoso.com/powershell.exe, 0000001E.00000002.2095956248.000001D4207A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  https://ipinfo.io/iRageMP131.exe, 0000002E.00000002.2637513543.0000000000FC7000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://ipinfo.io/_MPGPH131.exe, 0000001B.00000002.3350736971.0000000001417000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      https://youtube.comVISITOR_PRIVACY_METADATA/(9d361f35322.exe, 00000009.00000003.2912110551.0000000007DBC000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3204849861.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819272725.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819336338.0000000007CE0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      • Avira URL Cloud: safe
                                                                                                                      low
                                                                                                                      http://193.233.132.56/cost/lenin.exew.sMPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      • Avira URL Cloud: safe
                                                                                                                      unknown
                                                                                                                      http://193.233.132.56/cost/lenin.exea.exe68.0ld361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      • Avira URL Cloud: safe
                                                                                                                      unknown
                                                                                                                      https://db-ip.com:443/demo/home.php?s=81.181.54.104rd361f35322.exe, 00000024.00000002.3079225585.000000000136B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        http://193.233.132.56/cost/go.exemadka.exMPGPH131.exe, 0000001B.00000003.2943052576.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944589602.00000000014BF000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944963727.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934727765.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2944248868.00000000014BB000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942019558.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940827091.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3247558222.00000000014BA000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3351318785.00000000014BE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                        • 22%, Virustotal, Browse
                                                                                                                        • Avira URL Cloud: safe
                                                                                                                        unknown
                                                                                                                        https://t.me/RiseProSUPPORT8d361f35322.exe, 00000024.00000003.2840876152.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3088709368.0000000007C6E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          https://youtube.comYSCv10MPGPH131.exe, 0000001B.00000003.3204849861.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819272725.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819336338.0000000007CE0000.00000004.00000020.00020000.00000000.sdmp, u6po.0.exe, 00000033.00000003.2232787568.00000000220DC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          • Avira URL Cloud: safe
                                                                                                                          unknown
                                                                                                                          http://nuget.org/NuGet.exepowershell.exe, 0000001E.00000002.2315360912.000001D42EE5C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000001E.00000002.2095956248.000001D4207A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            https://t.me/RiseProSUPPORT3MPGPH131.exe, 0000001B.00000002.3354975509.0000000008152000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              https://accounts.googld361f35322.exe, 00000024.00000003.2820673524.0000000007C6A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2822343743.0000000007C6A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                              • Avira URL Cloud: safe
                                                                                                                              unknown
                                                                                                                              https://www.google.com/images/branding/product/ico/googleg_lodp.icod361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://www.youtube.com/signin?action_handle_signin%3Dtrue%26app%3Ddesktop%26hl%3Den%26next%3Dhttps%d361f35322.exe, 00000024.00000003.2820673524.0000000007C9E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://aka.ms/winsvr-2022-pshelpXpowershell.exe, 0000001E.00000002.2095956248.000001D420547000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://affordcharmcropwo.shop:443/apiNAME=userUSERPROFILE=C:RegAsm.exe, 0000001D.00000002.2226894863.0000000000CAA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                    • Avira URL Cloud: safe
                                                                                                                                    unknown
                                                                                                                                    https://t.me/RiseProSUPPORT&d361f35322.exe, 00000009.00000002.3082656269.0000000007D70000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://ipinfo.io/Mozilla/5.0d361f35322.exe, 00000009.00000002.3073575028.0000000001449000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000002.3350736971.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942487367.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2941258327.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2940853881.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2943456957.0000000001477000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2934755710.0000000001477000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3079225585.00000000013F2000.00000004.00000020.00020000.00000000.sdmp, RageMP131.exe, 0000002E.00000002.2637513543.000000000101B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        https://youtube.comVISITOR_INFO1_LIVEv10%MPGPH131.exe, 0000001B.00000003.3204849861.0000000008153000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819272725.0000000007CB5000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819336338.0000000007CE0000.00000004.00000020.00020000.00000000.sdmp, u6po.0.exe, 00000033.00000003.2232787568.00000000220DC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        • Avira URL Cloud: safe
                                                                                                                                        low
                                                                                                                                        https://ac.ecosia.org/autocomplete?q=d361f35322.exe, 00000009.00000003.2768632315.0000000007E0A000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2767613201.0000000007DD3000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2912919495.0000000007DE2000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.3207151088.0000000007D26000.00000004.00000020.00020000.00000000.sdmp, MPGPH131.exe, 0000001B.00000003.2942633187.0000000007CFD000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2823800272.0000000007D04000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760693387.0000000007CF6000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759849367.0000000007CCC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://t.me/risepro_botRageMP131.exe, 0000002E.00000002.2637513543.0000000001038000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            https://t.me/risepro_botld361f35322.exe, 00000024.00000003.2824519132.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762153720.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758759334.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2874193365.000000000143F000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000002.3081226044.0000000001440000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759980015.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760938757.0000000001442000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2760535342.0000000001441000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2825526740.0000000001443000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2762501264.0000000001441000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2822644005.0000000001443000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2758475716.0000000001443000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2819365667.0000000001444000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2820817674.0000000001443000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000024.00000003.2759415774.000000000143F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://affordcharmcropwo.shop/apiRegAsm.exe, 0000001D.00000002.2274630744.0000000000D77000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000001D.00000002.2226894863.0000000000CFB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              • 22%, Virustotal, Browse
                                                                                                                                              • Avira URL Cloud: safe
                                                                                                                                              unknown
                                                                                                                                              https://t.me/risepro_boted361f35322.exe, 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, d361f35322.exe, 00000009.00000003.2647485220.0000000001492000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                http://147.45.47.102:57893/hera/amadka.exe.lvMPGPH131.exe, 0000001B.00000002.3354809697.0000000007CC0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                • Avira URL Cloud: safe
                                                                                                                                                unknown
                                                                                                                                                • No. of IPs < 25%
                                                                                                                                                • 25% < No. of IPs < 50%
                                                                                                                                                • 50% < No. of IPs < 75%
                                                                                                                                                • 75% < No. of IPs
                                                                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                193.233.132.139
                                                                                                                                                unknownRussian Federation
                                                                                                                                                2895FREE-NET-ASFREEnetEUfalse
                                                                                                                                                185.172.128.90
                                                                                                                                                unknownRussian Federation
                                                                                                                                                50916NADYMSS-ASRUfalse
                                                                                                                                                34.117.186.192
                                                                                                                                                unknownUnited States
                                                                                                                                                139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                                                                                185.215.113.67
                                                                                                                                                unknownPortugal
                                                                                                                                                206894WHOLESALECONNECTIONSNLtrue
                                                                                                                                                193.233.132.175
                                                                                                                                                unknownRussian Federation
                                                                                                                                                2895FREE-NET-ASFREEnetEUfalse
                                                                                                                                                104.26.5.15
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                176.97.76.106
                                                                                                                                                unknownUnited Kingdom
                                                                                                                                                43658INTRAFFIC-ASUAfalse
                                                                                                                                                193.233.132.56
                                                                                                                                                unknownRussian Federation
                                                                                                                                                2895FREE-NET-ASFREEnetEUtrue
                                                                                                                                                142.251.2.84
                                                                                                                                                unknownUnited States
                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                193.233.132.234
                                                                                                                                                unknownRussian Federation
                                                                                                                                                2895FREE-NET-ASFREEnetEUfalse
                                                                                                                                                185.172.128.150
                                                                                                                                                unknownRussian Federation
                                                                                                                                                50916NADYMSS-ASRUtrue
                                                                                                                                                185.172.128.59
                                                                                                                                                unknownRussian Federation
                                                                                                                                                50916NADYMSS-ASRUfalse
                                                                                                                                                142.250.68.68
                                                                                                                                                unknownUnited States
                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                104.21.60.76
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                8.8.8.8
                                                                                                                                                unknownUnited States
                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                147.45.47.93
                                                                                                                                                unknownRussian Federation
                                                                                                                                                2895FREE-NET-ASFREEnetEUfalse
                                                                                                                                                104.21.67.211
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                104.21.90.14
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                77.221.151.47
                                                                                                                                                unknownRussian Federation
                                                                                                                                                30968INFOBOX-ASInfoboxruAutonomousSystemRUfalse
                                                                                                                                                189.195.132.134
                                                                                                                                                unknownMexico
                                                                                                                                                13999MegaCableSAdeCVMXfalse
                                                                                                                                                172.67.169.89
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                185.172.128.228
                                                                                                                                                unknownRussian Federation
                                                                                                                                                50916NADYMSS-ASRUfalse
                                                                                                                                                104.20.3.235
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                172.67.176.131
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                1.1.1.1
                                                                                                                                                unknownAustralia
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                13.89.179.12
                                                                                                                                                unknownUnited States
                                                                                                                                                8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                                                                                                                172.217.14.67
                                                                                                                                                unknownUnited States
                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                104.21.84.71
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                104.21.18.166
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                31.41.44.147
                                                                                                                                                unknownRussian Federation
                                                                                                                                                56577ASRELINKRUfalse
                                                                                                                                                185.172.128.19
                                                                                                                                                unknownRussian Federation
                                                                                                                                                50916NADYMSS-ASRUtrue
                                                                                                                                                172.217.12.131
                                                                                                                                                unknownUnited States
                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                104.21.92.190
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                104.20.4.235
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                239.255.255.250
                                                                                                                                                unknownReserved
                                                                                                                                                unknownunknownfalse
                                                                                                                                                172.67.19.24
                                                                                                                                                unknownUnited States
                                                                                                                                                13335CLOUDFLARENETUSfalse
                                                                                                                                                142.250.72.131
                                                                                                                                                unknownUnited States
                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                142.250.189.14
                                                                                                                                                unknownUnited States
                                                                                                                                                15169GOOGLEUSfalse
                                                                                                                                                IP
                                                                                                                                                192.168.2.4
                                                                                                                                                Joe Sandbox version:40.0.0 Tourmaline
                                                                                                                                                Analysis ID:1436254
                                                                                                                                                Start date and time:2024-05-04 05:51:05 +02:00
                                                                                                                                                Joe Sandbox product:CloudBasic
                                                                                                                                                Overall analysis duration:0h 20m 9s
                                                                                                                                                Hypervisor based Inspection enabled:false
                                                                                                                                                Report type:full
                                                                                                                                                Cookbook file name:default.jbs
                                                                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                Number of analysed new started processes analysed:58
                                                                                                                                                Number of new started drivers analysed:0
                                                                                                                                                Number of existing processes analysed:0
                                                                                                                                                Number of existing drivers analysed:0
                                                                                                                                                Number of injected processes analysed:0
                                                                                                                                                Technologies:
                                                                                                                                                • HCA enabled
                                                                                                                                                • EGA enabled
                                                                                                                                                • AMSI enabled
                                                                                                                                                Analysis Mode:default
                                                                                                                                                Sample name:1CMweaqlKp.exe
                                                                                                                                                renamed because original name is a hash value
                                                                                                                                                Original Sample Name:8a19d654cb37e4e51be045acaf097e74.exe
                                                                                                                                                Detection:MAL
                                                                                                                                                Classification:mal100.phis.troj.spyw.expl.evad.winEXE@133/199@0/39
                                                                                                                                                EGA Information:
                                                                                                                                                • Successful, ratio: 25%
                                                                                                                                                HCA Information:Failed
                                                                                                                                                Cookbook Comments:
                                                                                                                                                • Found application associated with file extension: .exe
                                                                                                                                                • Override analysis time to 240s for rundll32
                                                                                                                                                • Max analysis timeout: 600s exceeded, the analysis took too long
                                                                                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, Conhost.exe, dllhost.exe, WerFault.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                                                                • Execution Graph export aborted for target 1CMweaqlKp.exe, PID 2912 because there are no executed function
                                                                                                                                                • Execution Graph export aborted for target amert.exe, PID 7928 because it is empty
                                                                                                                                                • Execution Graph export aborted for target explorta.exe, PID 8016 because there are no executed function
                                                                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                                                                • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                                • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                                                • Report size getting too big, too many NtCreateKey calls found.
                                                                                                                                                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                                                                                                                                • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                                                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                                                                                                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                                                                • Skipping network analysis since amount of network traffic is too extensive
                                                                                                                                                TimeTypeDescription
                                                                                                                                                04:51:52Task SchedulerRun new task: explorta path: C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                04:52:15Task SchedulerRun new task: explorha path: C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                04:52:21AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run d361f35322.exe C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
                                                                                                                                                04:52:23Task SchedulerRun new task: MPGPH131 HR path: C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                                                                04:52:26Task SchedulerRun new task: MPGPH131 LG path: C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                                                                04:52:29AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                                                                                                                04:52:33Task SchedulerRun new task: NewB.exe path: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
                                                                                                                                                04:52:38AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ac861238af.exe C:\Users\user\1000021002\ac861238af.exe
                                                                                                                                                04:52:52AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run d361f35322.exe C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
                                                                                                                                                04:53:43AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RageMP131 C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                                                                                                                05:51:56API Interceptor1879x Sleep call for process: explorta.exe modified
                                                                                                                                                05:52:19API Interceptor2744x Sleep call for process: explorha.exe modified
                                                                                                                                                05:52:30API Interceptor46x Sleep call for process: RegAsm.exe modified
                                                                                                                                                05:52:30API Interceptor1756x Sleep call for process: NewB.exe modified
                                                                                                                                                05:52:30API Interceptor37x Sleep call for process: powershell.exe modified
                                                                                                                                                05:52:46API Interceptor1753562x Sleep call for process: d361f35322.exe modified
                                                                                                                                                05:53:00API Interceptor1x Sleep call for process: WerFault.exe modified
                                                                                                                                                05:53:10API Interceptor38201454x Sleep call for process: MPGPH131.exe modified
                                                                                                                                                05:53:15API Interceptor88x Sleep call for process: RageMP131.exe modified
                                                                                                                                                05:53:21API Interceptor6x Sleep call for process: jok.exe modified
                                                                                                                                                05:53:22API Interceptor164x Sleep call for process: rundll32.exe modified
                                                                                                                                                05:54:58API Interceptor438x Sleep call for process: file300un.exe modified
                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                193.233.132.139tZvjMg3Hw9.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                                                                                                • 193.233.132.139/rumba/buben.exe
                                                                                                                                                WlCIinu0yp.exeGet hashmaliciousLummaC Stealer, PureLog Stealer, RedLine, RisePro Stealer, Socks5Systemz, Vidar, zgRATBrowse
                                                                                                                                                • 193.233.132.139/padla/fiona.exe
                                                                                                                                                file.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                                                                                                • 193.233.132.139/padla/fiona.exe
                                                                                                                                                i1crvbOZAP.exeGet hashmaliciousAmadey, Glupteba, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                                                                                                                                • 193.233.132.139/silno/download.php
                                                                                                                                                185.172.128.90JlvRdFpwOD.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, SectopRAT, Stealc, Vidar, zgRATBrowse
                                                                                                                                                • 185.172.128.90/cpa/ping.php?substr=one&s=ab&sub=2838
                                                                                                                                                t8rEZVhm8F.exeGet hashmaliciousPureLog Stealer, RedLine, SectopRAT, zgRATBrowse
                                                                                                                                                • 185.172.128.90/cpa/ping.php?substr=two&s=ab&sub=0
                                                                                                                                                LpCkcXmzD1.exeGet hashmaliciousPureLog Stealer, RedLine, SectopRAT, zgRATBrowse
                                                                                                                                                • 185.172.128.90/cpa/ping.php?substr=five&s=ab&sub=0
                                                                                                                                                cdII5mhga0.exeGet hashmaliciousPureLog Stealer, RedLine, SectopRAT, Stealc, zgRATBrowse
                                                                                                                                                • 185.172.128.90/cpa/ping.php?substr=two&s=ab&sub=0
                                                                                                                                                vUHPxHrwaD.exeGet hashmaliciousPureLog Stealer, RedLine, zgRATBrowse
                                                                                                                                                • 185.172.128.90/cpa/ping.php?substr=five&s=ab&sub=0
                                                                                                                                                u7p2rff5aP.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, zgRATBrowse
                                                                                                                                                • 185.172.128.90/cpa/ping.php?substr=eight&s=ab&sub=0
                                                                                                                                                Cl87xHpeUC.exeGet hashmaliciousPureLog Stealer, RedLine, SectopRAT, Stealc, zgRATBrowse
                                                                                                                                                • 185.172.128.90/cpa/ping.php?substr=two&s=ab&sub=0
                                                                                                                                                WkyVbL3QZv.exeGet hashmaliciousPureLog Stealer, RedLine, SectopRAT, zgRATBrowse
                                                                                                                                                • 185.172.128.90/cpa/ping.php?substr=seven&s=ab&sub=0
                                                                                                                                                w9SuIZ5zTo.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, zgRATBrowse
                                                                                                                                                • 185.172.128.90/cpa/ping.php?substr=eight&s=ab&sub=0
                                                                                                                                                gpmpUMn9R3.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, zgRATBrowse
                                                                                                                                                • 185.172.128.90/cpa/ping.php?substr=two&s=ab&sub=0
                                                                                                                                                No context
                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                NADYMSS-ASRUSecuriteInfo.com.Trojan.Siggen28.41706.73.21156.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 185.172.128.142
                                                                                                                                                SecuriteInfo.com.Trojan.Siggen28.41706.73.21156.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 185.172.128.142
                                                                                                                                                exDbnS3M12.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                                                                                                                • 185.172.128.151
                                                                                                                                                qa4Ulla1BY.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                                                                                                                • 185.172.128.151
                                                                                                                                                U8uFcjIjAR.exeGet hashmaliciousLummaC, Amadey, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                                                                                                                                • 185.172.128.19
                                                                                                                                                JlvRdFpwOD.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, SectopRAT, Stealc, Vidar, zgRATBrowse
                                                                                                                                                • 185.172.128.228
                                                                                                                                                tstreds.gagg.exeGet hashmaliciousAtlantida StealerBrowse
                                                                                                                                                • 185.172.128.95
                                                                                                                                                tZvjMg3Hw9.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                                                                                                                • 185.172.128.203
                                                                                                                                                Luminar_v4.0.1.htaGet hashmaliciousCobalt Strike, Atlantida StealerBrowse
                                                                                                                                                • 185.172.128.95
                                                                                                                                                VOrqSh1Fts.exeGet hashmaliciousNeoreklami, PureLog StealerBrowse
                                                                                                                                                • 185.172.128.203
                                                                                                                                                GOOGLE-AS-APGoogleAsiaPacificPteLtdSGSecuriteInfo.com.Win32.PWSX-gen.11739.16980.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 34.117.186.192
                                                                                                                                                https://herozheng.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                • 34.117.152.183
                                                                                                                                                file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 34.117.186.192
                                                                                                                                                https://wywljs.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                • 34.117.152.183
                                                                                                                                                https://xdywna.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                • 34.117.152.183
                                                                                                                                                https://mandrillapp.com/track/click/30551860/topbusiness.ro?p=eyJzIjoiWmkwVnFVYXdRYlFmYnVnd3Y3OWdtR2h1anpvIiwidiI6MSwicCI6IntcInVcIjozMDU1MTg2MCxcInZcIjoxLFwidXJsXCI6XCJodHRwczpcXFwvXFxcL3RvcGJ1c2luZXNzLnJvXFxcL3dwLWFkbWluXFxcL2pzXFxcL3dpZGdldHNcXFwvbWVkaWFcXFwvP2FjdGlvbj12aWV3JjE0MD1jMk52ZEhRdVpHRm9ibXRsUUd4allYUjBaWEowYjI0dVkyOXQmcjE9MTQwJnIyPTE0MCZub2lzZT00Q0hBUlwiLFwiaWRcIjpcImVjMTY1MjE1OWRhYTRjZTA5ZGZhODE5NTEzNzU2Mjg1XCIsXCJ1cmxfaWRzXCI6W1wiOGMyZTc5NjYyNTU5N2FjNDFlODZkYmM4MWMwMjI2MTFjZjYyYTIzMlwiXX0ifQGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                • 34.117.77.79
                                                                                                                                                Pots.exeGet hashmalicious44userber Stealer, Rags StealerBrowse
                                                                                                                                                • 34.117.188.166
                                                                                                                                                vEaFCBsRb7.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 34.117.186.192
                                                                                                                                                oO2wHSVFJM.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 34.117.186.192
                                                                                                                                                https://www.opustrustweb.com/EmailTrackerAPI/open?token=eyJhbGciOiJkaXIiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2In0..62tVk07eUS1tgkfaDkQOqQ.nL-JZjGlYSBu9AibCOqK7-wJ7VXqjfoMrgeXwHgP6tLPx4s2jjofEWjZh794Ex5FiocFlK50_YxzembNjUsYkjIjaFyaIpNIDSPFE46cBlrxNy-t9VcCVcfKZphrojE0.AXzXZielor8D6px-r_wTOg&url=https://minicursodamariana.fun/nu/slceitil@emfa.ptGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                • 34.117.77.79
                                                                                                                                                FREE-NET-ASFREEnetEUSecuriteInfo.com.Win32.PWSX-gen.11739.16980.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                vEaFCBsRb7.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                oO2wHSVFJM.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                hYrJbjnzVc.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                KhbShPK91I.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 193.233.132.56
                                                                                                                                                4yFaZU8fhT.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                RY5YJaMEWE.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                MejqsB9tx9.exeGet hashmaliciousAmadeyBrowse
                                                                                                                                                • 193.233.132.56
                                                                                                                                                OUZXNOqKXg.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                WHOLESALECONNECTIONSNLU8uFcjIjAR.exeGet hashmaliciousLummaC, Amadey, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                                                                                                                                • 185.215.113.67
                                                                                                                                                Mz1rpaUC0i.exeGet hashmaliciousRedLineBrowse
                                                                                                                                                • 185.215.113.117
                                                                                                                                                957C4XK6Lt.exeGet hashmaliciousPhorpiexBrowse
                                                                                                                                                • 185.215.113.66
                                                                                                                                                c3nBx2HQG2.exeGet hashmaliciousGlupteba, Mars Stealer, Phorpiex, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                                                                                                                                                • 185.215.113.66
                                                                                                                                                file.exeGet hashmaliciousPhorpiexBrowse
                                                                                                                                                • 185.215.113.66
                                                                                                                                                SecuriteInfo.com.Trojan.Siggen28.25504.27914.23637.exeGet hashmaliciousGlupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
                                                                                                                                                • 185.215.113.46
                                                                                                                                                3RvPzfuxwM.exeGet hashmaliciousRedLineBrowse
                                                                                                                                                • 185.215.113.67
                                                                                                                                                bUWKfj04aU.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, RedLineBrowse
                                                                                                                                                • 185.215.113.32
                                                                                                                                                80OrFCsz0u.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                                                                                                                                • 185.215.113.46
                                                                                                                                                SecuriteInfo.com.Win64.Evo-gen.28136.30716.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                                                                                                                                • 185.215.113.46
                                                                                                                                                FREE-NET-ASFREEnetEUSecuriteInfo.com.Win32.PWSX-gen.11739.16980.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                file.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                vEaFCBsRb7.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                oO2wHSVFJM.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                hYrJbjnzVc.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                KhbShPK91I.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 193.233.132.56
                                                                                                                                                4yFaZU8fhT.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                RY5YJaMEWE.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                MejqsB9tx9.exeGet hashmaliciousAmadeyBrowse
                                                                                                                                                • 193.233.132.56
                                                                                                                                                OUZXNOqKXg.exeGet hashmaliciousRisePro StealerBrowse
                                                                                                                                                • 147.45.47.93
                                                                                                                                                No context
                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                C:\ProgramData\freebl3.dllpYJeC4VJbw.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                                                                                                                  Wb9LZ5Sn1l.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                                                                                                                    c4RAHq3BNl.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                                                                                                                      exDbnS3M12.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                                                                                                                        qa4Ulla1BY.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                                                                                                                          U8uFcjIjAR.exeGet hashmaliciousLummaC, Amadey, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                                                                                                                                            JlvRdFpwOD.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, SectopRAT, Stealc, Vidar, zgRATBrowse
                                                                                                                                                              file.exeGet hashmaliciousLummaC, GCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLineBrowse
                                                                                                                                                                file.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                  0dN59ZIkEM.exeGet hashmaliciousVidarBrowse
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\u6po.0.exe
                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 12, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 12
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):28672
                                                                                                                                                                    Entropy (8bit):2.769103894580091
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:96:Pxe9424im4/KlJiylsMjLslk5nYPphZEhcR2hO2mOwMU8tmKuzRk4PeOhZ3hcR1L:PxqZR8Z1txqWRHjNdaqlod8Itnb6Ggz
                                                                                                                                                                    MD5:5C6618D1A16E7CDC7483EEB2F8673CCC
                                                                                                                                                                    SHA1:F1AC3672B19A3B0B42530E5B4B35C1DC174A95BB
                                                                                                                                                                    SHA-256:B1A3506716B315D73158B363B031678C5372EDB4094A793557C0B44C9276087A
                                                                                                                                                                    SHA-512:02EABF44D6443533B8392CC52738F91806FF9931904413253564338A7A3C4921AD378B584F305ACBEC7464ADFB0182E433B72B30751E41165B25470E18BE1A2D
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j..........g...$......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\u6po.0.exe
                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):114688
                                                                                                                                                                    Entropy (8bit):0.9746603542602881
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                                                                                                                                    MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                                                                                                                                    SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                                                                                                                                    SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                                                                                                                                    SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\u6po.0.exe
                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):49152
                                                                                                                                                                    Entropy (8bit):0.8180424350137764
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                                                                                                                                    MD5:349E6EB110E34A08924D92F6B334801D
                                                                                                                                                                    SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                                                                                                                                    SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                                                                                                                                    SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\u6po.0.exe
                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):106496
                                                                                                                                                                    Entropy (8bit):1.1358696453229276
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                                                                                                                                    MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                                                                                                                                    SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                                                                                                                                    SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                                                                                                                                    SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\u6po.0.exe
                                                                                                                                                                    File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):40960
                                                                                                                                                                    Entropy (8bit):0.8553638852307782
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                                                                                                                                    MD5:28222628A3465C5F0D4B28F70F97F482
                                                                                                                                                                    SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                                                                                                                                    SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                                                                                                                                    SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2390528
                                                                                                                                                                    Entropy (8bit):7.919291926748545
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:bGY5918NqwTEgTcQ26a+gdlb2SAc4CSf24JbhV6qDpEovLz8MBpUoo:ohTP6t299CczlXMSlo
                                                                                                                                                                    MD5:C1BF02296C415ABC8B1F0ED13088D96D
                                                                                                                                                                    SHA1:6506E74510BC28BE318B75736EA0B36C62C6766C
                                                                                                                                                                    SHA-256:EE57FAE40BB8457A507F59569B111660438812426852E7B13299E841E82E8302
                                                                                                                                                                    SHA-512:CF4F8314054472920878DA5237D258EF9E2C728AE1BB0487F5ACCE938A3842567BD3036F8C40F6A6D18501F8D80E9A4FE1E7F517F1315A47326A0F0D29317D03
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 53%, Browse
                                                                                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L.....2f...............'..............]...........@...........................].......$...@.................................^0..r....p........................\...............................\.................................@................... . .`..........................@....rsrc........p......................@....idata .....0......................@... ..*..@......................@...agovwish......D.....................@...lcjgmmfi......]......T$.............@....taggant.0....].."...X$.............@...........................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):65536
                                                                                                                                                                    Entropy (8bit):0.9262529916296979
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:BiwrDiSYX6c0BU/uvFaGszuiFgZ24IO8Ed:Bi0DpYX6XBU/uvFadzuiFgY4IO8Ed
                                                                                                                                                                    MD5:9AD702CE02A0F52A90A53E6498973A48
                                                                                                                                                                    SHA1:C40437785F1B2C29B8CA788ADB8457B17C3D68CE
                                                                                                                                                                    SHA-256:98EC6B7889B1FFF50AB71A0594AB7CE34971331F29A5D67C972C0D7D39703E38
                                                                                                                                                                    SHA-512:8AF0854CC5B87E20D18D7455A49634C4D8BCE7B29A1CDF24F7285E522877E6436C8E75EF40502B787C7C51C76392F80C2361A2C510D3130C22164BB7E4CDDDFF
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.9.2.6.8.3.4.6.9.8.6.8.0.0.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.9.2.6.8.3.4.9.6.4.6.9.5.8.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.7.5.9.1.c.c.2.-.a.5.5.d.-.4.4.5.2.-.b.1.0.5.-.c.1.5.c.d.a.3.8.f.1.5.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.8.e.c.c.8.8.0.-.6.5.6.1.-.4.d.0.1.-.9.9.0.5.-.6.9.e.8.7.5.9.0.d.a.5.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.s.w.i.i.i.i.i...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.C.M.S.T.P...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.a.1.c.-.0.0.0.1.-.0.0.1.4.-.5.1.f.0.-.c.6.7.8.d.6.9.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.f.4.0.2.9.a.9.7.d.3.e.3.4.2.c.a.a.8.8.8.2.3.7.5.d.c.b.c.2.b.1.0.0.0.0.0.9.0.4.!.0.0.0.0.3.3.a.e.d.a.d.b.5.3.6.1.f.1.6.4.6.c.f.f.d.6.8.7.9.1.d.7.2.b.a.5.f.1.4.2.4.1.1.4.!.
                                                                                                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                    File Type:Mini DuMP crash report, 15 streams, Sat May 4 03:52:27 2024, 0x1205a4 type
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):173885
                                                                                                                                                                    Entropy (8bit):3.9108047922802434
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:1536:49bwiouBojRfjpN4uE2aOr/s1SVXRLTgC6EAE9VbCD+tT77z:4N2T4uEqyyBLTgbinqoz
                                                                                                                                                                    MD5:38E35A6BF86DCF0D6E7744133B83B2E2
                                                                                                                                                                    SHA1:839D5C9B5178B27CDB285A8B1116972ED4BC6B41
                                                                                                                                                                    SHA-256:8738A9D2CF3E9D83BBE406A33320000FDE809B26C9D2D88A0A6572B48125DABF
                                                                                                                                                                    SHA-512:53B2B78883162E091E2A3596201B19B2F2C2B1D097F7D9655EE2CA198E9B0EC02F67E99A2CE84BD01FE26AFACDC4969FA0BD10143BA693DAD1C4B28A7E343088
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:MDMP..a..... .........5f....................................$...............*9..........`.......8...........T...........P$.........................................................................................................eJ......L.......GenuineIntel............T.............5f.............................0..................W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):8322
                                                                                                                                                                    Entropy (8bit):3.698184749001198
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:R6l7wVeJ7C6n6YEuM6Pk+BgmfM4JBpr789bWVsfnym:R6lXJe6n6YEt6Pk+BgmfM4JQWufj
                                                                                                                                                                    MD5:6379E457AE376DE94A4F50B015222176
                                                                                                                                                                    SHA1:6912BFB8B002458673067DB500DB2DE7EE1DFE02
                                                                                                                                                                    SHA-256:E7F0B91CB0E665CC5E392ABEBDF81AAE6F3340D59B7D20F9A9146D62C0887826
                                                                                                                                                                    SHA-512:278C364262E266BB40243A274021DE7BCC458B57E9F3350CC926361AABD6AB417234222E03DD112DE9795992C6C3A939EB60992BDD72FC536C7D3369C387415F
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.5.8.8.<./.P.i.
                                                                                                                                                                    Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4652
                                                                                                                                                                    Entropy (8bit):4.481200693525412
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:48:cvIwWl8zs4Jg77aI9TQWpW8VY9Ym8M4JlAFT+q8wV1ym3Z01R2d:uIjf+I7Np7VxJQ/yAZ0T2d
                                                                                                                                                                    MD5:7F50CD8DB3CA5A180A9A19BEA2F3D353
                                                                                                                                                                    SHA1:C673368C66ED69028DD7EE824BC9D598130C2A80
                                                                                                                                                                    SHA-256:610F7B3E3006ABCAE8BF858593BDAEC61D4F5AFA2C3993B40D3100CB3E1B37F1
                                                                                                                                                                    SHA-512:A91270747B1F9187C7D2D1BF30075FC2F72D7987CAB5A61C9EA2BBA13583ABCF267344A0B2C32C31963064902A71316F70FDB56CC4232630BE3BCBA3404D676C
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="307855" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\u6po.0.exe
                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):685392
                                                                                                                                                                    Entropy (8bit):6.872871740790978
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:12288:4gPbPpxMofhPNN0+RXBrp3M5pzRN4l2SQ+PEu9tUs/abAQb51FW/IzkOfWPO9UN7:4gPbPp9NNP0BgInfW2WMC4M+hW
                                                                                                                                                                    MD5:550686C0EE48C386DFCB40199BD076AC
                                                                                                                                                                    SHA1:EE5134DA4D3EFCB466081FB6197BE5E12A5B22AB
                                                                                                                                                                    SHA-256:EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
                                                                                                                                                                    SHA-512:0B7F47AF883B99F9FBDC08020446B58F2F3FA55292FD9BC78FC967DD35BDD8BD549802722DE37668CC89EDE61B20359190EFBFDF026AE2BDC854F4740A54649E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                                                                                                    Joe Sandbox View:
                                                                                                                                                                    • Filename: pYJeC4VJbw.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: Wb9LZ5Sn1l.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: c4RAHq3BNl.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: exDbnS3M12.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: qa4Ulla1BY.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: U8uFcjIjAR.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: JlvRdFpwOD.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: 0dN59ZIkEM.exe, Detection: malicious, Browse
                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........4......p.....................................................@A........................H...S...............x............F..P/.......#................................... ..................@............................text............................... ..`.rdata....... ......................@..@.data...<F...0......................@....00cfg..............................@..@.rsrc...x...........................@..@.reloc...#.......$..."..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000071001\jok.exe
                                                                                                                                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Wed Oct 4 11:02:28 2023, atime=Wed Sep 27 04:28:27 2023, length=3242272, window=hide
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2104
                                                                                                                                                                    Entropy (8bit):3.458040216957206
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:48:8SddZTBnGRYrnvPdAKRkdAGdAKRFdAKR/U:8SJZ
                                                                                                                                                                    MD5:291F10E430D9186724155DB50C60E58E
                                                                                                                                                                    SHA1:D6B11FFA1B10A141BFE22AAC4C0CFDE8379668FA
                                                                                                                                                                    SHA-256:BEB397D3F1783456FA42B6EE68CC02F70603648549FF125AA44D78B246AA9079
                                                                                                                                                                    SHA-512:E17404BBC7960E15C02C0E0885EA12F27AC40840FFB6C2148B1182B8B7AC326CC0C0CC665C8D3CC3FB093E6F6013430572B532B05DF491AAC99FA8DAD294235D
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:L..................F.@.. ......,..............q.... y1.....................#....P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.IDW5`....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.VDWO`....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.VDWO`....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.VDWO`..........................."&.A.p.p.l.i.c.a.t.i.o.n.....`.2. y1.;W.+ .chrome.exe..F......CW.VDWI`..........................,.6.c.h.r.o.m.e...e.x.e.......d...............-.......c............F.......C:\Program Files\Google\Chrome\Application\chrome.exe....A.c.c.e.s.s. .t.h.e. .I.n.t.e.r.n.e.t.;.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.!.-.-.p.r.o.x.y.-.s.e.r.v.e.r
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1166336
                                                                                                                                                                    Entropy (8bit):7.035569611926666
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8auw2+b+HdiJUX:oTvC/MTQYxsWR7auw2+b+HoJU
                                                                                                                                                                    MD5:34C3E84E001DB4CF23A94BE34D462F11
                                                                                                                                                                    SHA1:9B8C2530B209F24FE68453B6B0173C240F308DA9
                                                                                                                                                                    SHA-256:A72A1A6DDEA799284A544697471BE6F796CB7A0B7CF8857F3FDC7277EEAE10CC
                                                                                                                                                                    SHA-512:F31948B3F6A431BCC4297D7AC9CA36D362947202A9B9D4322476AFE5F60C1C8E13F1E7FD93E38410F3D6ED87B2C1920709C25A0F40A23BB602F8F374527DAA5B
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 35%, Browse
                                                                                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L.....5f..........".................w.............@..........................0............@...@.......@.....................d...|....@..|a.......................u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc...|a...@...b..................@..@.reloc...u.......v...V..............@..B........................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 34%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 44%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 32%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 43%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):7462
                                                                                                                                                                    Entropy (8bit):5.420482116403958
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                                                                                                                                    MD5:77F762F953163D7639DFF697104E1470
                                                                                                                                                                    SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                                                                                                                                    SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                                                                                                                                    SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 75%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 72%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 32%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 43%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 75%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 72%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255805140799215
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWo:a72A4VgEvmcH9yKCpM/e4iWo
                                                                                                                                                                    MD5:F6DFD7F39EF9EEF9094A36B574ADFA5E
                                                                                                                                                                    SHA1:B57E4E7B8D0D1E9BC9238D79A7D7B7536812CC7B
                                                                                                                                                                    SHA-256:1E0BFF105B6B55998E1B569CC2A9AD5A2792D8FC7F020630DEAE401000F510F0
                                                                                                                                                                    SHA-512:5258C4E3A4952A3F09C0BB44D07CA237071BF1BABB2D2B4D5B54966E4CB7FA87FE309546775E2D2A0B54EA31B8F5F4FBA189265CD6AE715EB9127EE69D4FEAA6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 43%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 43%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 75%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 72%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255805140799215
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWo:a72A4VgEvmcH9yKCpM/e4iWo
                                                                                                                                                                    MD5:F6DFD7F39EF9EEF9094A36B574ADFA5E
                                                                                                                                                                    SHA1:B57E4E7B8D0D1E9BC9238D79A7D7B7536812CC7B
                                                                                                                                                                    SHA-256:1E0BFF105B6B55998E1B569CC2A9AD5A2792D8FC7F020630DEAE401000F510F0
                                                                                                                                                                    SHA-512:5258C4E3A4952A3F09C0BB44D07CA237071BF1BABB2D2B4D5B54966E4CB7FA87FE309546775E2D2A0B54EA31B8F5F4FBA189265CD6AE715EB9127EE69D4FEAA6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 43%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 43%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 34%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 44%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):7462
                                                                                                                                                                    Entropy (8bit):5.420482116403958
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                                                                                                                                    MD5:77F762F953163D7639DFF697104E1470
                                                                                                                                                                    SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                                                                                                                                    SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                                                                                                                                    SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):7462
                                                                                                                                                                    Entropy (8bit):5.420482116403958
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                                                                                                                                    MD5:77F762F953163D7639DFF697104E1470
                                                                                                                                                                    SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                                                                                                                                    SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                                                                                                                                    SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):326656
                                                                                                                                                                    Entropy (8bit):6.704045744410397
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:uJNgSgE68pOq15/QN1cV+exuCNT0XLeaU2eAoX4QwqnoBm9sZ2gfg2eX15CFusKP:UnN15YgV27It/4QwkoBm9Vg5m1GK0
                                                                                                                                                                    MD5:FECBBAC6C0B95A95776F29BDAA57C6D5
                                                                                                                                                                    SHA1:DC1B7F093F0FCEC1502916F2F248ECB5916F15CC
                                                                                                                                                                    SHA-256:83765226ABB0423196C083BC6B6FB5E8EA2D078B4C885165FEC1401ACB581695
                                                                                                                                                                    SHA-512:1B1D573930B2FE99B91A327DFAE23C14536A29A4E71898E77D6B8697B11A521EE07F4032F5F26ABB1DB28BBF6E6D198599C68ABAD984B6C6C15C7EFD1EA9AFCF
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....Zd.....................|`......A....... ....@...........................a......'.........................................<....._. ............................!..8............................y..@............ ..x............................text............................... ..`.rdata..<m... ...n..................@..@.data.....]......n...~..............@....rsrc... ....._.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 34%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 44%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):7462
                                                                                                                                                                    Entropy (8bit):5.420482116403958
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                                                                                                                                    MD5:77F762F953163D7639DFF697104E1470
                                                                                                                                                                    SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                                                                                                                                    SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                                                                                                                                    SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 32%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 43%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2437912
                                                                                                                                                                    Entropy (8bit):7.913512358164593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:25HOOeI0PrBsku297659/XQR70jEUHD5Gl09XCWKYhNj:25rebqkXe5ZQRA/FGl0Z3KKj
                                                                                                                                                                    MD5:F6A0D4349D9A0CEAB75A7BAF7285F2A9
                                                                                                                                                                    SHA1:9ABFF945F6987830AA0A1E2FB798080DC91011D6
                                                                                                                                                                    SHA-256:B48255236A72B0D96FD25F42BE98CFB1694AA7D4824EE46C2E3B0DB397B7FDDF
                                                                                                                                                                    SHA-512:BB701C5BF26A9DEBDCB325DE902BC4A254EFBBF737129BBA86D19A1207E647F54BA1D2056A68ED39B22BBD14BB50D2125C9D82FFDB7337806975FCBA6A1B4C9D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 42%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 37%, Browse
                                                                                                                                                                    Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d.....)f.........."....'.....J........i........@......................................%... ..................................................`*.......'.......h.......$..a...................................p*.(................................................... ..'............................. ......'..........................rsrc.........'.....................@....idata.......`*......X..............@....tls.........p*......Z...................themida..>...*......\..............`....boot....v....i..v...\..............`..`........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):7462
                                                                                                                                                                    Entropy (8bit):5.420482116403958
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                                                                                                                                    MD5:77F762F953163D7639DFF697104E1470
                                                                                                                                                                    SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                                                                                                                                    SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                                                                                                                                    SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe
                                                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):42
                                                                                                                                                                    Entropy (8bit):4.0050635535766075
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                                                                                                                                                                    MD5:84CFDB4B995B1DBF543B26B86C863ADC
                                                                                                                                                                    SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                                                                                                                                                                    SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                                                                                                                                                                    SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285246977507
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/Ec:pIS769aql4v/ahlHt2c0v7pgQoJ
                                                                                                                                                                    MD5:80D75B9A49171FE842E9CD07A45CBA68
                                                                                                                                                                    SHA1:E6CE3056F850E9480BA6DB11A350EEEEAD9EEB90
                                                                                                                                                                    SHA-256:BCF01CEA95C62EFA97319E5955FA58EF2523C81FF6BF45C4A7489F68B2A6F856
                                                                                                                                                                    SHA-512:8D7B06903D7BDFA9218FCE2C89CCF2211A0C5AA480CCE933C8FF06E7DDCB4422FF113343B680294DCA3C0EA3D9CEFE53C2868F166F719829BA70A6B97413D1B7
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 34%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 44%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):428544
                                                                                                                                                                    Entropy (8bit):6.494348537450964
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:12288:5noAx+FnmuQhimtPURimLqevmipum+K4Y:5+FnmuGtpMLnLYY
                                                                                                                                                                    MD5:0099A99F5FFB3C3AE78AF0084136FAB3
                                                                                                                                                                    SHA1:0205A065728A9EC1133E8A372B1E3864DF776E8C
                                                                                                                                                                    SHA-256:919AE827FF59FCBE3DBAEA9E62855A4D27690818189F696CFB5916A88C823226
                                                                                                                                                                    SHA-512:5AC4F3265C7DD7D172284FB28C94F8FC6428C27853E70989F4EC4208F9897BE91720E8EEE1906D8E843AB05798F3279A12492A32E8A118F5621AC5E1BE2031B6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Yara Hits:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\NewB[1].exe, Author: Joe Security
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 91%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 85%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......wD..3%..3%..3%..hM..=%..hM...%..hM.. %...H..!%...H..'%...H..F%..hM.."%..3%...%...K..2%...Ko.2%...K..2%..Rich3%..........................PE..L.... Me..........................................@.......................................@.................................D...x....p...........................L..P...8...................,...........@............................................text............................... ..`.rdata..............................@..@.data....F... ...4..................@....rsrc........p.......:..............@..@.reloc...L.......N...<..............@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1885696
                                                                                                                                                                    Entropy (8bit):7.950545984341186
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:cEn984TQ5OfyNqCq9/eMwfbsbTWX/cEeprH+/hngYQgDqa:7e4M5eyNqCuGCT2/cprH+/Rgcea
                                                                                                                                                                    MD5:E67C8B3E5EC9F64052FCD2F45341CFA5
                                                                                                                                                                    SHA1:0D809A3D9BC171D7A0DCBF2B6C3F3B009444ADC9
                                                                                                                                                                    SHA-256:1A94AE9809AF376B056D751363C524C22284D4BD978F30723DEB2C1F8307245B
                                                                                                                                                                    SHA-512:FE4C0E98881465A6627522F1D484983EBC9298870107156986A5BD6E5DB78D7C4D1FDA9B2B2DE663EFD343FD90A01DF058A85895B8BB1347B2026FB327A66624
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Avira, Detection: 100%
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    • Antivirus: Virustotal, Detection: 58%, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.Y@...@...@....m..Q....m.......h..R....h..W....h..5....m..U....m..S...@........k..A....k1.A....k..A...Rich@...........PE..L...o..e..............................J...... ....@...........................J...........@.................................V...j............................J...............................J..................................................... . ............................@....rsrc...............................@....idata ............................@... .@*.........................@...avcjhwxy......0.....................@...nkwkrymv......J.....................@....taggant.0....J.."..................@...................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):399464
                                                                                                                                                                    Entropy (8bit):7.972213708887707
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:LlEGEyWKpTlDB878Ed8nFO+tFXFBCorNVDq5GZJrtLK7BYY0g2wqS5e8x:KGEyWERrpdTjZDqeh2Beg28Tx
                                                                                                                                                                    MD5:18B50C6016CD5D7FF2F01B71A5E3373B
                                                                                                                                                                    SHA1:D62DC0A84E39A1FFF24163153761C62A55FF30FE
                                                                                                                                                                    SHA-256:18D62AA8D04103058203E75FE4039DADB80EB0927DDD23B14F89C984F28AEA97
                                                                                                                                                                    SHA-512:27E0017FA30A9322E71191B2C4954D1F55D8FE827F029092FA3BDD6A52E799BBB671A776C3596A1DF02D8EBE660B2192F293CB67252EC289BBC99A8725CEAA19
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...-............."...0..Z............... ....@...... ..............................k.....`..........................................................................................y..8............................................................ ..H............text....Z... ...\.................. ..`.rsrc................^..............@..@........................................H......../...J......M.....................................................{....*"..}....*..*.~....*.......*.~....*.......*.~....*.......**.........*^.(3.......}......}....*&.(3.....*.....o.....*..*.~....*.......**...( ....*&...}....*..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z&...}....*&...}....*..*&..(E....*VsP...
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6401863
                                                                                                                                                                    Entropy (8bit):7.960348454310837
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:YPvEbLriWEmQfgLVPn2qQniV0kSybkHXrsfM8n1TQuDFviH345nBIvgj2dKczf:SE7iWWaVP2qeiTHkbYMyTeHcNjEKczf
                                                                                                                                                                    MD5:9FB56DD5B5BEB0B9C5D0102F22373C0B
                                                                                                                                                                    SHA1:5559DC162D09C11C1ED80AEDF8E9FA86FD531E4C
                                                                                                                                                                    SHA-256:A65B290AA9EBFB82746CF75440C19956169F48D7DCBEBAFDE6996C9B46039539
                                                                                                                                                                    SHA-512:AB6C88ACDDF3350F4DA37E20E38FC1BD4AC56433D5320FA071649DDF261CF1B6BB4692B54791E08E47B9E887A87BA5704AFDE6CB9AA9220C1DA7F27C85400A1C
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........w..w..w..<.V.w..<.T..w..<.U.w....Z.w......w......w......w...$.w...4.w..w..v......w......w....X.w......w..Rich.w..........PE..L......d...............!.....................@....@.......................................@.............................4.......P....`.......................`...#......T............................f..@............@..x...\... ....................text....-.......................... ..`.rdata......@.......2..............@..@.data...PG..........................@....didat.......P......................@....rsrc........`......................@..@.reloc...#...`...$..................@..B................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2426880
                                                                                                                                                                    Entropy (8bit):7.9188002531384605
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:uGY5918NqwTEgTcaGkfI7S4295yiwYxnoOxMD54JUD4n4qvdr:HhTvN42bTphtGDDD4n4i
                                                                                                                                                                    MD5:B39F1B0CEE6D4E2DB93089CF201083BB
                                                                                                                                                                    SHA1:9DA7EEB833920AA16A880189D0AEDB87933A7444
                                                                                                                                                                    SHA-256:8DF27C757A73ABA800A0EEEE3186F1A92F009EF0889B8EB42604F518FB842C87
                                                                                                                                                                    SHA-512:6CFE01EF0DDD6AEA4BA5277D2CF8F7DED383DB0E2A1DC468CF0DDEDA29699699305C456D96F4097902D87BE05B6CAC00FB7683B116588BC1A5232B634190816C
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L.....2f...............'..............^...........@...........................^.....DP%...@.................................^ ..r....p........................]...............................].................................@................... . .`..........................@....rsrc........p......................@....idata ..... ......................@... .`+..0......................@...zhbidvgs. ....D.....................@...swmxyxsi......^.......$.............@....taggant.0....^.."....$.............@...........................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2831872
                                                                                                                                                                    Entropy (8bit):7.076550333890677
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:jOvdoJl7MWepyIsE7ddkxuq8rW5vs0VaCQeb5tsQcGo:GYIscWxuq8rUlVaCQo5tsQG
                                                                                                                                                                    MD5:31841361BE1F3DC6C2CE7756B490BF0F
                                                                                                                                                                    SHA1:FF2506641A401AC999F5870769F50B7326F7E4EB
                                                                                                                                                                    SHA-256:222393A4AB4B2AE83CA861FAEE6DF02AC274B2F2CA0BED8DB1783DD61F2F37EE
                                                                                                                                                                    SHA-512:53D66FA19E8DB360042DADC55CAAA9A1CA30A9D825E23ED2A58F32834691EB2AAAA27A4471E3FC4D13E201ACCC43160436ED0E9939DF1CC227A62A09A2AE0019
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........B............C......C..9...C......R!......R!......C.............R!.....c"......c"......Rich....................PE..L...w.(f...............'..........................@...........................+...........@.................................0.*.P.............................+..I..0m..8...........................Hl..@.............*.0............................text............................... ..`.rdata...M.......N..................@..@.data...............................@....idata..*.....*.......*.............@..@.00cfg........+.......*.............@..@.reloc..qh....+..j....*.............@..B........................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1285632
                                                                                                                                                                    Entropy (8bit):6.460494158653329
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24576:IvkQL6YY4wMPSYZofkf0Gh6Pi41+a9uyP5dggky+yC7:IsMPSYcS5wPi095Pbg9y
                                                                                                                                                                    MD5:15A42D3E4579DA615A384C717AB2109B
                                                                                                                                                                    SHA1:22AEEDEB2307B1370CDAB70D6A6B6D2C13AD2301
                                                                                                                                                                    SHA-256:3C97BB410E49B11AF8116FEB7240B7101E1967CAE7538418C45C3D2E072E8103
                                                                                                                                                                    SHA-512:1EB7F126DCCC88A2479E3818C36120F5AF3CAA0D632B9EA803485EE6531D6E2A1FD0805B1C4364983D280DF23EA5CA3AD4A5FCA558AC436EFAE36AF9B795C444
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Yara Hits:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\cred64[1].dll, Author: Joe Security
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............^...^...^.._...^.._...^.._2..^W._..^W._...^W._...^.._...^...^C..^.._...^.._...^..X^...^.._...^Rich...^........................PE..d...i..e.........." .........R......h........................................P............`......................................... ...X...x........ .......`..(............0..........p........................... ................................................text............................... ..`.rdata..............................@..@.data...L........D..................@....pdata..(....`......................@..@_RDATA..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1166336
                                                                                                                                                                    Entropy (8bit):7.035569611926666
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24576:oqDEvCTbMWu7rQYlBQcBiT6rprG8auw2+b+HdiJUX:oTvC/MTQYxsWR7auw2+b+HoJU
                                                                                                                                                                    MD5:34C3E84E001DB4CF23A94BE34D462F11
                                                                                                                                                                    SHA1:9B8C2530B209F24FE68453B6B0173C240F308DA9
                                                                                                                                                                    SHA-256:A72A1A6DDEA799284A544697471BE6F796CB7A0B7CF8857F3FDC7277EEAE10CC
                                                                                                                                                                    SHA-512:F31948B3F6A431BCC4297D7AC9CA36D362947202A9B9D4322476AFE5F60C1C8E13F1E7FD93E38410F3D6ED87B2C1920709C25A0F40A23BB602F8F374527DAA5B
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L.....5f..........".................w.............@..........................0............@...@.......@.....................d...|....@..|a.......................u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc...|a...@...b..................@..@.reloc...u.......v...V..............@..B........................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):329352
                                                                                                                                                                    Entropy (8bit):7.976897467568528
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:DFZcMaQk5oqtag00+wX3bSJxuI2Hc8PlsLNuPhRF1Ym:DFZg5Ztj00+03mJxmc8PfPwm
                                                                                                                                                                    MD5:1C7D0F34BB1D85B5D2C01367CC8F62EF
                                                                                                                                                                    SHA1:33AEDADB5361F1646CFFD68791D72BA5F1424114
                                                                                                                                                                    SHA-256:E9E09C5E5D03D21FCA820BD9B0A0EA7B86AB9E85CDC9996F8F1DC822B0CC801C
                                                                                                                                                                    SHA-512:53BF85D2B004F69BBBF7B6DC78E5F021ABA71B6F814101C55D3BF76E6D058A973BC58270B6B621B2100C6E02D382F568D1E96024464E8EA81E6DB8CCD948679D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...]h.f................................. ........@.. ....................... .......b....`.................................L...O.......:................N........................................................... ............... ..H............text........ ...................... ..`.rsrc...:...........................@..@.reloc..............................@..B........................H........................................................................0..........r...p.*..(....*..0..........rg..p.*..(....*...]*.0..\.........i.s........+...o.......X.... ....2..o.......o........8.........-X....d....(......(....&s..........o......o.....1......o...........o....r...po.....3....+.s.........o.......o.......o.......o.......o.......o.......Lo.......o.......o...........o........o.....Yo.........+........(...........o....+....2...X.. ....?........+A..... ........
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):112128
                                                                                                                                                                    Entropy (8bit):6.400158525810517
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:Q3uSD+ZwruS0bGcuZRt2sSZV/Q3IegRQod4l:AuTiabHuZRAFtlD4l
                                                                                                                                                                    MD5:726CD06231883A159EC1CE28DD538699
                                                                                                                                                                    SHA1:404897E6A133D255AD5A9C26AC6414D7134285A2
                                                                                                                                                                    SHA-256:12FEF2D5995D671EC0E91BDBDC91E2B0D3C90ED3A8B2B13DDAA8AD64727DCD46
                                                                                                                                                                    SHA-512:9EA82E7CB6C6A58446BD5033855947C3E2D475D2910F2B941235E0B96AA08EEC822D2DD17CC86B2D3FCE930F78B799291992408E309A6C63E3011266810EA83E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Yara Hits:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\clip64[1].dll, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_3, Description: Yara detected Amadey\'s Clipper DLL, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\clip64[1].dll, Author: Joe Security
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......'...c.j.c.j.c.j.8.i.i.j.8.o..j.8.n.q.j..n.l.j..i.r.j..o.B.j.8.k.d.j.c.k...j...c.`.j...j.b.j.....b.j...h.b.j.Richc.j.........................PE..L...j..e...........!.....$...........f.......@............................................@......................... ...........P.......................................8...........................(...@............@..L............................text...6#.......$.................. ..`.rdata..4i...@...j...(..............@..@.data...............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\u6po.0.exe
                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):685392
                                                                                                                                                                    Entropy (8bit):6.872871740790978
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:12288:4gPbPpxMofhPNN0+RXBrp3M5pzRN4l2SQ+PEu9tUs/abAQb51FW/IzkOfWPO9UN7:4gPbPp9NNP0BgInfW2WMC4M+hW
                                                                                                                                                                    MD5:550686C0EE48C386DFCB40199BD076AC
                                                                                                                                                                    SHA1:EE5134DA4D3EFCB466081FB6197BE5E12A5B22AB
                                                                                                                                                                    SHA-256:EDD043F2005DBD5902FC421EABB9472A7266950C5CBACA34E2D590B17D12F5FA
                                                                                                                                                                    SHA-512:0B7F47AF883B99F9FBDC08020446B58F2F3FA55292FD9BC78FC967DD35BDD8BD549802722DE37668CC89EDE61B20359190EFBFDF026AE2BDC854F4740A54649E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L....4.c.........."!.........4......p.....................................................@A........................H...S...............x............F..P/.......#................................... ..................@............................text............................... ..`.rdata....... ......................@..@.data...<F...0......................@....00cfg..............................@..@.rsrc...x...........................@..@.reloc...#.......$..."..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4448942
                                                                                                                                                                    Entropy (8bit):7.996740744908945
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:98304:zgwR5qybOM3rY1buPd0+01mQ5YBGUYDU4a6FXg+d70MYVSuEQQpnlJYtDf+8:zgDyaM3qbA0+07YBeDa6a++b5Evn4tF
                                                                                                                                                                    MD5:0F52E5E68FE33694D488BFE7A1A71529
                                                                                                                                                                    SHA1:11D7005BD72CB3FD46F24917BF3FC5F3203F361F
                                                                                                                                                                    SHA-256:EFD29C35766C607AA15D1CB83DEC625739791B1616AD37D5B47E78CDB8A42CA8
                                                                                                                                                                    SHA-512:238FBB1C04EEF2F2005CB7ABF0223E3CD062D9D2840966292E19DCAA495609E134A0BDC35389AE9925ECFC787A13772D3AC7B29058579F702BC849DD0343C400
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L......P.....................\....../.............@..........................P......3-......................................t........0..................................................................................l............................text.............................. ..`.rdata...;.......<..................@..@.data....M..........................@....rsrc........0......................@..@........U..`.A.......S3.;.VWt.f9.b.A.t...`.A.P.c...P....Y.nj'.S....u..v..=..A..6P......P....9^..].v8.^..3......h..A.P..........P......P..x.A..E..E....;F.r......P.f...Y.r8..j...t.A...t$..D....V....s......A..F8......^.j..q.....A..3.9.`.A.t...@....9D$.t..t$.Ph.....5X.A.....A.3.....D$..`...|$..u..@.....3.....p.A.............t$..D$..t$...`.A./.@..t$...P.Q..%`.A...3.....T$..L$....f..AABBf..u..L$.3.f9.t.@f.<A.u...t$...T.A..L$.......%..........S.\$.V..C;^.tLW3.j.Z...........Q.d.....3.9F.Y~.9F
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):162304
                                                                                                                                                                    Entropy (8bit):7.967195699444992
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:I1lmOH349skOxH49PsH+8KqnuHV7A/5S+c6wABA47PN/6wHFHJ:I1iekOxYlI+EuH2cvAe4BywlH
                                                                                                                                                                    MD5:586F7FECACD49ADAB650FAE36E2DB994
                                                                                                                                                                    SHA1:35D9FB512A8161CE867812633F0A43B042F9A5E6
                                                                                                                                                                    SHA-256:CF88D499C83DA613AD5CCD8805822901BDC3A12EB9B15804AEFF8C53DC05FC4E
                                                                                                                                                                    SHA-512:A44A2C99D18509681505CF70A251BAF2558030A8648D9C621ACC72FAFCB2F744E3EF664DFD0229BAF7C78FB72E69F5D644C755DED4060DCAFA7F711D70E94772
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....G..........."...0..p...........4... ........@.. ....................................`.................................74..O....................................3..8............................................ ............... ..H............text...Po... ...p.................. ..`.rsrc................r..............@..@.reloc...............x..............@..B................k4......H........$.................................................................]*....0............i.s........+...o.......X.... ....2..o.......o........8.........-N....d....(......(....&s..........o.........o...........o....r...p(.....3....+.s....%.o....%.o....%.o....%.o....%.o....%.o....%.Lo....%.o....%.o....%.o....%o.....Yo.........+........(...........o....+....2...X.. ....?........+<. ....... ...............XX.. ....].......................X.. ....2........8.......+w..X ....].
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):279040
                                                                                                                                                                    Entropy (8bit):6.729582020715566
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:Dw7X5rSoVVk3NqPNPhZ0Q4KROPnEJRYiyP:D0xSoVyNqPNIXGRe
                                                                                                                                                                    MD5:A9C28724B16C3BB3AF2FDB5AA9BE277C
                                                                                                                                                                    SHA1:BEF9C7B857D0BC6C0D90204765704CA411A60E6D
                                                                                                                                                                    SHA-256:3500071769305B1D5753CCBDCB16BCD2AB047AE7994741E4628F68FEB939E9B7
                                                                                                                                                                    SHA-512:6966DD9AE3C17C83DB07FFAF69D035A89D82A315DD92D7465192E0FC14C7E750B1FB2163C662A926B103E516FFFDB345112353F054CAD079AAB96A1B17A4BC3F
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........e.\...\...\...Q...@...Q...#...Q...w...U...Y...\...6....D..]...Q...]....D..]...Rich\...................PE..L....Nkc......................_......C....... ....@...........................`.................................................<....._..[...........................!..8........................... z..@............ ..p............................text............................... ..`.rdata..Bm... ...n..................@..@.data...H.]......r...t..............@....rsrc....[...._..\..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255803870917765
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWl:a72A4VgEvmcH9yKCpM/e4iWl
                                                                                                                                                                    MD5:85D23A7E1BF2207A3FA825136090E00D
                                                                                                                                                                    SHA1:A1FDCAF5B513DAB9A0A6D0390626F808E508765E
                                                                                                                                                                    SHA-256:F0C8D2724E6659B3DE34A5422376194EBB203B2D5EDC49F61CEFE483A2E73E6D
                                                                                                                                                                    SHA-512:0714573D799E4D5B4A3DA96E192AFA12A211421BC022FE6671EB67AD81BD581012581F919A20EDBF8BEB32AF87FFDB7A518424D5A1A9E56556A4BBFA72CE1CC2
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):578048
                                                                                                                                                                    Entropy (8bit):7.272707802677416
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:12288:D/fI5jU8KHNXx/WRjeew+6P5zwMzAbPxlj6M+KjLHo:D3IYNXxya9+TMzMTj6rKjb
                                                                                                                                                                    MD5:F15A9CFA3726845017A7F91ABE0A14F7
                                                                                                                                                                    SHA1:5540AE40231FE4BF97E59540033B679DDA22F134
                                                                                                                                                                    SHA-256:2DEC75328413D4C278C119DB42920FB183A88A5398D56ECC80C8CC74FBA13071
                                                                                                                                                                    SHA-512:1C2AF9608736AD6A02D093F769FE5EC5A06CB395A639E021D4EE3F6C46CEBC8C101E7DB1064984F801AD3BEE65D81B95FE6E2E60C0EC949BB172BA9C455B9869
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(tY.F'Y.F'Y.F'..E&U.F'..C&.F'..B&L.F'..B&K.F'..E&M.F'..G&\.F'Y.G'..F'..C&..F'..C&X.F'..D&X.F'RichY.F'................PE..L.....4f...............'.............a.......0....@..........................?............@..................................0..................................l......................................@............0..<............................text............................... ..`.DAX.........0......................@..@.data...T...........................@....Left...............................@....reloc..l...........................@..B.INV.........0......................@...........................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):311296
                                                                                                                                                                    Entropy (8bit):5.0817932970004
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:uq6EgY6i4rUjhYMLwPcologL/ejZWTACtAti0lcZqf7D34leqiOLibBOp:VqY6inwPDpKZWTA+AplcZqf7DIvL
                                                                                                                                                                    MD5:8510BCF5BC264C70180ABE78298E4D5B
                                                                                                                                                                    SHA1:2C3A2A85D129B0D750ED146D1D4E4D6274623E28
                                                                                                                                                                    SHA-256:096220045877E456EDFEA1ADCD5BF1EFD332665EF073C6D1E9474C84CA5433F6
                                                                                                                                                                    SHA-512:5FF0A47F9E14E22FC76D41910B2986605376605913173D8AD83D29D85EB79B679459E2723A6AD17BC3C3B8C9B359E2BE7348EE1C21FA2E8CEB7CC9220515258D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Yara Hits:
                                                                                                                                                                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\jok[1].exe, Author: Joe Security
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...)v................0................. ... ....@.. ....................... ............@.................................t...O.... ..............................X................................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2390528
                                                                                                                                                                    Entropy (8bit):7.919291926748545
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:bGY5918NqwTEgTcQ26a+gdlb2SAc4CSf24JbhV6qDpEovLz8MBpUoo:ohTP6t299CczlXMSlo
                                                                                                                                                                    MD5:C1BF02296C415ABC8B1F0ED13088D96D
                                                                                                                                                                    SHA1:6506E74510BC28BE318B75736EA0B36C62C6766C
                                                                                                                                                                    SHA-256:EE57FAE40BB8457A507F59569B111660438812426852E7B13299E841E82E8302
                                                                                                                                                                    SHA-512:CF4F8314054472920878DA5237D258EF9E2C728AE1BB0487F5ACCE938A3842567BD3036F8C40F6A6D18501F8D80E9A4FE1E7F517F1315A47326A0F0D29317D03
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L.....2f...............'..............]...........@...........................].......$...@.................................^0..r....p........................\...............................\.................................@................... . .`..........................@....rsrc........p......................@....idata .....0......................@... ..*..@......................@...agovwish......D.....................@...lcjgmmfi......]......T$.............@....taggant.0....].."...X$.............@...........................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:modified
                                                                                                                                                                    Size (bytes):14437
                                                                                                                                                                    Entropy (8bit):4.960379440179098
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:384:iVib49PVoGIpN6KQkj2kkjh4iUxMhQzhIqYo8YKib4o:iFPV3IpNBQkj2Nh4iUxMhihIqYo8YR
                                                                                                                                                                    MD5:F2E1B889FAD5371C1763FB12D73B4EAE
                                                                                                                                                                    SHA1:AE45955F14208A1232CD0BB6EDEB1D5CC7C3CCA1
                                                                                                                                                                    SHA-256:F2EF4393FE68ED5FD087C4E656340A94B58D90B464F9427C2A01C7C880B8E95B
                                                                                                                                                                    SHA-512:0B5B26684345297B8540A7BA4D15BBDDF76B9319ABCD97835167C95EEF66B9119B7C2B63A210FB633F4A1CD0C5D23A4BDC6750C59CF0B5E53EF7B443F4E29D70
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:PSMODULECACHE......e..z..S...C:\Program Files\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script.............z..C...C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Pester.psd1........Describe........Get-TestDriveItem........New-Fixture........In........Invoke-Mock........InModuleScope........Mock........SafeGetCommand........Af
                                                                                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1504
                                                                                                                                                                    Entropy (8bit):5.275304657373953
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24:3BJSKco4KmBs4RPT6BmFoUvjKzu1o+m9qr9t7J0gt/NKmNUNEr8H0UMem:xJSU4y4RQmFoUL5a+m9qr9tK8NfUNEIa
                                                                                                                                                                    MD5:CF5E989AE62F24D94107BF3F4F2BD8C0
                                                                                                                                                                    SHA1:DE2B672931E8D323093207759B67645310A8EA98
                                                                                                                                                                    SHA-256:CA2FCF661DDBFEBB160F732EE039B0EF300212152D78AB3882C0A4AF6634ECF4
                                                                                                                                                                    SHA-512:B56D1E3A5B83976BBE9DDC7C550E4FBD1C821AE931AE6A485D03EBEFC356BBE64B455A0DE5010F2177952D07A4720B23D4951173EE1B2E715D8352BC900FCB42
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:@...e...........4..................... ..............@..........@...............|.jdY\.H.s9.!..|4.......System.IO.Compression...H...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.AutomationL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServices4.................%...K... ...........System.Xml..8..................1...L..U;V.<}........System.Numerics.<...............i..VdqF...|...........System.Configuration4.................0..~.J.R...L........System.Data.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<................$@...J....M+.B........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Commands.Utility...
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2437912
                                                                                                                                                                    Entropy (8bit):7.913512358164593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:25HOOeI0PrBsku297659/XQR70jEUHD5Gl09XCWKYhNj:25rebqkXe5ZQRA/FGl0Z3KKj
                                                                                                                                                                    MD5:F6A0D4349D9A0CEAB75A7BAF7285F2A9
                                                                                                                                                                    SHA1:9ABFF945F6987830AA0A1E2FB798080DC91011D6
                                                                                                                                                                    SHA-256:B48255236A72B0D96FD25F42BE98CFB1694AA7D4824EE46C2E3B0DB397B7FDDF
                                                                                                                                                                    SHA-512:BB701C5BF26A9DEBDCB325DE902BC4A254EFBBF737129BBA86D19A1207E647F54BA1D2056A68ED39B22BBD14BB50D2125C9D82FFDB7337806975FCBA6A1B4C9D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d.....)f.........."....'.....J........i........@......................................%... ..................................................`*.......'.......h.......$..a...................................p*.(................................................... ..'............................. ......'..........................rsrc.........'.....................@....idata.......`*......X..............@....tls.........p*......Z...................themida..>...*......\..............`....boot....v....i..v...\..............`..`........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2390528
                                                                                                                                                                    Entropy (8bit):7.919291926748545
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:bGY5918NqwTEgTcQ26a+gdlb2SAc4CSf24JbhV6qDpEovLz8MBpUoo:ohTP6t299CczlXMSlo
                                                                                                                                                                    MD5:C1BF02296C415ABC8B1F0ED13088D96D
                                                                                                                                                                    SHA1:6506E74510BC28BE318B75736EA0B36C62C6766C
                                                                                                                                                                    SHA-256:EE57FAE40BB8457A507F59569B111660438812426852E7B13299E841E82E8302
                                                                                                                                                                    SHA-512:CF4F8314054472920878DA5237D258EF9E2C728AE1BB0487F5ACCE938A3842567BD3036F8C40F6A6D18501F8D80E9A4FE1E7F517F1315A47326A0F0D29317D03
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L.....2f...............'..............]...........@...........................].......$...@.................................^0..r....p........................\...............................\.................................@................... . .`..........................@....rsrc........p......................@....idata .....0......................@... ..*..@......................@...agovwish......D.....................@...lcjgmmfi......]......T$.............@....taggant.0....].."...X$.............@...........................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000019001\amert.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1885696
                                                                                                                                                                    Entropy (8bit):7.950545984341186
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:cEn984TQ5OfyNqCq9/eMwfbsbTWX/cEeprH+/hngYQgDqa:7e4M5eyNqCuGCT2/cprH+/Rgcea
                                                                                                                                                                    MD5:E67C8B3E5EC9F64052FCD2F45341CFA5
                                                                                                                                                                    SHA1:0D809A3D9BC171D7A0DCBF2B6C3F3B009444ADC9
                                                                                                                                                                    SHA-256:1A94AE9809AF376B056D751363C524C22284D4BD978F30723DEB2C1F8307245B
                                                                                                                                                                    SHA-512:FE4C0E98881465A6627522F1D484983EBC9298870107156986A5BD6E5DB78D7C4D1FDA9B2B2DE663EFD343FD90A01DF058A85895B8BB1347B2026FB327A66624
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.Y@...@...@....m..Q....m.......h..R....h..W....h..5....m..U....m..S...@........k..A....k1.A....k..A...Rich@...........PE..L...o..e..............................J...... ....@...........................J...........@.................................V...j............................J...............................J..................................................... . ............................@....rsrc...............................@....idata ............................@... .@*.........................@...avcjhwxy......0.....................@...nkwkrymv......J.....................@....taggant.0....J.."..................@...................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1885696
                                                                                                                                                                    Entropy (8bit):7.950545984341186
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:cEn984TQ5OfyNqCq9/eMwfbsbTWX/cEeprH+/hngYQgDqa:7e4M5eyNqCuGCT2/cprH+/Rgcea
                                                                                                                                                                    MD5:E67C8B3E5EC9F64052FCD2F45341CFA5
                                                                                                                                                                    SHA1:0D809A3D9BC171D7A0DCBF2B6C3F3B009444ADC9
                                                                                                                                                                    SHA-256:1A94AE9809AF376B056D751363C524C22284D4BD978F30723DEB2C1F8307245B
                                                                                                                                                                    SHA-512:FE4C0E98881465A6627522F1D484983EBC9298870107156986A5BD6E5DB78D7C4D1FDA9B2B2DE663EFD343FD90A01DF058A85895B8BB1347B2026FB327A66624
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.Y@...@...@....m..Q....m.......h..R....h..W....h..5....m..U....m..S...@........k..A....k1.A....k..A...Rich@...........PE..L...o..e..............................J...... ....@...........................J...........@.................................V...j............................J...............................J..................................................... . ............................@....rsrc...............................@....idata ............................@... .@*.........................@...avcjhwxy......0.....................@...nkwkrymv......J.....................@....taggant.0....J.."..................@...................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2390528
                                                                                                                                                                    Entropy (8bit):7.919291926748545
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:bGY5918NqwTEgTcQ26a+gdlb2SAc4CSf24JbhV6qDpEovLz8MBpUoo:ohTP6t299CczlXMSlo
                                                                                                                                                                    MD5:C1BF02296C415ABC8B1F0ED13088D96D
                                                                                                                                                                    SHA1:6506E74510BC28BE318B75736EA0B36C62C6766C
                                                                                                                                                                    SHA-256:EE57FAE40BB8457A507F59569B111660438812426852E7B13299E841E82E8302
                                                                                                                                                                    SHA-512:CF4F8314054472920878DA5237D258EF9E2C728AE1BB0487F5ACCE938A3842567BD3036F8C40F6A6D18501F8D80E9A4FE1E7F517F1315A47326A0F0D29317D03
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......j.....s...s...s.e.p.%.s.e.v...s.e.t./.s..y..*.s..yw.=.s..yp.4.s..yv.u.s.e.w.6.s.e.u./.s.e.r.5.s...r...s..zz.2.s..z../.s..../.s..zq./.s.Rich..s.................PE..L.....2f...............'..............]...........@...........................].......$...@.................................^0..r....p........................\...............................\.................................@................... . .`..........................@....rsrc........p......................@....idata .....0......................@... ..*..@......................@...agovwish......D.....................@...lcjgmmfi......]......T$.............@....taggant.0....].."...X$.............@...........................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):329352
                                                                                                                                                                    Entropy (8bit):7.976897467568528
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:DFZcMaQk5oqtag00+wX3bSJxuI2Hc8PlsLNuPhRF1Ym:DFZg5Ztj00+03mJxmc8PfPwm
                                                                                                                                                                    MD5:1C7D0F34BB1D85B5D2C01367CC8F62EF
                                                                                                                                                                    SHA1:33AEDADB5361F1646CFFD68791D72BA5F1424114
                                                                                                                                                                    SHA-256:E9E09C5E5D03D21FCA820BD9B0A0EA7B86AB9E85CDC9996F8F1DC822B0CC801C
                                                                                                                                                                    SHA-512:53BF85D2B004F69BBBF7B6DC78E5F021ABA71B6F814101C55D3BF76E6D058A973BC58270B6B621B2100C6E02D382F568D1E96024464E8EA81E6DB8CCD948679D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...]h.f................................. ........@.. ....................... .......b....`.................................L...O.......:................N........................................................... ............... ..H............text........ ...................... ..`.rsrc...:...........................@..@.reloc..............................@..B........................H........................................................................0..........r...p.*..(....*..0..........rg..p.*..(....*...]*.0..\.........i.s........+...o.......X.... ....2..o.......o........8.........-X....d....(......(....&s..........o......o.....1......o...........o....r...po.....3....+.s.........o.......o.......o.......o.......o.......o.......Lo.......o.......o...........o........o.....Yo.........+........(...........o....+....2...X.. ....?........+A..... ........
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):5.08491300050149
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5KUS/mtC8aF:fE1wkn23KUS/sC8aF
                                                                                                                                                                    MD5:A88A5B2691DB931F363E87D2144AA63D
                                                                                                                                                                    SHA1:C20F24DAD0874155BF196998BBBE18B1EF16B8FB
                                                                                                                                                                    SHA-256:091C3EA01D7630D83627444864078B6EB95BF640738240C0910E0AC5A7761643
                                                                                                                                                                    SHA-512:04EA274D940D7DF9809A1EAD7EF86AB79382AD228775D80FE55DD829C7D249404D940AF97AA1EB0FDDFA9E9B529CC2361CBDE428B13FD1CF3468A4BE348CB6F6
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\oqwWhViccQzmDvkS751EZRiG.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.864343711387381
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5QpfChiTfS84mn:fE1wkn23QxC3K
                                                                                                                                                                    MD5:F6C0D3C67D8D3EC4A7DEE6AE4181BC72
                                                                                                                                                                    SHA1:02E15A089D7C5752B21A102CDFC9632464771B6A
                                                                                                                                                                    SHA-256:113AF4F488EC6E14DD18775DB49A29B0251B129F5749CD7D969FFC0D1F5276EC
                                                                                                                                                                    SHA-512:673AAC02001B7835AA869C0B53AA3799B05B907BC49BEFF0203F290EE56EC42FC06FDB9E7BC0F0E34F662A13E21EF7092DB06D93CDB3F6837F18B55C94303329
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\5LzADXbR9e1baIzvWufsCa70.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.945642848698058
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5BI+fTulRnKrVFn:fE1wkn23lfTyKrv
                                                                                                                                                                    MD5:BCD1FA566618DFC45ABC2E267B113EF7
                                                                                                                                                                    SHA1:8AECBAD6DEDFEC471F3946C82824B0E9A0AE821B
                                                                                                                                                                    SHA-256:95833452CEAD8861F614362D3AC0EF05C9811B8D57EAE04FAF1E5CBAA14D829A
                                                                                                                                                                    SHA-512:38DC13634DBB0A91B0A99445118D8A8CD0CCA75F05E90C7FE68FD0A3D5FC722257A1480B0682A844DA2F7D2847149A5489C634B1B5B0D80D20F0A311988AFB73
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\dmmb0z6yJ22pC75a4y49Nfob.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.956583247280138
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5rGzUv9QWJl:fE1wkn23kUv9f
                                                                                                                                                                    MD5:8EDEF160CCD1D50E60F3CF8B495777F6
                                                                                                                                                                    SHA1:5744B6B02824315D949D17CAA62F3024A0B1E224
                                                                                                                                                                    SHA-256:3D729D525A698719D474DCA654AF3710566DA6BE6129DE3A4038F038CECEF34F
                                                                                                                                                                    SHA-512:BC86516226F17F69A7828A6FA68A7CF422833158AF01FBE8D475B507DE77327FE38E2CC1C70E4D332CBDE3DBAE9850A4A127937609F2205BB069DF8E487E6911
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\NN7y6Ml4QHJBCfpeCmt1XQq3.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.882388820051678
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5JE0mqgqTVdiF:fE1wkn23VAyEF
                                                                                                                                                                    MD5:80497F5BE75B48CCB74A40195AD1EA39
                                                                                                                                                                    SHA1:C19B5D0F26F5D6941C095012230A75A918F3D77F
                                                                                                                                                                    SHA-256:613DF61D8A1562E2C66A3483ECD6BDB4154DD7D641B7C37782DDD9785B5B7D35
                                                                                                                                                                    SHA-512:140641073F50BEF4C3D279BC5082B9FC5297BD7FFDCD5FA64A476A11325551A61B980EF261620B6FFE67F0E2FD78BB65CFDDA42653B2BF4676BCC16926EE546B
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\laQhqKepZhfkS5rQoYOvKJAy.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.915210015797916
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5wpTRwvy0dAl:fE1wkn23wXw1dAl
                                                                                                                                                                    MD5:1DF5492BD39975EDDB7BDF8EBAF75ADA
                                                                                                                                                                    SHA1:CC284DC6C3EB10601231A6684E2A3B37CFDCBD90
                                                                                                                                                                    SHA-256:7FCD9F3D0C541DFABE129317EEA173C30C21C70025D0FA35FA8B4074A7AFA7CC
                                                                                                                                                                    SHA-512:5F5AE4F77F4AD79EB1187997F61808C5AE42AF58779C0D6384DC736396E212DD24D05904EA2F561B397457530AE05D647AAC0F4CBBD8BDE630D1CF08F12F61A2
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\ULDq5mjQ4b5aNI3V4eIJfMVS.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.875284109969461
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5iWpvqwrLNl:fE1wkn23iWBzLv
                                                                                                                                                                    MD5:83CF3662D46E282B0796A887FA12667E
                                                                                                                                                                    SHA1:AB30AFFCE0B596AB5EECC54D91A486D147083A7E
                                                                                                                                                                    SHA-256:615B6D1B41CDDBBDF2EB8AF4EDDEC6EA83DFF5F37CAFBC41EF8E78E8D7F382EA
                                                                                                                                                                    SHA-512:4979E09867BC5671BF8BFA5E38055F818128EA7877104A07E89A56DAF483D95E17297B983C0F04E3921BD8B723CF128D6FD961FC6750BB936FE530EDFE4611C2
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\GIz2DLitsyoTn14REJti2nqN.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.980285740372887
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5uDrJcjdzgQskWLv:fE1wkn23u3mhXWL
                                                                                                                                                                    MD5:7675530EE289364ABE3B31F5168F3FC1
                                                                                                                                                                    SHA1:432D58A2BC38BF009AD59214712E47147DEA28DE
                                                                                                                                                                    SHA-256:DC1922E1C0DEAD1847380A8564A5DCE0F27E7F030A27D4E7C71E60BCF143CC78
                                                                                                                                                                    SHA-512:2CBDF100AA0DEE50E2835835AE64244B0873FBEF29DF5C160B27E6D7BED9F25A48AFCD96BFDCF09A1639883121C60C9427886B1B7457D7FE97E9A744C34B4962
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\K7e4fpNGO8JkAsFxVXguIAcd.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.9237620515339
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5QoU6Fv0hbsn:fE1wkn23QJ6FEbs
                                                                                                                                                                    MD5:8B5F45F2ABFDE58D3A8C3AFB8DF9B187
                                                                                                                                                                    SHA1:593F2ABB898052516FC89DD80C7DFED457C13D75
                                                                                                                                                                    SHA-256:4BDE9B670B6558541EBEBE4BBCA2050853EC744AFBD5EE1E8336AA741198C1B5
                                                                                                                                                                    SHA-512:527EDD301DF1C49CF721C18796A2C2C6F714236A9916237F4D55389F832258C589041CE7222E206FB1857D5DF406D4FFCCBF1D47029A2B9C067E87DC0088BE4F
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\5aIar1h6imWjPJZYPL4QSqoe.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.822596109630334
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5CfdTofLA9iSNl:fE1wkn23C1kjAwSv
                                                                                                                                                                    MD5:8824D032EC4D6D0D6F9960254A1487B6
                                                                                                                                                                    SHA1:6A8750234E801A5FB63B8A495005413BBD38B3DB
                                                                                                                                                                    SHA-256:663C3817D73462EF3605CFD264909B6214389A2EB3E0E75EB2D1F19CD22A7395
                                                                                                                                                                    SHA-512:477530F8D35E8169F79476B379FF9753B51F7CE8E0A8A3C1174148DC196215AB0297FC73C8E58E9E9D9D35896CB1FF146FEA7F96D998FF7800022369FD8283EF
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\gzxs1MlpU5tnMfkC7kzgvR1h.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.939985464269606
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5DXd2ZoXLAsn:fE1wkn23Ljks
                                                                                                                                                                    MD5:FE0EA6105CA7E2A4D49FCE48B12CB813
                                                                                                                                                                    SHA1:7FFB947077D1F300A1BFA596581F0196C75E9D90
                                                                                                                                                                    SHA-256:91F5EE33C3042BFF804854E366D40888DB2694240D3815A8D846DE39228B8810
                                                                                                                                                                    SHA-512:8B891484ABBD4CB981D1E6AE98739DEDF925EE1A49E0327FD707D19630901F29E9C3E1B2F45691C7AB95089F25F381312DAA66A618C460DEA00C0B1F814962AB
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\f2NBhcBIObRGHagt6xPQoMa2.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.869626725541008
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5MjcJ3yM/EXMEF:fE1wkn23M65UF
                                                                                                                                                                    MD5:FB1670B6F5C8F488FA4BC0DE7FAE03E4
                                                                                                                                                                    SHA1:A8CE1CF1CA4B4E4E710B21EE593672F6D1E8A20B
                                                                                                                                                                    SHA-256:789DC86405E675C2550ADA602F1FD361703412334B57C37A2DC56F1CC30BD4BB
                                                                                                                                                                    SHA-512:E96D65CB5A9D6243BDC62490FB3ACFCC5950CEC9AD81B2910F90D7D3CAD53C927CE99E7B630CC2E20FE4005C68FDD6CB32C500E27DDBAE76687747F9F141D0F7
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\iFyHzFXRkeOppMlu3FtGrLYy.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.904269617215837
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5dWms/llQXBps4iF:fE1wkn237AllCBps4m
                                                                                                                                                                    MD5:D5C624060BB75CF0009B8970669E9003
                                                                                                                                                                    SHA1:8EDA8379ABA7B6EDC300F81BACB23BDE57FEE3B8
                                                                                                                                                                    SHA-256:55F4756C1DCE9F3729A2F4B581F937A12BE002BFE6A05DEEBCA1DBDE620141E6
                                                                                                                                                                    SHA-512:1A076E11E96D188A3845D90EBA6D9246B6F68C0BF74DE01FD18BEACE3A3CB403D71EE66691CF444061A9CD6D18B577C17EC38158D2D46244A760D6AC013B37B6
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\8sXk5E4IG9n4ZHu2M9Littnp.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.900059558441151
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5gwJwG+oUfKAs:fE1wkn23gwmy5As
                                                                                                                                                                    MD5:AD5F975000A4B2A65916118ABD20FF99
                                                                                                                                                                    SHA1:0A4ADC9B2266D696035501FF9227929F420A5DB8
                                                                                                                                                                    SHA-256:88DDF9D0399DF967B95C467D4514B2CE76CCDB3246E4107C194DD930C2386186
                                                                                                                                                                    SHA-512:5E5DB9E8FAF93C917E53BB0140446ABFAA0CB48B30884A8863AE61A248F15100633168E3AE921AE1C436985B9229A98006462768FC88AA6228B88582F8235D79
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\EUl5mGPccm3Ux8yn4fNnNA26.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.840641218294632
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5E84QjTy8rfLVF:fE1wkn23E8iixF
                                                                                                                                                                    MD5:28ABC84D11058A2C44E7DF9972BA51AF
                                                                                                                                                                    SHA1:B4FCC338E8CCC46010E7F39F9534B508518BD287
                                                                                                                                                                    SHA-256:B69BFFEB7D0ED1AF642B46770A5DADD4BBF3690C41BA47640B91AC5C381D387C
                                                                                                                                                                    SHA-512:0CF703E7B076881AEE06523D5D480A8C528309F4B4EE6AC335555A91F8828E6B5CCC300C0478F5E6D3CFA62D0FAFE96C113D33E9700AA997C8D8D493913FC571
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\aYtr3HT3BUqjK6QB6WYpwCcm.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.828253494058785
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5Mb9kd8qnJLn:fE1wkn23M5U8qJL
                                                                                                                                                                    MD5:65ADDAADC023D97317190F20AAF0A5D2
                                                                                                                                                                    SHA1:AE511A51CB20FD5D76ADD63F516C12DB81470930
                                                                                                                                                                    SHA-256:E13EDEE09DA850E6C12ACCE32595FA8B2833DFF78EE8949CCBC46F86C577E74B
                                                                                                                                                                    SHA-512:D12FD7F98C9431224344A8806751433DBECAF7FBA002169E34DDA2E117EB25907482B4BB8D00954A35433F93946F314B58C3CEBA651A1C088D4B7D62EE3CC332
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\i8dOWYOLtbNAxDJGOQ8Wt9el.exe"
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):428544
                                                                                                                                                                    Entropy (8bit):6.494348537450964
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:12288:5noAx+FnmuQhimtPURimLqevmipum+K4Y:5+FnmuGtpMLnLYY
                                                                                                                                                                    MD5:0099A99F5FFB3C3AE78AF0084136FAB3
                                                                                                                                                                    SHA1:0205A065728A9EC1133E8A372B1E3864DF776E8C
                                                                                                                                                                    SHA-256:919AE827FF59FCBE3DBAEA9E62855A4D27690818189F696CFB5916A88C823226
                                                                                                                                                                    SHA-512:5AC4F3265C7DD7D172284FB28C94F8FC6428C27853E70989F4EC4208F9897BE91720E8EEE1906D8E843AB05798F3279A12492A32E8A118F5621AC5E1BE2031B6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Yara Hits:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe, Author: Joe Security
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......wD..3%..3%..3%..hM..=%..hM...%..hM.. %...H..!%...H..'%...H..F%..hM.."%..3%...%...K..2%...Ko.2%...K..2%..Rich3%..........................PE..L.... Me..........................................@.......................................@.................................D...x....p...........................L..P...8...................,...........@............................................text............................... ..`.rdata..............................@..@.data....F... ...4..................@....rsrc........p.......:..............@..@.reloc...L.......N...<..............@..B................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.800715312466175
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5djRMT7LtEmn:fE1wkn23hR8Ltr
                                                                                                                                                                    MD5:053D356D0912ECD8CF0011B9F435A90D
                                                                                                                                                                    SHA1:362A05451E36023AF6C2C57BFC6608712851D4D2
                                                                                                                                                                    SHA-256:A4C954825F7CCEA826904EA76C48B6F77B821A54F3F8A51CDAF4F4066FF4D081
                                                                                                                                                                    SHA-512:65A814961ECAC97D7447105083280203E258CD3DA57E550279FD7E44AD64606D1E9F6A7A07F6241B41CEF12A992417E1CA426986599530D7585459F81E656B7B
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\xF7m0A44x6KodDxbhAtiDsub.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.956583247280137
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5mIDAy2IoYHFn:fE1wkn23mIDAy2I3HF
                                                                                                                                                                    MD5:CA7847D4CF93AA0A9EA15249FDF7EF7F
                                                                                                                                                                    SHA1:5C4F83E99533CC20E8FA70373A2ABE3E121A468D
                                                                                                                                                                    SHA-256:C67AB60A859C8B3FE61FF4C80BE99A2C84364B086E36DCC0EA2F613F294453A4
                                                                                                                                                                    SHA-512:7E4FC208F47D51D24A319B4AF9C51EE1DFE83FE2C29E8D1E736586F1344260108613E833AA90286B34A2F1C87C4F011801841B9A93D92F9A994D4897C98EE6BA
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\CmCQsbfi77SnYQWckHTzUjRg.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.985568754526514
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J50uZpYm4wEACl:fE1wkn230qpMvAs
                                                                                                                                                                    MD5:B3694B622AF89C8FB62E25257A74F20E
                                                                                                                                                                    SHA1:A1575644A958875F69F2412AB212B5D9DD4907B9
                                                                                                                                                                    SHA-256:AD5D0B66C0375C02A8944D64114D09958C99FE8D407786450ED6D0F6BFDB6BE5
                                                                                                                                                                    SHA-512:18C7BD328A3607DFB56C4C7EAB29209A601078E91675057A71847E5F39098316F1B7EAB3C1901184874E704654374D9B4FD2B59200E0868F71360FAC92951B34
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\QbkKvIT5uJj3Cx8h0ECIsmUK.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.857239001305163
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5ABFI5gln:fE1wkn23A/OG
                                                                                                                                                                    MD5:3BFCF5F1147812BF68BB03C05A1316B4
                                                                                                                                                                    SHA1:E6CB7A1DD47912D357F9AC59613654BEBAFBE33E
                                                                                                                                                                    SHA-256:08156D27807BA68B08CB7FA76699ECF19745F9BF092614EBAD0E2C3FB7ECAC83
                                                                                                                                                                    SHA-512:ECC0FDB9726FCC100AA96881DDB5F9733BAC3098D1ACEE1BBBE863B32DE6CDB432F3566B4C2AF6D79986015EB7024605AADB0512EF5D005501A3ECC1A06A3E5D
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\evHtDP9yDvs3XYDQg8lqEVoH.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.92194035560531
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5CgnAG0fev:fE1wkn23C0jmev
                                                                                                                                                                    MD5:50BBA2DD7738F9663E9863467AB8B8B0
                                                                                                                                                                    SHA1:0AA8B8167412B8E9C3444C237C3F953A8967D59E
                                                                                                                                                                    SHA-256:CFB96B5FF992BC2EA704407EA0ACBBE0E9B95C1DD8F7068F21DA9D2055266054
                                                                                                                                                                    SHA-512:8AA9D2B33AD10FE377AE78531A6DB299AE6F7B70471BF8EF83212E9D77DE1A953C3CB4A9C242828B7E180D6F7DD8C2F7A61E5AB2476EF4654C6EE6287FFB6A0E
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\gKIISy7hixfPFGDeeM7cQzit.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.967523645862217
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5/V6ddEkdm:fE1wkn23d6fVm
                                                                                                                                                                    MD5:2C5E4A9FD97D61B92C92AAC3CA4B7F64
                                                                                                                                                                    SHA1:6680E5D6A1C79F1E264FFE83FEE835801E53D006
                                                                                                                                                                    SHA-256:9E15AA86535E89CDF63D614C8A4E7AD8F37E34BDB416A8A046066F6CC7BC0858
                                                                                                                                                                    SHA-512:26FC55A7965A581E86C220214627760C22521BBC2255F8FAC4E5394CC148A61030AFCD39B6350C8F4ECBB71F135DA3108EB09BB208AE7288C9D3A5EAA1185F58
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\Z0V3bHdPFsglc9f9uLbxOZFN.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.939985464269606
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5oxGyISQclQ:fE1wkn23o06S
                                                                                                                                                                    MD5:00549A8F90B2D0C05D34901423254E0C
                                                                                                                                                                    SHA1:FDEF90A411937CAF6E05015E8D919252FE60FF0B
                                                                                                                                                                    SHA-256:37F5FE7D66C534553019C601C862AA5F7CA8AAA0D02C45DB16496F235FA4EEAD
                                                                                                                                                                    SHA-512:6CAB497F1E0DB2CE68BA59157DEC05A6212100433A30E73260399AD6C10C5EDE4F1837805BEEDE7D2DFC4E05C5F4BBE5A6672B1F48A0A685D2E0F1F1D9A7F092
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\MTc4G09Eq4noHZ0G091uBZf1.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):5.077808290419271
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5psrTPGSpGHKxL4Al:fE1wkn23AP5kAl
                                                                                                                                                                    MD5:90FFB62D8AC4E18411F413C1AD2E5C4A
                                                                                                                                                                    SHA1:EF8C3151DD4BCA45EDE4BAE84AD9EF25A30F058B
                                                                                                                                                                    SHA-256:E9B0DB1D6A5A6BFDDC8BBF134BE500AAE36205DC176BAD8DA93A4159E109EBCD
                                                                                                                                                                    SHA-512:5C13A5DA1ADAD212FE73DEC01B2EA81D3A2A10BBE6B1463C0C353BC1930F95C258E1428C94EFA9274E10E5D66D99D6465E48F5C8E1E1258094308E23F8593FBF
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\LIdx8BlqmZTW07MQOtXboF4f.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.996509153108594
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5ntYTW2s:fE1wkn23tYI
                                                                                                                                                                    MD5:21D2CC694609A80211019421FACF745D
                                                                                                                                                                    SHA1:E75E79B69750322663F421E63DC2990A938814DA
                                                                                                                                                                    SHA-256:0CB642484C3C3AF6715DD5EDBDC2E1B53BB22C4238F923067A52103D0A24DFA2
                                                                                                                                                                    SHA-512:624F3808A173B4008BCC5202C128046EF03230921B4992E4AE3AD80A0287E992F2D20B982374D007B34AFFE486CF67372C8352EB32995ACD2135984676EE45C1
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\Bkg8NSHXvizTVBsjT3dzRvci.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.956583247280138
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5InKGMH0xlkiFn:fE1wkn23IdMHC
                                                                                                                                                                    MD5:053DF277FA30F6B199A09B95F4E1CF22
                                                                                                                                                                    SHA1:B63E7D40DD429D8AE7DA910159E13EC8EB6B467F
                                                                                                                                                                    SHA-256:1A63BBB20DD09097C41A161A65D4B077DD6169B8611BE09A652456FA4A1FD63C
                                                                                                                                                                    SHA-512:6D048FC563884932500F86CEF03E1E39D1D467D9A519E8CDF31AFD69FEFD3CF3D8B5E256A7C106C459E5CE214732F7C9166AB5BA7314D21BEFAD73ED56BA7DAE
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\mBoc1pbzy7gOQT20pyEZL3en.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.945642848698059
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5QyT8E1N0dm:fE1wkn23QyjB
                                                                                                                                                                    MD5:EAF0AADCD7667D529783FC35C02E6F3A
                                                                                                                                                                    SHA1:990C05F9E29FF9DBDCBB92BF75C2F961944F9416
                                                                                                                                                                    SHA-256:8851A466595A7803B6494F4A09C90EE6BE537DF25E450531082122B98E30C463
                                                                                                                                                                    SHA-512:54434809018D8DBD3A3972A9232B60652FBEF0D2B8CB4480EC4915A86BC6768EA26E2558CD2F65297C180F9FEEA0372754AFE1AC85B0B57AB7E41DD3639A6954
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\5W1aDm1vpFLN4gyrIiISMc4h.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.915210015797916
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5qWOnehct:fE1wkn23qWOnR
                                                                                                                                                                    MD5:AA333D388B555F7AEA7970DB3D8C03AA
                                                                                                                                                                    SHA1:8B48E0A134D216A75E691C030370146402FE87B2
                                                                                                                                                                    SHA-256:B385D60D409A42A519921534F7281ED4B11D23A6E43B0C3ED8B8390542F9B835
                                                                                                                                                                    SHA-512:199F935576AE65057E94E89DB2BBB259352346F7A5B8ADE7BA8BC77823C2D546FC8F895C9001DF501B574491C3E763ADA9E0157AC904A3660C1D8A81838921EC
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\Osh3JGbyB69u4I6NltayynfD.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.958030572933904
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5memZP8Rv:fE1wkn23mv5A
                                                                                                                                                                    MD5:345CCE93F1B1653646915A710CB5D56B
                                                                                                                                                                    SHA1:D4011D349982D82D4BDF6054D8F540886BEE0358
                                                                                                                                                                    SHA-256:2AEFBDEAF4BEBE0854349115B707A46985BFFCD9286B410505D6C8FB05569256
                                                                                                                                                                    SHA-512:58B07FA985EC94A41FB81E89C3F59B3D50CCE9263674ABBC55B19A711641EE5B1203FAC47350EA6177AD974D59FD8FBF3331F6DDE782EB9A75D12982BAE47A0E
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\C893DEcM3dAA247WrHBz1SDW.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.950925862851686
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5CweCkyURCl:fE1wkn23C1nHRs
                                                                                                                                                                    MD5:C9ADD3E1BCE4CD4E582D891AD4674AB6
                                                                                                                                                                    SHA1:A3ABF1B38060766919AF3CBE69933B43238C9963
                                                                                                                                                                    SHA-256:589E5CAD47EFFA8B668D8A2C6DA4BA7AEFC88A5D29C70226E0F37268A7EE4B53
                                                                                                                                                                    SHA-512:8C1390333B946C5DB6A239454C35F96E53E0EF401352A3CD63932716813E40D0D0188EA0CA95A8F701F8864DA01AB5B22B6BD1D7A01664C6F06DA8D3BE096AC5
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\gPQjkT7jjoMSIv7cXyWMW1C4.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.956583247280137
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5c26AW9aAHF:fE1wkn23c2rAl
                                                                                                                                                                    MD5:A8DD7104B5D46C3F967C8523E887EC81
                                                                                                                                                                    SHA1:99B45E61E01CA68A71046876B0B57C80A2305A1B
                                                                                                                                                                    SHA-256:AEDCB041210D8323B456F296ED5DEF4C326AADEDD3C6BBC1E1080033B9123841
                                                                                                                                                                    SHA-512:2B653E727B7013F1503BF89781DA804E55C44898D2E93878DD538966C273BB5523C7135BF0F0165B97AA20042F8DAF16715F48AFBEC034062BA653D2536860B9
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\9SmQs0R4T5RJUISklvcv02zp.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.801089682741001
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5JAUPryIV+T4m:fE1wkn237PdSv
                                                                                                                                                                    MD5:35C82A984371968A2E7CBEBC8D3B2B1D
                                                                                                                                                                    SHA1:57F5F9418CE3A68EB08F153CEC82B0072F0BA49E
                                                                                                                                                                    SHA-256:574B085886D15F0E09F6CE7D90A50A4EEC2A3D208067A4A5148C483698782AE5
                                                                                                                                                                    SHA-512:9C2CEBFBF3888B367897023535A1A12D89CD27131E64F978E4531A570593100DFB4BC4EFFEA3E0BF5233A915170F332663BEA5F502290E0F8701F8DD57D8A137
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\leqbtljZtxj2WxVvdmpHiNsI.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.933255124462214
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5gHCnHYtydkrCHFn:fE1wkn23gHCHYAMs
                                                                                                                                                                    MD5:93E8C334BCD106B505B152CA4116C19C
                                                                                                                                                                    SHA1:545D31BF53A4CD41E49181DBF92848B044263A22
                                                                                                                                                                    SHA-256:C74C3B58557140BB55B117BA547ECF84642F6785FAC363B0C21E81721CCD04D7
                                                                                                                                                                    SHA-512:71869461254C58770E51AAC79D36DCF11F0D93360DA56864A5D6F44FE0851E5E5E6C2BDA8515B36536B47CE2750377BEB553AF6E0309ED619EFD0E30EDA1EDCC
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\EubzUqqfLmBbNiHWxubQa6s2.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.967523645862217
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5tWs2+yZBfQucL:fE1wkn23NyZtQTL
                                                                                                                                                                    MD5:F2619BBEAE4B99B43CE91DA4FBFD006A
                                                                                                                                                                    SHA1:9A8F360A92B6539ECBF6F22DF8AD25C62ABD91D0
                                                                                                                                                                    SHA-256:3F8CF3A929F240F44627083D99DDE329232CBCE529FEB60FD798D3FBEF3FEFF2
                                                                                                                                                                    SHA-512:F4178A3E6D33ED09189D15F56D3942421D1D60EC4F553290BF233F1E50996F8B24198B3C8C678A9180DBA6927D498BFCF734122830886CFC7272E45AF059F02E
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\H3bqnZf96LFIOlogieo3h5K9.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):5.037882384590816
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5k2BcRLVF:fE1wkn23kuOVF
                                                                                                                                                                    MD5:7DBCBC10DBB84940AB294A6290D0B60D
                                                                                                                                                                    SHA1:3F4DE6C77FE711C2832D406FC05B42A34FED35F5
                                                                                                                                                                    SHA-256:90E9BB0E9B324B31E624A6D75FD504B94842E29E349A06DF58804B997C7C292F
                                                                                                                                                                    SHA-512:941D10E5C0FFBBA84D0EF9B6D150C4C06BB69D7709360A34FE0338E1B5458CFEE31E99204B3EE8F7F41619EE1258FB3B033377B916C154778706FEFC1F09CC4D
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\Aghrmi42Lz5QvS8u8U6BiVXQ.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.929045065687527
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5cyeAFD7m8B9AEF:fE1wkn23cyp5i8B9
                                                                                                                                                                    MD5:3030FA7E72CDA5C0F282D1BA553D6DF4
                                                                                                                                                                    SHA1:379DC2863D83C95FFCFF031F75597084FED2F816
                                                                                                                                                                    SHA-256:33747FA84C849BEB8158D6AD982B14D72DD37D25AE20BDE8F9FC540BE7B1BB73
                                                                                                                                                                    SHA-512:086013701B836634626045E35F33F9D235BC18F12CD54793542C0276A380D840B940E055F48376A8C8F52E8EE71EA6B25A23692C6F448AAA9BB2EB73C2352307
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\9WrQ2c2u5fxH1pcvCwwjGhdd.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.968970971515983
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5u4MTOkGTCk/bs:fE1wkn23u9T8Okjs
                                                                                                                                                                    MD5:4D849C8F1BBA353FF5FDACCA4C23160B
                                                                                                                                                                    SHA1:987A7E60AD2615B800873D4197ADFBD183F8FEA5
                                                                                                                                                                    SHA-256:35B86374B5EE70591B71B89CF52C0F5A22459EBD80682779A98656264528577F
                                                                                                                                                                    SHA-512:8D770D9EBB48C6BDA5C2E2C67672439AAA03A38D6967AA4FC0067576C1B2071BEC82625E0290A569F12AFD568828A5EF5EC87528E194743D5B37B2127CF20D7A
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\KHojJ9v7XtNSHZfW6gAnnH23.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.800715312466175
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J51tK/JWyWVO4zF:fE1wkn23nk+VO4p
                                                                                                                                                                    MD5:F98A9FC59DFFA65E0A5F2AF36D5ACE7F
                                                                                                                                                                    SHA1:DD533C5BEBEE0F2293B1CD8FDA4699476289983E
                                                                                                                                                                    SHA-256:0B522323990002E05B26A8E921835B18BE1A9DFC58D40AFBC1293F2ACD48C7D0
                                                                                                                                                                    SHA-512:07FECF649586D004FF24115AAA54C69289998AC801396781700AA82C11F9828519A3911E1C5FE4EA4C5CE69BE988EFE9A44CC67FCC49F44CA04ACD377A0E9B13
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\PHoZl3WswCZ1lCRWCJPBFZtN.exe"
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):69
                                                                                                                                                                    Entropy (8bit):4.955135921626373
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Ljn9m1t+kiE2J5MqcCudT9TvL:fE1wkn23MqcnhL
                                                                                                                                                                    MD5:B3307308ACCCDBF7059B1672DAD5560D
                                                                                                                                                                    SHA1:BFDFA333062DF6CAE58B5B3FBBEB767EC8BCDDA7
                                                                                                                                                                    SHA-256:B076C83B5AFE9384321CC1EED61E63A7D910E17441C15F1891549A268E2C28A6
                                                                                                                                                                    SHA-512:5465C8045A20E2B843F961DACC4954E4AC05CA351E52A16839D83034257BAE25D87D7E44EB5A24F5143CE817C07EA867E7A8E39F23E61BE9662654A13772BF01
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:start "" "C:\Users\user\AppData\Local\iO9tAKw78L31Wsbvnq5kt5m1.exe"
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):311296
                                                                                                                                                                    Entropy (8bit):5.0817932970004
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:uq6EgY6i4rUjhYMLwPcologL/ejZWTACtAti0lcZqf7D34leqiOLibBOp:VqY6inwPDpKZWTA+AplcZqf7DIvL
                                                                                                                                                                    MD5:8510BCF5BC264C70180ABE78298E4D5B
                                                                                                                                                                    SHA1:2C3A2A85D129B0D750ED146D1D4E4D6274623E28
                                                                                                                                                                    SHA-256:096220045877E456EDFEA1ADCD5BF1EFD332665EF073C6D1E9474C84CA5433F6
                                                                                                                                                                    SHA-512:5FF0A47F9E14E22FC76D41910B2986605376605913173D8AD83D29D85EB79B679459E2723A6AD17BC3C3B8C9B359E2BE7348EE1C21FA2E8CEB7CC9220515258D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Yara Hits:
                                                                                                                                                                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exe, Author: Joe Security
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...)v................0................. ... ....@.. ....................... ............@.................................t...O.... ..............................X................................................ ............... ..H............text........ ...................... ..`.rsrc........ ......................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):162304
                                                                                                                                                                    Entropy (8bit):7.967195699444992
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:I1lmOH349skOxH49PsH+8KqnuHV7A/5S+c6wABA47PN/6wHFHJ:I1iekOxYlI+EuH2cvAe4BywlH
                                                                                                                                                                    MD5:586F7FECACD49ADAB650FAE36E2DB994
                                                                                                                                                                    SHA1:35D9FB512A8161CE867812633F0A43B042F9A5E6
                                                                                                                                                                    SHA-256:CF88D499C83DA613AD5CCD8805822901BDC3A12EB9B15804AEFF8C53DC05FC4E
                                                                                                                                                                    SHA-512:A44A2C99D18509681505CF70A251BAF2558030A8648D9C621ACC72FAFCB2F744E3EF664DFD0229BAF7C78FB72E69F5D644C755DED4060DCAFA7F711D70E94772
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....G..........."...0..p...........4... ........@.. ....................................`.................................74..O....................................3..8............................................ ............... ..H............text...Po... ...p.................. ..`.rsrc................r..............@..@.reloc...............x..............@..B................k4......H........$.................................................................]*....0............i.s........+...o.......X.... ....2..o.......o........8.........-N....d....(......(....&s..........o.........o...........o....r...p(.....3....+.s....%.o....%.o....%.o....%.o....%.o....%.o....%.Lo....%.o....%.o....%.o....%o.....Yo.........+........(...........o....+....2...X.. ....?........+<. ....... ...............XX.. ....].......................X.. ....2........8.......+w..X ....].
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):399464
                                                                                                                                                                    Entropy (8bit):7.972213708887707
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:LlEGEyWKpTlDB878Ed8nFO+tFXFBCorNVDq5GZJrtLK7BYY0g2wqS5e8x:KGEyWERrpdTjZDqeh2Beg28Tx
                                                                                                                                                                    MD5:18B50C6016CD5D7FF2F01B71A5E3373B
                                                                                                                                                                    SHA1:D62DC0A84E39A1FFF24163153761C62A55FF30FE
                                                                                                                                                                    SHA-256:18D62AA8D04103058203E75FE4039DADB80EB0927DDD23B14F89C984F28AEA97
                                                                                                                                                                    SHA-512:27E0017FA30A9322E71191B2C4954D1F55D8FE827F029092FA3BDD6A52E799BBB671A776C3596A1DF02D8EBE660B2192F293CB67252EC289BBC99A8725CEAA19
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...-............."...0..Z............... ....@...... ..............................k.....`..........................................................................................y..8............................................................ ..H............text....Z... ...\.................. ..`.rsrc................^..............@..@........................................H......../...J......M.....................................................{....*"..}....*..*.~....*.......*.~....*.......*.~....*.......**.........*^.(3.......}......}....*&.(3.....*.....o.....*..*.~....*.......**...( ....*&...}....*..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z..s4...z&...}....*&...}....*..*&..(E....*VsP...
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6401863
                                                                                                                                                                    Entropy (8bit):7.960348454310837
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:YPvEbLriWEmQfgLVPn2qQniV0kSybkHXrsfM8n1TQuDFviH345nBIvgj2dKczf:SE7iWWaVP2qeiTHkbYMyTeHcNjEKczf
                                                                                                                                                                    MD5:9FB56DD5B5BEB0B9C5D0102F22373C0B
                                                                                                                                                                    SHA1:5559DC162D09C11C1ED80AEDF8E9FA86FD531E4C
                                                                                                                                                                    SHA-256:A65B290AA9EBFB82746CF75440C19956169F48D7DCBEBAFDE6996C9B46039539
                                                                                                                                                                    SHA-512:AB6C88ACDDF3350F4DA37E20E38FC1BD4AC56433D5320FA071649DDF261CF1B6BB4692B54791E08E47B9E887A87BA5704AFDE6CB9AA9220C1DA7F27C85400A1C
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........w..w..w..<.V.w..<.T..w..<.U.w....Z.w......w......w......w...$.w...4.w..w..v......w......w....X.w......w..Rich.w..........PE..L......d...............!.....................@....@.......................................@.............................4.......P....`.......................`...#......T............................f..@............@..x...\... ....................text....-.......................... ..`.rdata......@.......2..............@..@.data...PG..........................@....didat.......P......................@....rsrc........`......................@..@.reloc...#...`...$..................@..B................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):578048
                                                                                                                                                                    Entropy (8bit):7.272707802677416
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:12288:D/fI5jU8KHNXx/WRjeew+6P5zwMzAbPxlj6M+KjLHo:D3IYNXxya9+TMzMTj6rKjb
                                                                                                                                                                    MD5:F15A9CFA3726845017A7F91ABE0A14F7
                                                                                                                                                                    SHA1:5540AE40231FE4BF97E59540033B679DDA22F134
                                                                                                                                                                    SHA-256:2DEC75328413D4C278C119DB42920FB183A88A5398D56ECC80C8CC74FBA13071
                                                                                                                                                                    SHA-512:1C2AF9608736AD6A02D093F769FE5EC5A06CB395A639E021D4EE3F6C46CEBC8C101E7DB1064984F801AD3BEE65D81B95FE6E2E60C0EC949BB172BA9C455B9869
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(tY.F'Y.F'Y.F'..E&U.F'..C&.F'..B&L.F'..B&K.F'..E&M.F'..G&\.F'Y.G'..F'..C&..F'..C&X.F'..D&X.F'RichY.F'................PE..L.....4f...............'.............a.......0....@..........................?............@..................................0..................................l......................................@............0..<............................text............................... ..`.DAX.........0......................@..@.data...T...........................@....Left...............................@....reloc..l...........................@..B.INV.........0......................@...........................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2831872
                                                                                                                                                                    Entropy (8bit):7.076550333890677
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:jOvdoJl7MWepyIsE7ddkxuq8rW5vs0VaCQeb5tsQcGo:GYIscWxuq8rUlVaCQo5tsQG
                                                                                                                                                                    MD5:31841361BE1F3DC6C2CE7756B490BF0F
                                                                                                                                                                    SHA1:FF2506641A401AC999F5870769F50B7326F7E4EB
                                                                                                                                                                    SHA-256:222393A4AB4B2AE83CA861FAEE6DF02AC274B2F2CA0BED8DB1783DD61F2F37EE
                                                                                                                                                                    SHA-512:53D66FA19E8DB360042DADC55CAAA9A1CA30A9D825E23ED2A58F32834691EB2AAAA27A4471E3FC4D13E201ACCC43160436ED0E9939DF1CC227A62A09A2AE0019
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........B............C......C..9...C......R!......R!......C.............R!.....c"......c"......Rich....................PE..L...w.(f...............'..........................@...........................+...........@.................................0.*.P.............................+..I..0m..8...........................Hl..@.............*.0............................text............................... ..`.rdata...M.......N..................@..@.data...............................@....idata..*.....*.......*.............@..@.00cfg........+.......*.............@..@.reloc..qh....+..j....*.............@..B........................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4448942
                                                                                                                                                                    Entropy (8bit):7.996740744908945
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:98304:zgwR5qybOM3rY1buPd0+01mQ5YBGUYDU4a6FXg+d70MYVSuEQQpnlJYtDf+8:zgDyaM3qbA0+07YBeDa6a++b5Evn4tF
                                                                                                                                                                    MD5:0F52E5E68FE33694D488BFE7A1A71529
                                                                                                                                                                    SHA1:11D7005BD72CB3FD46F24917BF3FC5F3203F361F
                                                                                                                                                                    SHA-256:EFD29C35766C607AA15D1CB83DEC625739791B1616AD37D5B47E78CDB8A42CA8
                                                                                                                                                                    SHA-512:238FBB1C04EEF2F2005CB7ABF0223E3CD062D9D2840966292E19DCAA495609E134A0BDC35389AE9925ECFC787A13772D3AC7B29058579F702BC849DD0343C400
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ`.....................@...................................`...........!..L.!Require Windows..$PE..L......P.....................\....../.............@..........................P......3-......................................t........0..................................................................................l............................text.............................. ..`.rdata...;.......<..................@..@.data....M..........................@....rsrc........0......................@..@........U..`.A.......S3.;.VWt.f9.b.A.t...`.A.P.c...P....Y.nj'.S....u..v..=..A..6P......P....9^..].v8.^..3......h..A.P..........P......P..x.A..E..E....;F.r......P.f...Y.r8..j...t.A...t$..D....V....s......A..F8......^.j..q.....A..3.9.`.A.t...@....9D$.t..t$.Ph.....5X.A.....A.3.....D$..`...|$..u..@.....3.....p.A.............t$..D$..t$...`.A./.@..t$...P.Q..%`.A...3.....T$..L$....f..AABBf..u..L$.3.f9.t.@f.<A.u...t$...T.A..L$.......%..........S.\$.V..C;^.tLW3.j.Z...........Q.d.....3.9F.Y~.9F
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255803870917765
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWl:a72A4VgEvmcH9yKCpM/e4iWl
                                                                                                                                                                    MD5:85D23A7E1BF2207A3FA825136090E00D
                                                                                                                                                                    SHA1:A1FDCAF5B513DAB9A0A6D0390626F808E508765E
                                                                                                                                                                    SHA-256:F0C8D2724E6659B3DE34A5422376194EBB203B2D5EDC49F61CEFE483A2E73E6D
                                                                                                                                                                    SHA-512:0714573D799E4D5B4A3DA96E192AFA12A211421BC022FE6671EB67AD81BD581012581F919A20EDBF8BEB32AF87FFDB7A518424D5A1A9E56556A4BBFA72CE1CC2
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):279040
                                                                                                                                                                    Entropy (8bit):6.729582020715566
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:Dw7X5rSoVVk3NqPNPhZ0Q4KROPnEJRYiyP:D0xSoVyNqPNIXGRe
                                                                                                                                                                    MD5:A9C28724B16C3BB3AF2FDB5AA9BE277C
                                                                                                                                                                    SHA1:BEF9C7B857D0BC6C0D90204765704CA411A60E6D
                                                                                                                                                                    SHA-256:3500071769305B1D5753CCBDCB16BCD2AB047AE7994741E4628F68FEB939E9B7
                                                                                                                                                                    SHA-512:6966DD9AE3C17C83DB07FFAF69D035A89D82A315DD92D7465192E0FC14C7E750B1FB2163C662A926B103E516FFFDB345112353F054CAD079AAB96A1B17A4BC3F
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........e.\...\...\...Q...@...Q...#...Q...w...U...Y...\...6....D..]...Q...]....D..]...Rich\...................PE..L....Nkc......................_......C....... ....@...........................`.................................................<....._..[...........................!..8........................... z..@............ ..p............................text............................... ..`.rdata..Bm... ...n..................@..@.data...H.]......r...t..............@....rsrc....[...._..\..................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285246977507
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/Ec:pIS769aql4v/ahlHt2c0v7pgQoJ
                                                                                                                                                                    MD5:80D75B9A49171FE842E9CD07A45CBA68
                                                                                                                                                                    SHA1:E6CE3056F850E9480BA6DB11A350EEEEAD9EEB90
                                                                                                                                                                    SHA-256:BCF01CEA95C62EFA97319E5955FA58EF2523C81FF6BF45C4A7489F68B2A6F856
                                                                                                                                                                    SHA-512:8D7B06903D7BDFA9218FCE2C89CCF2211A0C5AA480CCE933C8FF06E7DDCB4422FF113343B680294DCA3C0EA3D9CEFE53C2868F166F719829BA70A6B97413D1B7
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6143
                                                                                                                                                                    Entropy (8bit):7.79913609472161
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:96:YqgbzTvWUrT4ao7lIri4ao7l0WMMYLL1Lc+8R6CbsNpC/ZtDquuukI:YqgDvWUrTJHriJPWHrjbe0OuuukI
                                                                                                                                                                    MD5:1F4B62DD7E347610DC47E50C4695EA81
                                                                                                                                                                    SHA1:10365E69D2E75AFDDC999ECC16141493BBB4F870
                                                                                                                                                                    SHA-256:5E6BBABA397DE94BEDBC0A419ED9E0C8B584E4065D74A27EFEC058A0D1D63D88
                                                                                                                                                                    SHA-512:BEC83FB73A2A9CC45AC37BD90F8F87EB046A14968DA751202FD9862A99F6FA526FDB544FEA5FDCED043A050F0DBCBF63C8C3292BFCC9B59D3A0CC086D2BAA15B
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:PK........PpDWS.............._Files_\AIXACVYBSB.docx..Gn@1.D..r(.......$?.K..oF..~zj#6Ua....OSu..I.b.i.j...._".....5z]E...n..K...v...D8..<QHcl.r1...jJ..,2~xG..F.J..z..l...:..N8..b..66D... ....Wd.Z...x.eW.{.-...e....\&.|.$l$...}q.<.N..!=.s:W......J.......p.G..]......;$...NPN....\"..2....@.*VJ........0.T....B..)8.....>.z.2c...T..JV4...1....u)<g...j....E...{7lk.}.Q.^.5].......D.z.z..>..}U..F.Ro...2.;.K".;j...Jf5F2.+....T<Ck.|b.......%~..3.;..~.j...B...T.Qco5h;.9...O.(...s....&..5s..U..-.....c..[6.:..Yv.N.>#....N9._.............Qk.m...0/S=.g.kOI..R....c.1.L..k.x.6..e..k"..D...y...~..t....z.9m..Ny..%-..g........u. ||..!..e.....r+.k.[.....s..~...PK........PpDW.*.M............_Files_\DTBZGIOOSO.docx..I.e!...yE.E.`.....!u.\..<0.s..........h>....t5.X.K..0g,.h.^......]c.N..rh.....X.....t.6`.]6.M.I.../.9....wO.xf<p..q.j._7}v..e..R_M..X.u.1.....-.m.b,R....O.q.~v..c..+...I.....m..G...u..r./.?i.....\..H...u......f~I3..ny.C.&.....W.7T......a
                                                                                                                                                                    Process:C:\Users\user\Desktop\1CMweaqlKp.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1793040
                                                                                                                                                                    Entropy (8bit):7.95023297552325
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:mQKkQGW5tuFxaLTdYZWakRk43qB75IzCed:mvtH5AFYMWa5WqBSt
                                                                                                                                                                    MD5:8A19D654CB37E4E51BE045ACAF097E74
                                                                                                                                                                    SHA1:7A3A86421A806D2BA66AE84E86305847C8B1F766
                                                                                                                                                                    SHA-256:59B3AF1A244A082219116ED9B496DE99236B01AE42DF75BF4211ED2B7069BC4B
                                                                                                                                                                    SHA-512:DF54F9F61B5C9E9A79EDF17732B6BB630D945F813F00579B79F021735D3F3C6802A463D9D6F41A75D3703A86A0844B9F587C3961E44AE53045DDB25B67438681
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.Y@...@...@....m..Q....m.......h..R....h..W....h..5....m..U....m..S...@........k..A....k1.A....k..A...Rich@...........PE..L...yO&f............................X`<...........@...........................T......W....@..........................................0........................T.............................. ...................................................... J........,.................. ..` N........V...0..............@..@ .E... ......................@... .....p......................@..@ .K.......0..................@..B.vm_sec..@.......@..................@....idata..............................@....tls......... ...........................rsrc........0......................@..@.themida. 5..@......................`....boot....P...`<..P..................`..`.reloc........T......\.................@........................
                                                                                                                                                                    Process:C:\Users\user\Desktop\1CMweaqlKp.exe
                                                                                                                                                                    File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                    Category:modified
                                                                                                                                                                    Size (bytes):26
                                                                                                                                                                    Entropy (8bit):3.95006375643621
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:ggPYV:rPYV
                                                                                                                                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                                                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                                                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                                                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:[ZoneTransfer]....ZoneId=0
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000071001\jok.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2662
                                                                                                                                                                    Entropy (8bit):7.8230547059446645
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                                                                                                                                    MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                                                                                                                                    SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                                                                                                                                    SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                                                                                                                                    SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000071001\jok.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2662
                                                                                                                                                                    Entropy (8bit):7.8230547059446645
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:48:qJdHasMPAUha1DgSVVi59ca13MfyKjWwUmq9W2UgniDhiRhkjp9g:bhhEgSVVi59defyfW2sDgAj3g
                                                                                                                                                                    MD5:1420D30F964EAC2C85B2CCFE968EEBCE
                                                                                                                                                                    SHA1:BDF9A6876578A3E38079C4F8CF5D6C79687AD750
                                                                                                                                                                    SHA-256:F3327793E3FD1F3F9A93F58D033ED89CE832443E2695BECA9F2B04ADBA049ED9
                                                                                                                                                                    SHA-512:6FCB6CE148E1E246D6805502D4914595957061946751656567A5013D96033DD1769A22A87C45821E7542CDE533450E41182CEE898CD2CCF911C91BC4822371A8
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:0..b...0.."..*.H..............0...0.....*.H..............0...0.....*.H............0...0...*.H.......0...p.,|.(.............mW.....$|Bb.[ .w..#.G.a.K-..i.....+Yo..^m~{........@...iC....[....L.q.J....s?K..G..n.}......;.Q..6..WW..uP.k.F..</..%..*.X.P...V..R......@.Va...Zm....(M3......"..2-..{9......k.3....Y..c]..O.Bq.H.>..p.RS...|B.d..kr.=G.g.v..f.d.C.?..*.0Ch[2:.V....A..7..PD..G....p..*.L{1.&'e..uU)@.i....:.P.;.j.j.......Y.:.a..6.j.L.J.....^[..8,."...2E.......[qU..6.].......nr..i..^l......-..m..u@P;..Ra."......n.p.Z..).:p).F($..|.R.!9V.....[.gV...i..!.....=.y{.T6.9.m..+.....(2..\..V.1..].V...q.%.4.a...n.B..Q..g.~N..s....=iZ...3..).......E..A.I...hH..Q%0.]...u..........h0T.P.X.A............'.....O....Py.=..3..n..c.F.$z..t..jM.E..W...i1..'...Y,r.,.+...o.}.7..kb.t'DQTV..{...#....sT..G...:..3.L.....c..b%z..e.\.EY...M;x.Z....t..nv...@Ka.....|s>.2Qr..f,O..XJ`d....78H8.....`..);.vMcUJ.......m.G5.ib]5.h.v<.?S.{1O.Y...kb.....a&.R......E.l..."J..G.
                                                                                                                                                                    Process:C:\Windows\System32\rundll32.exe
                                                                                                                                                                    File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1026
                                                                                                                                                                    Entropy (8bit):4.690067217069288
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:12:wSQanHEC73FqjThUbJwuUn5qPyd2whRZfZOaH5KrqXzJI/y5bjbVMmRYAPL8fx7T:wHu73FWhUNwzqq2OfX82JdHRNPLcxdl
                                                                                                                                                                    MD5:4E32787C3D6F915D3CB360878174E142
                                                                                                                                                                    SHA1:57FF84FAEDF66015F2D79E1BE72A29D7B5643F47
                                                                                                                                                                    SHA-256:2BCD2A46D2DCED38DE96701E6D3477D8C9F4456FFAE5135C0605C8434BA60269
                                                                                                                                                                    SHA-512:CEC75D7CCFA70705732826C202D144A8AC913E7FCFE0D9B54F6A0D1EEC3253B6DEFFB91E551586DA15F56BA4DE8030AC23EE28B16BB80D1C5F1CB6BECF9C21BE
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview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
                                                                                                                                                                    Process:C:\Windows\System32\rundll32.exe
                                                                                                                                                                    File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1026
                                                                                                                                                                    Entropy (8bit):4.705615236042988
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24:B65nSK3I37xD9qo21p9G7ILc3pkowOeuiyJRdt7fXzyxu3f7Lj8X2:B65SK3Xx1OXpkowOeMJR/fzeYX8X2
                                                                                                                                                                    MD5:159C7BA9D193731A3AAE589183A63B3F
                                                                                                                                                                    SHA1:81FDFC9C96C5B4F9C7730127B166B778092F114A
                                                                                                                                                                    SHA-256:1FD7067403DCC66C9C013C2F21001B91C2C6456762B05BDC5EDA2C9E7039F41D
                                                                                                                                                                    SHA-512:2BC7C0FCEB65E41380FE2E41AE8339D381C226D74C9B510512BD6D2BAFAEB7211FF489C270579804E9C36440F047B65AF1C315D6C20AC10E52147CE388ED858A
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview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
                                                                                                                                                                    Process:C:\Windows\System32\rundll32.exe
                                                                                                                                                                    File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1026
                                                                                                                                                                    Entropy (8bit):4.705615236042988
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24:B65nSK3I37xD9qo21p9G7ILc3pkowOeuiyJRdt7fXzyxu3f7Lj8X2:B65SK3Xx1OXpkowOeMJR/fzeYX8X2
                                                                                                                                                                    MD5:159C7BA9D193731A3AAE589183A63B3F
                                                                                                                                                                    SHA1:81FDFC9C96C5B4F9C7730127B166B778092F114A
                                                                                                                                                                    SHA-256:1FD7067403DCC66C9C013C2F21001B91C2C6456762B05BDC5EDA2C9E7039F41D
                                                                                                                                                                    SHA-512:2BC7C0FCEB65E41380FE2E41AE8339D381C226D74C9B510512BD6D2BAFAEB7211FF489C270579804E9C36440F047B65AF1C315D6C20AC10E52147CE388ED858A
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview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
                                                                                                                                                                    Process:C:\Windows\System32\rundll32.exe
                                                                                                                                                                    File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1026
                                                                                                                                                                    Entropy (8bit):4.692693183518806
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24:FrPOQ32qakAnGkyNl2g/fQJnKVOvsyX1aZKx1aHEg:53Sq9/fiK4XQfHEg
                                                                                                                                                                    MD5:78F042E25B7FAF970F75DFAA81955268
                                                                                                                                                                    SHA1:F7C4C8DDF51B3C5293E0A92F6767D308BBF568B4
                                                                                                                                                                    SHA-256:E4C9709AFEA9D9830CED1AA6DF1711D0332A5972688640368DDC32C07C0D5D17
                                                                                                                                                                    SHA-512:CE2548833F62C549CA0268BE445E517AC986CA44EA52916A153DFFE4D7FA59B703E5927DFE70836E8B082C246793DF2066D72DB4A6E1C948940E88C524952348
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview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
                                                                                                                                                                    Process:C:\Windows\System32\rundll32.exe
                                                                                                                                                                    File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1026
                                                                                                                                                                    Entropy (8bit):4.699434772658264
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24:Khfv+VFngw6i0t5Ut+l3kHwMDkhBlBAMFPxYaija:pvl6Pt5uQ3kQ0khBl1VxYpu
                                                                                                                                                                    MD5:02D3A9BE2018CD12945C5969F383EF4A
                                                                                                                                                                    SHA1:085F3165672114B2B8E9F73C629ADABBF99F178D
                                                                                                                                                                    SHA-256:6088E17DB4C586F5011BC5E16E8BF2E79C496EB6DAE177FF64D9713D39D500CA
                                                                                                                                                                    SHA-512:A126D98EE751D0FB768E4DB7D92CBC6AE7852FEE337B85ED045D871DB321C6C98FD58A244D058CA3F41348216C68CB4A37FA854980BB16D358AA62A932DD867E
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:ONBQCLYSPUBDAQCIGYNWXHPENQNLJZGXCHXSNXZNCZBUHYDXPEMCJPAWYQSVHMGKHJUFFFYDAXDAHOLOAZEPTWZTWDGPFLXMMCXLCIIJOXMVRNMUMTICVHQSWNAGIYCQBOZZHONWWBXKDUJYBRPSLNFGTUIFTNGJEATOXKHEFMERAQZVBMQGKZUKXDBMGRJDOOGATZZKQMEZJRWZVAZRPQTVWPETCIMLPMYNWZLVLXRPUUKLNIMTYDNYIJTZEFJDNMWTOFFKRRINCRDCFGJAJNMYQHGXGVHVYPEUFBNUIGUVGBYQKIAJLIVACVIHEGZIYKSROURNGZSCTUKBKFFCGPXAONPDEBIZJRKCFYHATDXLXYKGLWXBCHJERCRNMKESIMBDNPMPBWXSVSEAAUEKEGUIJBZLAESAFZHMBLPPKMNTZAZIIYSHMWJBFTZZSKYNFJYSBRLGVHOWZUQHXUSSJESIEKHZLTLILMSMJZHXFWGJQNWQCDLXEWBZPGBTVDVCPPUFLFGNZRUKJOANJVXVTXLOQLFUIVEWTCBKOBYZMAOTIMQMJYRYLSOLSSACCLCFTVXCKKJDNWQAETNXHIOQCDTXLLVEQLNLGDIOULNFNNDXTVYYSPDWWZHDSYHBRXMUAAHJIGSGLSFKCGADPUAASYZFEZWHYDLQDUCHJXMNMTNCDCMNIJQCSGEQOGVGYBYPMTZBBFOACZMMKVFNELOMGSTCQUDRFKLFGOHOTZKZCWJWDRECGYETFYOWLYECGICMGUKZRVNHUQTLQLHUTPRZXBVYMPAFBLSWKSSKBGWCWBFEEZIAZUZGEYMYBSXYUCHEALFJRSGWQJMABNQHSZANDDTYMVJKXFFFDEENZAGRGVLHFELVOSGTXVOOPFGCQDSFWOYKKOYUHFWMXWPLHFIIPORMEJNOFYMJRBAZLYTIOKEFIWPDZUKMIWKLZXBOESUCXZXQSCMQKDKFBCHJMPMZHELLNSYYEJNBRRXVBMPD
                                                                                                                                                                    Process:C:\Windows\System32\rundll32.exe
                                                                                                                                                                    File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1026
                                                                                                                                                                    Entropy (8bit):4.699434772658264
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24:Khfv+VFngw6i0t5Ut+l3kHwMDkhBlBAMFPxYaija:pvl6Pt5uQ3kQ0khBl1VxYpu
                                                                                                                                                                    MD5:02D3A9BE2018CD12945C5969F383EF4A
                                                                                                                                                                    SHA1:085F3165672114B2B8E9F73C629ADABBF99F178D
                                                                                                                                                                    SHA-256:6088E17DB4C586F5011BC5E16E8BF2E79C496EB6DAE177FF64D9713D39D500CA
                                                                                                                                                                    SHA-512:A126D98EE751D0FB768E4DB7D92CBC6AE7852FEE337B85ED045D871DB321C6C98FD58A244D058CA3F41348216C68CB4A37FA854980BB16D358AA62A932DD867E
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview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
                                                                                                                                                                    Process:C:\Windows\System32\rundll32.exe
                                                                                                                                                                    File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1026
                                                                                                                                                                    Entropy (8bit):4.695685570184741
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24:SYuCgqv/1uycbC6SHsJPWXpOxTeVtblICcFX4xlyzK7y45wR39IRh:S1CPvsC6YE+XgleVtbQuKGf5M39IRh
                                                                                                                                                                    MD5:A28F7445BB3D064C83EB9DBC98091F76
                                                                                                                                                                    SHA1:D4E174D2D26333FCB66D3FD84E3D0F67AF41D182
                                                                                                                                                                    SHA-256:10A802E683A2C669BB581DE0A192C8291DD2D53D89A2883A59CC29EB14453B93
                                                                                                                                                                    SHA-512:42526FEC4220E50DB60BD7D83A07DEB9D5BE4F63AD093B518E9ECC86B779210B0170F6F64C9F16064D50CB12F03643BAC9995D4F3C0AFD5F8D38428D57ADE487
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview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
                                                                                                                                                                    Process:C:\Windows\System32\rundll32.exe
                                                                                                                                                                    File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1026
                                                                                                                                                                    Entropy (8bit):4.69156792375111
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24:wT4Ye6841ff8PdGjcDOa8AtDLSoarbrGxYsrxpuzu:/Ye68AIGjiOaDDc4uzu
                                                                                                                                                                    MD5:A4E170A8033E4DAE501B5FD3D8AC2B74
                                                                                                                                                                    SHA1:589F92029C10058A7B281AA9F2BBFA8C822B5767
                                                                                                                                                                    SHA-256:E3F62A514D12A3F7D0EB2FF2DA31113A72063AE2E96F816E9AD4185FF8B15C91
                                                                                                                                                                    SHA-512:FB96A5E674AE29C3AC9FC495E9C75B103AE4477E2CA370235ED8EA831212AC9CB1543CB3C3F61FD00C8B380836FE1CA679F40739D01C5DDE782C7297C31F4F3A
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview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
                                                                                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):60
                                                                                                                                                                    Entropy (8bit):4.038920595031593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                                                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                                                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                                                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                                                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
                                                                                                                                                                    File Type:ASCII text, with no line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):13
                                                                                                                                                                    Entropy (8bit):2.7773627950641693
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3:LgVUiM:Ey
                                                                                                                                                                    MD5:1DCB8A8018CB6CDCAED1810AC87B0B97
                                                                                                                                                                    SHA1:98A2D101C039C26583027D2E280F30A8BF9296F1
                                                                                                                                                                    SHA-256:1F912B5D8456CE933F967044FA718C9B312548E6CE461054EECFF81A34CE6A1D
                                                                                                                                                                    SHA-512:77C829CC541A58E94BD1D4E5D1E7492AE7219E1085AF2E021BE29A767CD25042055A9EAF65A46F71C6A6FA0A54829A57A17BA615E280539657738179D3E8A893
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:1714801656791
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):325632
                                                                                                                                                                    Entropy (8bit):6.7003892518717905
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:AkNSgvhj/pPlMy18blHV+pxuC0zPFgO3nOMiWAho4fOg1cUGwc6fAk15vBTFusKP:XL7Ha9V5g+mhqsGz6fL1VBpK0
                                                                                                                                                                    MD5:F2CE35E5AA2A7771759D7F424F2803AC
                                                                                                                                                                    SHA1:84EFB9F0C5194DBC9389A0D4D11941FCEA251F24
                                                                                                                                                                    SHA-256:FB1DABFF73054915AC62E6631D8ED79F64658AB3CC93AD990036F57056159C6F
                                                                                                                                                                    SHA-512:395D69AECED142DDDA5C83029926FA2E987D0EC2CBA7FA3C35B1F11DA2B94E915F4891088CF8839811E9B141D25B7ED85F2195C02B349E2FFC1D1EB942AB6FD1
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L...d..d.....................z`......A....... ....@...........................a.....D..........................................<....._. ............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...(.]......j...~..............@....rsrc... ....._.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe
                                                                                                                                                                    File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1674364
                                                                                                                                                                    Entropy (8bit):7.9964225732200545
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:49152:F1aZFvOz9iTy8tR/z2zuVqD3hZ3t3MuIoDo:D8vu6y8b7+uQD3hZ3ZMuIos
                                                                                                                                                                    MD5:9BB67E904AC371B5FFD143F8FB54E1E2
                                                                                                                                                                    SHA1:58009E463133AF8B89B59716FE255B118ECA872C
                                                                                                                                                                    SHA-256:44AFBC66F029BE48DB5D01678A0AF7BAF541E4A61D4B07391AA0470F0A961DED
                                                                                                                                                                    SHA-512:573C196DC87A1D3EA22B3EBDD2BE1E4FBFBD3EA431694EC5E503F5CC6717B7D63A478C5C981BA5B467176AADD352C92F1D026B60A28B8FF76390AF6903C1CDC0
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:PK........\..X@......`.......AsIO.dll.\k|.W...M..0....lKh.`MYZI.m..$(...y.&i..v[)..@+..d.L....V...*.......7,.Q)..Z..TQo....B..sg7..o?.....s.=..s.=...U... .g...G.......%....?.(<;.+..K_.....<k....w}..V..O.|x.g...s.j..[.=..o..22..$a.......C.S.Gm.l{.?...?.o.=.;\....;......rs[?okn....e.l;.C...S......n..y..?.......>AX*:....;Sy=.....D....o...^.n"....q. .....8..UcC1Uv..#O....(.G..E..;..5h7..W..g.(....P~..|Y.....q.\R...{N.SVmP..z.."..4...`.[.....A..........:..p`..(.........]..#.....-.}."....>T.c.E.a2.O_P.H...?.....!.w.....+...O.....=;.;*]a.4.\.h....w+..s.innt........+#.L.1....#...U.y.0...I........u....pT.mG.)...e5..m..F.nE}m.....H9uF.r........O.IZ..]Q......,.....#At[^......... .....m,.Ea.6d..4._.....?...~.a.......l!....v..@K.Q.z.Qa$|/....H.9.6T.G..T........vT..o..;y.+..;x.:...R.e....(...n.h...<.=.\.KT....um..F..%."...Xp.G....&K.N.....w.B$..}...,{...$3.VC........K6.M...4.?+.s..|..6j6.0.......Tj..:..,..}.4...&!..g!;9.o.3\.Rj..P...b..H7..\D#.
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe
                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):229848
                                                                                                                                                                    Entropy (8bit):6.573119657498872
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:Y4WuqFgPmBNRP8hXzGXPkW6ZZW8egH1/jQoAg0FubAxZ+051gh9b6q4TQWdO8g:Y9t2nhQ2ZW8ecAOAZCqQWY8g
                                                                                                                                                                    MD5:3F109A02C8D642E8003A1188DF40D861
                                                                                                                                                                    SHA1:F723F38471B8872443AA9177EEF12A96C02CC84A
                                                                                                                                                                    SHA-256:6523B44DA6FA7078C7795B7705498E487B0625E28E15AEC2D270C6E4A909B5A5
                                                                                                                                                                    SHA-512:023696A52D48C465AB62E3EE754B445093B8A0ED0A232B430CE1F0DB3DAE382C9E1FBA210C2B04D1018CC29BFB69C546976912F3939A76E98BCB792AE57AF0DA
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........;uh.;uh.;uh...7uh...uh...&uh...:uh..+k.-uh..+m..uh..+l..uh...:uh...2uh.;ui.Ruh.+a.3uh.+h.:uh.+..:uh.+j.:uh.Rich;uh.........PE..L....!BZ...........!.....0...D...............@.......................................;....@......................... 2.......6..d....................j..........."......p...............................@............@..l............................text...O........0.................. ..`.rdata.......@.......4..............@..@.data...`....@.......4..............@....gfids.......`.......@..............@..@.tls.........p.......B..............@....rsrc................D..............@..@.reloc...".......$...F..............@..B........................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe
                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):86344
                                                                                                                                                                    Entropy (8bit):6.469613843075611
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:1536:C3zQ0q8XqIh06v0UQpTcX+CZntb9lviEossWVcd+u8Nc15TCvOM:UqhIh06vKpTcX+El2+uKc15TCF
                                                                                                                                                                    MD5:E68562F63265E1A70881446B4B9DC455
                                                                                                                                                                    SHA1:DA16EF9367BDE3CE892B1A0E33BC179D8ACDCEB3
                                                                                                                                                                    SHA-256:C8B16F1C6883A23021DA37D9116A757F971FE919D64EF8F9DBA17A7D8DD39ADB
                                                                                                                                                                    SHA-512:6BEDEA10A5B50F6E93E8566C18970C8AD1B8DFC7D5961069FC5D5216DCDDED0B2A2AD8DD91F4AD80F8604D573A343C126DF238EE5C448CDC26B899077957A674
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............L...L...L..M...L..M$..L..M...L...M...L...M...L...M...L..M...L...L...L...M...L...M...L...L...L...M...LRich...L........................PE..L...^.Va...........!.........................................................p............@.........................p&.......&..(....P...............2..H....`..........p...............................@............................................text...\........................... ..`.rdata...\.......^..................@..@.data...D....0......................@....rsrc........P....... ..............@..@.reloc.......`......."..............@..B........................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe
                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):123744
                                                                                                                                                                    Entropy (8bit):6.614657805692098
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:3+CK0llptaTHfPwr5pm6Qi0YqvPZud7YvL:3xbllaborzQtEYT
                                                                                                                                                                    MD5:F383F6F4E764619BD19E319335D3EF2B
                                                                                                                                                                    SHA1:99F287E49A15E495B4EAD8E5589364A5F87B357E
                                                                                                                                                                    SHA-256:03951DFE05BF74C61568AED50B9D8CE5ECF0E0C2B8E73BC37E1A699AE7EEBC9D
                                                                                                                                                                    SHA-512:6FA960A084F42E6DE25B74782D205C48CA9329997FC2AE8DB902BB653DA5E878ED92CED6B37472248D5BDC820FC48080AE4FCE41556C4B20A049E30BF93D6934
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............d...d...d.......d......xd.......d.......d.......d.......d.......d...d...d..T....d..T....d..T....d...di..d..T....d..Rich.d..........................PE..L.....`...........!.....$...........*.......@.......................................Y....@.............................8...H...P.......p...............`%......d......p...........................`...@............@..T............................text....".......$.................. ..`.rdata...s...@...t...(..............@..@.data...............................@....rsrc...p...........................@..@.reloc..\...........................@..B................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2437912
                                                                                                                                                                    Entropy (8bit):7.913512358164593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:25HOOeI0PrBsku297659/XQR70jEUHD5Gl09XCWKYhNj:25rebqkXe5ZQRA/FGl0Z3KKj
                                                                                                                                                                    MD5:F6A0D4349D9A0CEAB75A7BAF7285F2A9
                                                                                                                                                                    SHA1:9ABFF945F6987830AA0A1E2FB798080DC91011D6
                                                                                                                                                                    SHA-256:B48255236A72B0D96FD25F42BE98CFB1694AA7D4824EE46C2E3B0DB397B7FDDF
                                                                                                                                                                    SHA-512:BB701C5BF26A9DEBDCB325DE902BC4A254EFBBF737129BBA86D19A1207E647F54BA1D2056A68ED39B22BBD14BB50D2125C9D82FFDB7337806975FCBA6A1B4C9D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d.....)f.........."....'.....J........i........@......................................%... ..................................................`*.......'.......h.......$..a...................................p*.(................................................... ..'............................. ......'..........................rsrc.........'.....................@....idata.......`*......X..............@....tls.........p*......Z...................themida..>...*......\..............`....boot....v....i..v...\..............`..`........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):326656
                                                                                                                                                                    Entropy (8bit):6.704045744410397
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:uJNgSgE68pOq15/QN1cV+exuCNT0XLeaU2eAoX4QwqnoBm9sZ2gfg2eX15CFusKP:UnN15YgV27It/4QwkoBm9Vg5m1GK0
                                                                                                                                                                    MD5:FECBBAC6C0B95A95776F29BDAA57C6D5
                                                                                                                                                                    SHA1:DC1B7F093F0FCEC1502916F2F248ECB5916F15CC
                                                                                                                                                                    SHA-256:83765226ABB0423196C083BC6B6FB5E8EA2D078B4C885165FEC1401ACB581695
                                                                                                                                                                    SHA-512:1B1D573930B2FE99B91A327DFAE23C14536A29A4E71898E77D6B8697B11A521EE07F4032F5F26ABB1DB28BBF6E6D198599C68ABAD984B6C6C15C7EFD1EA9AFCF
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....Zd.....................|`......A....... ....@...........................a......'.........................................<....._. ............................!..8............................y..@............ ..x............................text............................... ..`.rdata..<m... ...n..................@..@.data.....]......n...~..............@....rsrc... ....._.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):326656
                                                                                                                                                                    Entropy (8bit):6.704045744410397
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:uJNgSgE68pOq15/QN1cV+exuCNT0XLeaU2eAoX4QwqnoBm9sZ2gfg2eX15CFusKP:UnN15YgV27It/4QwkoBm9Vg5m1GK0
                                                                                                                                                                    MD5:FECBBAC6C0B95A95776F29BDAA57C6D5
                                                                                                                                                                    SHA1:DC1B7F093F0FCEC1502916F2F248ECB5916F15CC
                                                                                                                                                                    SHA-256:83765226ABB0423196C083BC6B6FB5E8EA2D078B4C885165FEC1401ACB581695
                                                                                                                                                                    SHA-512:1B1D573930B2FE99B91A327DFAE23C14536A29A4E71898E77D6B8697B11A521EE07F4032F5F26ABB1DB28BBF6E6D198599C68ABAD984B6C6C15C7EFD1EA9AFCF
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....Zd.....................|`......A....... ....@...........................a......'.........................................<....._. ............................!..8............................y..@............ ..x............................text............................... ..`.rdata..<m... ...n..................@..@.data.....]......n...~..............@....rsrc... ....._.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255805140799215
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWo:a72A4VgEvmcH9yKCpM/e4iWo
                                                                                                                                                                    MD5:F6DFD7F39EF9EEF9094A36B574ADFA5E
                                                                                                                                                                    SHA1:B57E4E7B8D0D1E9BC9238D79A7D7B7536812CC7B
                                                                                                                                                                    SHA-256:1E0BFF105B6B55998E1B569CC2A9AD5A2792D8FC7F020630DEAE401000F510F0
                                                                                                                                                                    SHA-512:5258C4E3A4952A3F09C0BB44D07CA237071BF1BABB2D2B4D5B54966E4CB7FA87FE309546775E2D2A0B54EA31B8F5F4FBA189265CD6AE715EB9127EE69D4FEAA6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):326656
                                                                                                                                                                    Entropy (8bit):6.704045744410397
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:uJNgSgE68pOq15/QN1cV+exuCNT0XLeaU2eAoX4QwqnoBm9sZ2gfg2eX15CFusKP:UnN15YgV27It/4QwkoBm9Vg5m1GK0
                                                                                                                                                                    MD5:FECBBAC6C0B95A95776F29BDAA57C6D5
                                                                                                                                                                    SHA1:DC1B7F093F0FCEC1502916F2F248ECB5916F15CC
                                                                                                                                                                    SHA-256:83765226ABB0423196C083BC6B6FB5E8EA2D078B4C885165FEC1401ACB581695
                                                                                                                                                                    SHA-512:1B1D573930B2FE99B91A327DFAE23C14536A29A4E71898E77D6B8697B11A521EE07F4032F5F26ABB1DB28BBF6E6D198599C68ABAD984B6C6C15C7EFD1EA9AFCF
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....Zd.....................|`......A....... ....@...........................a......'.........................................<....._. ............................!..8............................y..@............ ..x............................text............................... ..`.rdata..<m... ...n..................@..@.data.....]......n...~..............@....rsrc... ....._.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255805140799215
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWo:a72A4VgEvmcH9yKCpM/e4iWo
                                                                                                                                                                    MD5:F6DFD7F39EF9EEF9094A36B574ADFA5E
                                                                                                                                                                    SHA1:B57E4E7B8D0D1E9BC9238D79A7D7B7536812CC7B
                                                                                                                                                                    SHA-256:1E0BFF105B6B55998E1B569CC2A9AD5A2792D8FC7F020630DEAE401000F510F0
                                                                                                                                                                    SHA-512:5258C4E3A4952A3F09C0BB44D07CA237071BF1BABB2D2B4D5B54966E4CB7FA87FE309546775E2D2A0B54EA31B8F5F4FBA189265CD6AE715EB9127EE69D4FEAA6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255805140799215
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWo:a72A4VgEvmcH9yKCpM/e4iWo
                                                                                                                                                                    MD5:F6DFD7F39EF9EEF9094A36B574ADFA5E
                                                                                                                                                                    SHA1:B57E4E7B8D0D1E9BC9238D79A7D7B7536812CC7B
                                                                                                                                                                    SHA-256:1E0BFF105B6B55998E1B569CC2A9AD5A2792D8FC7F020630DEAE401000F510F0
                                                                                                                                                                    SHA-512:5258C4E3A4952A3F09C0BB44D07CA237071BF1BABB2D2B4D5B54966E4CB7FA87FE309546775E2D2A0B54EA31B8F5F4FBA189265CD6AE715EB9127EE69D4FEAA6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2437912
                                                                                                                                                                    Entropy (8bit):7.913512358164593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:25HOOeI0PrBsku297659/XQR70jEUHD5Gl09XCWKYhNj:25rebqkXe5ZQRA/FGl0Z3KKj
                                                                                                                                                                    MD5:F6A0D4349D9A0CEAB75A7BAF7285F2A9
                                                                                                                                                                    SHA1:9ABFF945F6987830AA0A1E2FB798080DC91011D6
                                                                                                                                                                    SHA-256:B48255236A72B0D96FD25F42BE98CFB1694AA7D4824EE46C2E3B0DB397B7FDDF
                                                                                                                                                                    SHA-512:BB701C5BF26A9DEBDCB325DE902BC4A254EFBBF737129BBA86D19A1207E647F54BA1D2056A68ED39B22BBD14BB50D2125C9D82FFDB7337806975FCBA6A1B4C9D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d.....)f.........."....'.....J........i........@......................................%... ..................................................`*.......'.......h.......$..a...................................p*.(................................................... ..'............................. ......'..........................rsrc.........'.....................@....idata.......`*......X..............@....tls.........p*......Z...................themida..>...*......\..............`....boot....v....i..v...\..............`..`........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000071001\jok.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:modified
                                                                                                                                                                    Size (bytes):2251
                                                                                                                                                                    Entropy (8bit):0.0
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3::
                                                                                                                                                                    MD5:0158FE9CEAD91D1B027B795984737614
                                                                                                                                                                    SHA1:B41A11F909A7BDF1115088790A5680AC4E23031B
                                                                                                                                                                    SHA-256:513257326E783A862909A2A0F0941D6FF899C403E104FBD1DBC10443C41D9F9A
                                                                                                                                                                    SHA-512:C48A55CC7A92CEFCEFE5FB2382CCD8EF651FC8E0885E88A256CD2F5D83B824B7D910F755180B29ECCB54D9361D6AF82F9CC741BD7E6752122949B657DA973676
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):112128
                                                                                                                                                                    Entropy (8bit):6.400158525810517
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:Q3uSD+ZwruS0bGcuZRt2sSZV/Q3IegRQod4l:AuTiabHuZRAFtlD4l
                                                                                                                                                                    MD5:726CD06231883A159EC1CE28DD538699
                                                                                                                                                                    SHA1:404897E6A133D255AD5A9C26AC6414D7134285A2
                                                                                                                                                                    SHA-256:12FEF2D5995D671EC0E91BDBDC91E2B0D3C90ED3A8B2B13DDAA8AD64727DCD46
                                                                                                                                                                    SHA-512:9EA82E7CB6C6A58446BD5033855947C3E2D475D2910F2B941235E0B96AA08EEC822D2DD17CC86B2D3FCE930F78B799291992408E309A6C63E3011266810EA83E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Yara Hits:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_3, Description: Yara detected Amadey\'s Clipper DLL, Source: C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Author: Joe Security
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......'...c.j.c.j.c.j.8.i.i.j.8.o..j.8.n.q.j..n.l.j..i.r.j..o.B.j.8.k.d.j.c.k...j...c.`.j...j.b.j.....b.j...h.b.j.Richc.j.........................PE..L...j..e...........!.....$...........f.......@............................................@......................... ...........P.......................................8...........................(...@............@..L............................text...6#.......$.................. ..`.rdata..4i...@...j...(..............@..@.data...............................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1285632
                                                                                                                                                                    Entropy (8bit):6.460494158653329
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24576:IvkQL6YY4wMPSYZofkf0Gh6Pi41+a9uyP5dggky+yC7:IsMPSYcS5wPi095Pbg9y
                                                                                                                                                                    MD5:15A42D3E4579DA615A384C717AB2109B
                                                                                                                                                                    SHA1:22AEEDEB2307B1370CDAB70D6A6B6D2C13AD2301
                                                                                                                                                                    SHA-256:3C97BB410E49B11AF8116FEB7240B7101E1967CAE7538418C45C3D2E072E8103
                                                                                                                                                                    SHA-512:1EB7F126DCCC88A2479E3818C36120F5AF3CAA0D632B9EA803485EE6531D6E2A1FD0805B1C4364983D280DF23EA5CA3AD4A5FCA558AC436EFAE36AF9B795C444
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Yara Hits:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Author: Joe Security
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............^...^...^.._...^.._...^.._2..^W._..^W._...^W._...^.._...^...^C..^.._...^.._...^..X^...^.._...^Rich...^........................PE..d...i..e.........." .........R......h........................................P............`......................................... ...X...x........ .......`..(............0..........p........................... ................................................text............................... ..`.rdata..............................@..@.data...L........D..................@....pdata..(....`......................@..@_RDATA..............................@..@.rsrc........ ......................@..@.reloc.......0......................@..B........................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2437912
                                                                                                                                                                    Entropy (8bit):7.913512358164593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:25HOOeI0PrBsku297659/XQR70jEUHD5Gl09XCWKYhNj:25rebqkXe5ZQRA/FGl0Z3KKj
                                                                                                                                                                    MD5:F6A0D4349D9A0CEAB75A7BAF7285F2A9
                                                                                                                                                                    SHA1:9ABFF945F6987830AA0A1E2FB798080DC91011D6
                                                                                                                                                                    SHA-256:B48255236A72B0D96FD25F42BE98CFB1694AA7D4824EE46C2E3B0DB397B7FDDF
                                                                                                                                                                    SHA-512:BB701C5BF26A9DEBDCB325DE902BC4A254EFBBF737129BBA86D19A1207E647F54BA1D2056A68ED39B22BBD14BB50D2125C9D82FFDB7337806975FCBA6A1B4C9D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d.....)f.........."....'.....J........i........@......................................%... ..................................................`*.......'.......h.......$..a...................................p*.(................................................... ..'............................. ......'..........................rsrc.........'.....................@....idata.......`*......X..............@....tls.........p*......Z...................themida..>...*......\..............`....boot....v....i..v...\..............`..`........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255805140799215
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWo:a72A4VgEvmcH9yKCpM/e4iWo
                                                                                                                                                                    MD5:F6DFD7F39EF9EEF9094A36B574ADFA5E
                                                                                                                                                                    SHA1:B57E4E7B8D0D1E9BC9238D79A7D7B7536812CC7B
                                                                                                                                                                    SHA-256:1E0BFF105B6B55998E1B569CC2A9AD5A2792D8FC7F020630DEAE401000F510F0
                                                                                                                                                                    SHA-512:5258C4E3A4952A3F09C0BB44D07CA237071BF1BABB2D2B4D5B54966E4CB7FA87FE309546775E2D2A0B54EA31B8F5F4FBA189265CD6AE715EB9127EE69D4FEAA6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):7462
                                                                                                                                                                    Entropy (8bit):5.420482116403958
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                                                                                                                                    MD5:77F762F953163D7639DFF697104E1470
                                                                                                                                                                    SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                                                                                                                                    SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                                                                                                                                    SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255805140799215
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWo:a72A4VgEvmcH9yKCpM/e4iWo
                                                                                                                                                                    MD5:F6DFD7F39EF9EEF9094A36B574ADFA5E
                                                                                                                                                                    SHA1:B57E4E7B8D0D1E9BC9238D79A7D7B7536812CC7B
                                                                                                                                                                    SHA-256:1E0BFF105B6B55998E1B569CC2A9AD5A2792D8FC7F020630DEAE401000F510F0
                                                                                                                                                                    SHA-512:5258C4E3A4952A3F09C0BB44D07CA237071BF1BABB2D2B4D5B54966E4CB7FA87FE309546775E2D2A0B54EA31B8F5F4FBA189265CD6AE715EB9127EE69D4FEAA6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255805140799215
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWo:a72A4VgEvmcH9yKCpM/e4iWo
                                                                                                                                                                    MD5:F6DFD7F39EF9EEF9094A36B574ADFA5E
                                                                                                                                                                    SHA1:B57E4E7B8D0D1E9BC9238D79A7D7B7536812CC7B
                                                                                                                                                                    SHA-256:1E0BFF105B6B55998E1B569CC2A9AD5A2792D8FC7F020630DEAE401000F510F0
                                                                                                                                                                    SHA-512:5258C4E3A4952A3F09C0BB44D07CA237071BF1BABB2D2B4D5B54966E4CB7FA87FE309546775E2D2A0B54EA31B8F5F4FBA189265CD6AE715EB9127EE69D4FEAA6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):326656
                                                                                                                                                                    Entropy (8bit):6.704045744410397
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:uJNgSgE68pOq15/QN1cV+exuCNT0XLeaU2eAoX4QwqnoBm9sZ2gfg2eX15CFusKP:UnN15YgV27It/4QwkoBm9Vg5m1GK0
                                                                                                                                                                    MD5:FECBBAC6C0B95A95776F29BDAA57C6D5
                                                                                                                                                                    SHA1:DC1B7F093F0FCEC1502916F2F248ECB5916F15CC
                                                                                                                                                                    SHA-256:83765226ABB0423196C083BC6B6FB5E8EA2D078B4C885165FEC1401ACB581695
                                                                                                                                                                    SHA-512:1B1D573930B2FE99B91A327DFAE23C14536A29A4E71898E77D6B8697B11A521EE07F4032F5F26ABB1DB28BBF6E6D198599C68ABAD984B6C6C15C7EFD1EA9AFCF
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....Zd.....................|`......A....... ....@...........................a......'.........................................<....._. ............................!..8............................y..@............ ..x............................text............................... ..`.rdata..<m... ...n..................@..@.data.....]......n...~..............@....rsrc... ....._.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):7462
                                                                                                                                                                    Entropy (8bit):5.420482116403958
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                                                                                                                                    MD5:77F762F953163D7639DFF697104E1470
                                                                                                                                                                    SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                                                                                                                                    SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                                                                                                                                    SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):326656
                                                                                                                                                                    Entropy (8bit):6.704045744410397
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:uJNgSgE68pOq15/QN1cV+exuCNT0XLeaU2eAoX4QwqnoBm9sZ2gfg2eX15CFusKP:UnN15YgV27It/4QwkoBm9Vg5m1GK0
                                                                                                                                                                    MD5:FECBBAC6C0B95A95776F29BDAA57C6D5
                                                                                                                                                                    SHA1:DC1B7F093F0FCEC1502916F2F248ECB5916F15CC
                                                                                                                                                                    SHA-256:83765226ABB0423196C083BC6B6FB5E8EA2D078B4C885165FEC1401ACB581695
                                                                                                                                                                    SHA-512:1B1D573930B2FE99B91A327DFAE23C14536A29A4E71898E77D6B8697B11A521EE07F4032F5F26ABB1DB28BBF6E6D198599C68ABAD984B6C6C15C7EFD1EA9AFCF
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....Zd.....................|`......A....... ....@...........................a......'.........................................<....._. ............................!..8............................y..@............ ..x............................text............................... ..`.rdata..<m... ...n..................@..@.data.....]......n...~..............@....rsrc... ....._.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):326656
                                                                                                                                                                    Entropy (8bit):6.704045744410397
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:uJNgSgE68pOq15/QN1cV+exuCNT0XLeaU2eAoX4QwqnoBm9sZ2gfg2eX15CFusKP:UnN15YgV27It/4QwkoBm9Vg5m1GK0
                                                                                                                                                                    MD5:FECBBAC6C0B95A95776F29BDAA57C6D5
                                                                                                                                                                    SHA1:DC1B7F093F0FCEC1502916F2F248ECB5916F15CC
                                                                                                                                                                    SHA-256:83765226ABB0423196C083BC6B6FB5E8EA2D078B4C885165FEC1401ACB581695
                                                                                                                                                                    SHA-512:1B1D573930B2FE99B91A327DFAE23C14536A29A4E71898E77D6B8697B11A521EE07F4032F5F26ABB1DB28BBF6E6D198599C68ABAD984B6C6C15C7EFD1EA9AFCF
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....Zd.....................|`......A....... ....@...........................a......'.........................................<....._. ............................!..8............................y..@............ ..x............................text............................... ..`.rdata..<m... ...n..................@..@.data.....]......n...~..............@....rsrc... ....._.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2437912
                                                                                                                                                                    Entropy (8bit):7.913512358164593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:25HOOeI0PrBsku297659/XQR70jEUHD5Gl09XCWKYhNj:25rebqkXe5ZQRA/FGl0Z3KKj
                                                                                                                                                                    MD5:F6A0D4349D9A0CEAB75A7BAF7285F2A9
                                                                                                                                                                    SHA1:9ABFF945F6987830AA0A1E2FB798080DC91011D6
                                                                                                                                                                    SHA-256:B48255236A72B0D96FD25F42BE98CFB1694AA7D4824EE46C2E3B0DB397B7FDDF
                                                                                                                                                                    SHA-512:BB701C5BF26A9DEBDCB325DE902BC4A254EFBBF737129BBA86D19A1207E647F54BA1D2056A68ED39B22BBD14BB50D2125C9D82FFDB7337806975FCBA6A1B4C9D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d.....)f.........."....'.....J........i........@......................................%... ..................................................`*.......'.......h.......$..a...................................p*.(................................................... ..'............................. ......'..........................rsrc.........'.....................@....idata.......`*......X..............@....tls.........p*......Z...................themida..>...*......\..............`....boot....v....i..v...\..............`..`........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406136
                                                                                                                                                                    Entropy (8bit):7.976287950479779
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:xjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/E6:xIS769aql4v/ahlHt2c0v7pgQo3
                                                                                                                                                                    MD5:AB07F9804DD13FC897A07EB65E58166A
                                                                                                                                                                    SHA1:2BAE9148D763297A7C83F5211DBD3623DFDC94C1
                                                                                                                                                                    SHA-256:8DCC360090EA80EE31CD3CCD79CD0177CC998D9B06F06A6240CC4E099A1EBB74
                                                                                                                                                                    SHA-512:9E46D7C25BD36E60A7B71837C276857C5971DA2912D37E26DC9690F62E55FC8532EE84B465D161D82CF22045E3E13E22B1C2DF4CB0BB19C01A459001CA898B1E
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C.x............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):326656
                                                                                                                                                                    Entropy (8bit):6.704045744410397
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:uJNgSgE68pOq15/QN1cV+exuCNT0XLeaU2eAoX4QwqnoBm9sZ2gfg2eX15CFusKP:UnN15YgV27It/4QwkoBm9Vg5m1GK0
                                                                                                                                                                    MD5:FECBBAC6C0B95A95776F29BDAA57C6D5
                                                                                                                                                                    SHA1:DC1B7F093F0FCEC1502916F2F248ECB5916F15CC
                                                                                                                                                                    SHA-256:83765226ABB0423196C083BC6B6FB5E8EA2D078B4C885165FEC1401ACB581695
                                                                                                                                                                    SHA-512:1B1D573930B2FE99B91A327DFAE23C14536A29A4E71898E77D6B8697B11A521EE07F4032F5F26ABB1DB28BBF6E6D198599C68ABAD984B6C6C15C7EFD1EA9AFCF
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....Zd.....................|`......A....... ....@...........................a......'.........................................<....._. ............................!..8............................y..@............ ..x............................text............................... ..`.rdata..<m... ...n..................@..@.data.....]......n...~..............@....rsrc... ....._.....................@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):7462
                                                                                                                                                                    Entropy (8bit):5.420482116403958
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                                                                                                                                    MD5:77F762F953163D7639DFF697104E1470
                                                                                                                                                                    SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                                                                                                                                    SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                                                                                                                                    SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):7462
                                                                                                                                                                    Entropy (8bit):5.420482116403958
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                                                                                                                                    MD5:77F762F953163D7639DFF697104E1470
                                                                                                                                                                    SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                                                                                                                                    SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                                                                                                                                    SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255805140799215
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWo:a72A4VgEvmcH9yKCpM/e4iWo
                                                                                                                                                                    MD5:F6DFD7F39EF9EEF9094A36B574ADFA5E
                                                                                                                                                                    SHA1:B57E4E7B8D0D1E9BC9238D79A7D7B7536812CC7B
                                                                                                                                                                    SHA-256:1E0BFF105B6B55998E1B569CC2A9AD5A2792D8FC7F020630DEAE401000F510F0
                                                                                                                                                                    SHA-512:5258C4E3A4952A3F09C0BB44D07CA237071BF1BABB2D2B4D5B54966E4CB7FA87FE309546775E2D2A0B54EA31B8F5F4FBA189265CD6AE715EB9127EE69D4FEAA6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:HTML document, Unicode text, UTF-8 text, with very long lines (1460)
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):7462
                                                                                                                                                                    Entropy (8bit):5.420482116403958
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:192:5LP+u+v13xV1cSHYu+zogDLIIUObDz5p7KoxSR1yz:5D+hv13T1FH0fHIIPD9xKu
                                                                                                                                                                    MD5:77F762F953163D7639DFF697104E1470
                                                                                                                                                                    SHA1:ADE9FFF9FFC2D587D50C636C28E4CD8DD99548D3
                                                                                                                                                                    SHA-256:D9E15BB8027FF52D6D8D4E294C0D690F4BBF9EF3ABC6001F69DCF08896FBD4EA
                                                                                                                                                                    SHA-512:D9041D02AACA5F06A0F82111486DF1D58DF3BE7F42778C127CCC53B2E1804C57B42B263CC607D70E5240518280C7078E066C07DEC2EA32EC13FB86AA0D4CB499
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:<!DOCTYPE html>.<html lang="" class="html">.<head>..<title></title>..<meta http-equiv="content-type" content="text/html; charset=utf-8" />..<meta http-equiv="X-UA-Compatible" content="IE=edge">.. <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=yes">..<meta name="author" content="Deorg" />..<meta name="copyright" content="Copyright . IPLogger 2010-" />..<meta name="robots" content="index, follow" />..<meta name="revisit-after" content="7 days" />..<meta name="keywords" content="shortener, iplogger, shortlink, url, domain" />..<meta name="description" content="" />...<link rel="shortcut icon" href="https://cdn.iplogger.org/favicon.ico" type="image/x-icon" />...<meta property="og:image" content="" />..<meta property="og:description" content="" />..<meta property="fb:app_id" content="232115388491569" />..<meta property="og:image:width" content="285" />..<meta property="og:image:height" content="200" />..<meta property="og:url" content="https://yip.su/R
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2437912
                                                                                                                                                                    Entropy (8bit):7.913512358164593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:25HOOeI0PrBsku297659/XQR70jEUHD5Gl09XCWKYhNj:25rebqkXe5ZQRA/FGl0Z3KKj
                                                                                                                                                                    MD5:F6A0D4349D9A0CEAB75A7BAF7285F2A9
                                                                                                                                                                    SHA1:9ABFF945F6987830AA0A1E2FB798080DC91011D6
                                                                                                                                                                    SHA-256:B48255236A72B0D96FD25F42BE98CFB1694AA7D4824EE46C2E3B0DB397B7FDDF
                                                                                                                                                                    SHA-512:BB701C5BF26A9DEBDCB325DE902BC4A254EFBBF737129BBA86D19A1207E647F54BA1D2056A68ED39B22BBD14BB50D2125C9D82FFDB7337806975FCBA6A1B4C9D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d.....)f.........."....'.....J........i........@......................................%... ..................................................`*.......'.......h.......$..a...................................p*.(................................................... ..'............................. ......'..........................rsrc.........'.....................@....idata.......`*......X..............@....tls.........p*......Z...................themida..>...*......\..............`....boot....v....i..v...\..............`..`........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6607314
                                                                                                                                                                    Entropy (8bit):7.9960039713545585
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:196608:91OaXf1Vgw0Q2GekhBTUpKiTOZ5FrrOhU+3:3OaXf1Gwbek/QKis5FO33
                                                                                                                                                                    MD5:A63018CC078F57C640AC2EC8ED84DEAD
                                                                                                                                                                    SHA1:1F5C17894A755114527E92304F4A74195C48031D
                                                                                                                                                                    SHA-256:41D01D8FC610B6CEB17687C58973EE8F6A7BBDC1EB6DEB19297E3F4C4C62B558
                                                                                                                                                                    SHA-512:A42F522745BBE8B36EA60D7688A713BCE89DF2F7B0F5C7AD7B32BC43989FCA71E00D817692263EA4004AD6BE23E64DD9D3D2F1DFBE7B5038CF4B79B7064A9864
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........W..s...s...s...}...s...y..s...,...s...r.!.s.......s...x..s.......s.......s.^.u...s.Rich..s.........PE..L....S.L.............................K............@.............................................................................d....p..`............................................................................................................text.............................. ..`.rdata...D.......F..................@..@.data...HZ.......2..................@....sxdata......`......................@....rsrc...`....p......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):4406144
                                                                                                                                                                    Entropy (8bit):7.976285875147776
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:pjkS767mgfCql3JGv/ahl+SHfFvOcmDv82yK3QQoN3V/EE:pIS769aql4v/ahlHt2c0v7pgQoZ
                                                                                                                                                                    MD5:26D8B57793A75CEC9D9265BF16ED905C
                                                                                                                                                                    SHA1:F427028D21A2A6406BBB98CFB53851C3EA534883
                                                                                                                                                                    SHA-256:3C8C36618E1EAA925CFA7E7ADC78D22D3440C5D2DF88DF55C50E6FA3F2E1FA9E
                                                                                                                                                                    SHA-512:957704A0FB5877E43C96ADA9FAB01E3A193CFB0D79B4DFDE093AAE6432206477F7D8247D0A525AFCFEE62742056AAF4CF6E623DDBFCBE6A750B36F42051CC795
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L.....d.............................A....... ....@.................................uGC........................................<....... ............0C..............!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data.............?..~..............@....rsrc... ............ A.............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):2437912
                                                                                                                                                                    Entropy (8bit):7.913512358164593
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:49152:25HOOeI0PrBsku297659/XQR70jEUHD5Gl09XCWKYhNj:25rebqkXe5ZQRA/FGl0Z3KKj
                                                                                                                                                                    MD5:F6A0D4349D9A0CEAB75A7BAF7285F2A9
                                                                                                                                                                    SHA1:9ABFF945F6987830AA0A1E2FB798080DC91011D6
                                                                                                                                                                    SHA-256:B48255236A72B0D96FD25F42BE98CFB1694AA7D4824EE46C2E3B0DB397B7FDDF
                                                                                                                                                                    SHA-512:BB701C5BF26A9DEBDCB325DE902BC4A254EFBBF737129BBA86D19A1207E647F54BA1D2056A68ED39B22BBD14BB50D2125C9D82FFDB7337806975FCBA6A1B4C9D
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d.....)f.........."....'.....J........i........@......................................%... ..................................................`*.......'.......h.......$..a...................................p*.(................................................... ..'............................. ......'..........................rsrc.........'.....................@....idata.......`*......X..............@....tls.........p*......Z...................themida..>...*......\..............`....boot....v....i..v...\..............`..`........................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):473601
                                                                                                                                                                    Entropy (8bit):7.255805140799215
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6144:a7ChA4VgoGhrVNWUovmcfVL520yANcFlI22in1en/S3j4iWo:a72A4VgEvmcH9yKCpM/e4iWo
                                                                                                                                                                    MD5:F6DFD7F39EF9EEF9094A36B574ADFA5E
                                                                                                                                                                    SHA1:B57E4E7B8D0D1E9BC9238D79A7D7B7536812CC7B
                                                                                                                                                                    SHA-256:1E0BFF105B6B55998E1B569CC2A9AD5A2792D8FC7F020630DEAE401000F510F0
                                                                                                                                                                    SHA-512:5258C4E3A4952A3F09C0BB44D07CA237071BF1BABB2D2B4D5B54966E4CB7FA87FE309546775E2D2A0B54EA31B8F5F4FBA189265CD6AE715EB9127EE69D4FEAA6
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.~....H...H...H...H...H...H...H...H%..H...H...H...Ha..H.].H...H...H...H.].H...HRich...H........................PE..L....E.d......................b......A....... ....@...........................c.....7..........................................<.....a..............................!..8............................y..@............ ..x............................text............................... ..`.rdata..Lm... ...n..................@..@.data...H%`..........~..............@....rsrc.........a......(..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\1000019001\amert.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):288
                                                                                                                                                                    Entropy (8bit):3.383193846131428
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6:jjRtX4RKUEZ+lX1y6y2l+lRdtPjgsW2YRZuy0lPhlNqut0:jjRZ4RKQ1y6NkDHjzvYRQVpqut0
                                                                                                                                                                    MD5:071B6C753E0D711EEA32E6FAED0BBEBE
                                                                                                                                                                    SHA1:90C68E1258E2873C63273BA7BA16D8C58D0FF232
                                                                                                                                                                    SHA-256:B94A57C1906FD66698F95BA5BD5B65733819C86FEB372B1924D648298CBDE28E
                                                                                                                                                                    SHA-512:2D1219B38E3F8E22CE0BEFA65C9B76F9CDFB2138B980CAC2A7CCCA40D48BA51BC4C038EFC1F20451E9194BBA0EA5BF49372BFFEBFE58826FFBBE59E9C221CC7D
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:....x...Y..D....%C..F.......<... .....s.......... ....................:.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.0.9.f.d.8.5.1.a.4.f.\.e.x.p.l.o.r.h.a...e.x.e.........J.O.N.E.S.-.P.C.\.j.o.n.e.s...................0.................5.@3P.........................
                                                                                                                                                                    Process:C:\Users\user\Desktop\1CMweaqlKp.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):288
                                                                                                                                                                    Entropy (8bit):3.3765382772717647
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6:nG6lVX4RKUEZ+lX1dMlylRdtPjgsW2YRZuy0lPhlkdt0:nR4RKQ12oDHjzvYRQVot0
                                                                                                                                                                    MD5:3D665E33943D4BA084D7A0223416AEA2
                                                                                                                                                                    SHA1:7C6D8975C0691F147FF9380F8590881AFCF8B100
                                                                                                                                                                    SHA-256:4B07E380F883EB63A9D9954D5A6E000936C38A487B5533AFD767D27602BD896C
                                                                                                                                                                    SHA-512:4DF4212E7086563C5E6D893C063A0A6CDF1DC851E1E7885DEAD141A7E7149893E4CE7FDE35455D66888D4E9F227956A4E8BBE43AB60ECE804BF93675A2A12680
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:....D..i.L.K..-.;rc.F.......<... .....s.......... ....................:.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.5.4.5.4.e.6.f.0.6.2.\.e.x.p.l.o.r.t.a...e.x.e.........J.O.N.E.S.-.P.C.\.j.o.n.e.s...................0.................4.@3P.........................
                                                                                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Entropy (8bit):7.95023297552325
                                                                                                                                                                    TrID:
                                                                                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                    File name:1CMweaqlKp.exe
                                                                                                                                                                    File size:1'793'040 bytes
                                                                                                                                                                    MD5:8a19d654cb37e4e51be045acaf097e74
                                                                                                                                                                    SHA1:7a3a86421a806d2ba66ae84e86305847c8b1f766
                                                                                                                                                                    SHA256:59b3af1a244a082219116ed9b496de99236b01ae42df75bf4211ed2b7069bc4b
                                                                                                                                                                    SHA512:df54f9f61b5c9e9a79edf17732b6bb630d945f813f00579b79f021735d3f3c6802a463d9d6f41a75d3703a86a0844b9f587c3961e44ae53045ddb25b67438681
                                                                                                                                                                    SSDEEP:49152:mQKkQGW5tuFxaLTdYZWakRk43qB75IzCed:mvtH5AFYMWa5WqBSt
                                                                                                                                                                    TLSH:F18533171F962F1FE7AD95311D4B8107E7232B022B9995920C3F1A09EB8BF5ED76028D
                                                                                                                                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d.Y@...@...@....m..Q....m.......h..R....h..W....h..5....m..U....m..S...@........k..A....k1.A....k..A...Rich@...........PE..L..
                                                                                                                                                                    Icon Hash:90cececece8e8eb0
                                                                                                                                                                    Entrypoint:0x7c6058
                                                                                                                                                                    Entrypoint Section:.boot
                                                                                                                                                                    Digitally signed:false
                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                    Subsystem:windows gui
                                                                                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                                                                                    Time Stamp:0x66264F79 [Mon Apr 22 11:52:25 2024 UTC]
                                                                                                                                                                    TLS Callbacks:
                                                                                                                                                                    CLR (.Net) Version:
                                                                                                                                                                    OS Version Major:6
                                                                                                                                                                    OS Version Minor:0
                                                                                                                                                                    File Version Major:6
                                                                                                                                                                    File Version Minor:0
                                                                                                                                                                    Subsystem Version Major:6
                                                                                                                                                                    Subsystem Version Minor:0
                                                                                                                                                                    Import Hash:9dfe5757453ac4b6ed82bf0cf7ab0266
                                                                                                                                                                    Instruction
                                                                                                                                                                    call 00007F0D744FF1F0h
                                                                                                                                                                    push ebx
                                                                                                                                                                    mov ebx, esp
                                                                                                                                                                    push ebx
                                                                                                                                                                    mov esi, dword ptr [ebx+08h]
                                                                                                                                                                    mov edi, dword ptr [ebx+10h]
                                                                                                                                                                    cld
                                                                                                                                                                    mov dl, 80h
                                                                                                                                                                    mov al, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    mov byte ptr [edi], al
                                                                                                                                                                    inc edi
                                                                                                                                                                    mov ebx, 00000002h
                                                                                                                                                                    add dl, dl
                                                                                                                                                                    jne 00007F0D744FF0A7h
                                                                                                                                                                    mov dl, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    adc dl, dl
                                                                                                                                                                    jnc 00007F0D744FF08Ch
                                                                                                                                                                    add dl, dl
                                                                                                                                                                    jne 00007F0D744FF0A7h
                                                                                                                                                                    mov dl, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    adc dl, dl
                                                                                                                                                                    jnc 00007F0D744FF0F3h
                                                                                                                                                                    xor eax, eax
                                                                                                                                                                    add dl, dl
                                                                                                                                                                    jne 00007F0D744FF0A7h
                                                                                                                                                                    mov dl, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    adc dl, dl
                                                                                                                                                                    jnc 00007F0D744FF187h
                                                                                                                                                                    add dl, dl
                                                                                                                                                                    jne 00007F0D744FF0A7h
                                                                                                                                                                    mov dl, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    adc dl, dl
                                                                                                                                                                    adc eax, eax
                                                                                                                                                                    add dl, dl
                                                                                                                                                                    jne 00007F0D744FF0A7h
                                                                                                                                                                    mov dl, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    adc dl, dl
                                                                                                                                                                    adc eax, eax
                                                                                                                                                                    add dl, dl
                                                                                                                                                                    jne 00007F0D744FF0A7h
                                                                                                                                                                    mov dl, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    adc dl, dl
                                                                                                                                                                    adc eax, eax
                                                                                                                                                                    add dl, dl
                                                                                                                                                                    jne 00007F0D744FF0A7h
                                                                                                                                                                    mov dl, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    adc dl, dl
                                                                                                                                                                    adc eax, eax
                                                                                                                                                                    je 00007F0D744FF0AAh
                                                                                                                                                                    push edi
                                                                                                                                                                    mov eax, eax
                                                                                                                                                                    sub edi, eax
                                                                                                                                                                    mov al, byte ptr [edi]
                                                                                                                                                                    pop edi
                                                                                                                                                                    mov byte ptr [edi], al
                                                                                                                                                                    inc edi
                                                                                                                                                                    mov ebx, 00000002h
                                                                                                                                                                    jmp 00007F0D744FF03Bh
                                                                                                                                                                    mov eax, 00000001h
                                                                                                                                                                    add dl, dl
                                                                                                                                                                    jne 00007F0D744FF0A7h
                                                                                                                                                                    mov dl, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    adc dl, dl
                                                                                                                                                                    adc eax, eax
                                                                                                                                                                    add dl, dl
                                                                                                                                                                    jne 00007F0D744FF0A7h
                                                                                                                                                                    mov dl, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    adc dl, dl
                                                                                                                                                                    jc 00007F0D744FF08Ch
                                                                                                                                                                    sub eax, ebx
                                                                                                                                                                    mov ebx, 00000001h
                                                                                                                                                                    jne 00007F0D744FF0CAh
                                                                                                                                                                    mov ecx, 00000001h
                                                                                                                                                                    add dl, dl
                                                                                                                                                                    jne 00007F0D744FF0A7h
                                                                                                                                                                    mov dl, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    adc dl, dl
                                                                                                                                                                    adc ecx, ecx
                                                                                                                                                                    add dl, dl
                                                                                                                                                                    jne 00007F0D744FF0A7h
                                                                                                                                                                    mov dl, byte ptr [esi]
                                                                                                                                                                    inc esi
                                                                                                                                                                    adc dl, dl
                                                                                                                                                                    jc 00007F0D744FF08Ch
                                                                                                                                                                    push esi
                                                                                                                                                                    mov esi, edi
                                                                                                                                                                    sub esi, ebp
                                                                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x7109f0xc0.idata
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x730000x7e0.rsrc
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x54b0000x10.reloc
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x720180x18.tls
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                    0x10000x4e44a0x22c00a5e751a92a1947726cc67adfef4a0373False0.9998594874100719data7.9986661792698115IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                    0x500000x11c4e0x560085b290aba621320b3a049fa51378c3ddFalse0.9919149709302325data7.976162209855725IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                    0x620000x45a40x8002a3e8ea4dc9277bcd556451c4ee91650False1.00537109375data7.830994967960864IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    0x670000x1e00x2001b480a6bcbebe55da620b713671dc6c8False0.888671875data6.653586874235383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                    0x680000x4bc40x300020c37b764ed7c0c6e76f0ba67ca90a84False0.98486328125data7.942117552678557IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                    .vm_sec0x6d0000x40000x40006cee6e2c9038a4e137fc8ad2cb72b7cbFalse0.161376953125data2.8770965350351982IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    .idata0x710000x10000x200f9eef23d1138690aeba265ff5448dfcaFalse0.3828125data2.863715215086496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    .tls0x720000x10000x200f6363c53ce07d09b61b63b66eb8cf6baFalse0.056640625data0.18120187678200297IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    .rsrc0x730000x10000x80087acbb71b21ab4ae100181a4447d8be5False0.4111328125data5.44897069280421IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                    .themida0x740000x3520000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    .boot0x3c60000x1850000x185000164450c06cec20e88bfe7678fc794b45False0.9902337473891388data7.955810157618839IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                    .reloc0x54b0000x10000x10e9e9559f85469b458c40ee7aae3a2776False1.5GLS_BINARY_LSB_FIRST2.349601752714581IMAGE_SCN_MEM_READ
                                                                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                    RT_MANIFEST0x730780x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                                                                                                                                    RT_MANIFEST0x732080x5d7XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.43478260869565216
                                                                                                                                                                    DLLImport
                                                                                                                                                                    kernel32.dllGetModuleHandleA
                                                                                                                                                                    ADVAPI32.dllRegCloseKey
                                                                                                                                                                    SHELL32.dllSHGetFolderPathA
                                                                                                                                                                    ole32.dllCoUninitialize
                                                                                                                                                                    WININET.dllHttpOpenRequestA
                                                                                                                                                                    WS2_32.dllclosesocket
                                                                                                                                                                    Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                    EnglishUnited States
                                                                                                                                                                    Skipped network analysis since the amount of network traffic is too extensive. Please download the PCAP and check manually.

                                                                                                                                                                    Click to jump to process

                                                                                                                                                                    Click to jump to process

                                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                                    Click to jump to process

                                                                                                                                                                    Target ID:0
                                                                                                                                                                    Start time:05:51:51
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\Desktop\1CMweaqlKp.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\Desktop\1CMweaqlKp.exe"
                                                                                                                                                                    Imagebase:0x730000
                                                                                                                                                                    File size:1'793'040 bytes
                                                                                                                                                                    MD5 hash:8A19D654CB37E4E51BE045ACAF097E74
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000003.1626992485.00000000014C0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000000.00000002.1663899661.0000000000731000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:1
                                                                                                                                                                    Start time:05:51:54
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"
                                                                                                                                                                    Imagebase:0x700000
                                                                                                                                                                    File size:1'793'040 bytes
                                                                                                                                                                    MD5 hash:8A19D654CB37E4E51BE045ACAF097E74
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000001.00000003.1663910421.0000000000C90000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:2
                                                                                                                                                                    Start time:05:51:56
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http://%3cfnc1%3e(79)/
                                                                                                                                                                    Imagebase:0x7ff76e190000
                                                                                                                                                                    File size:3'242'272 bytes
                                                                                                                                                                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:4
                                                                                                                                                                    Start time:05:51:57
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2656 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                                                                                                                                                    Imagebase:0x7ff76e190000
                                                                                                                                                                    File size:3'242'272 bytes
                                                                                                                                                                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:5
                                                                                                                                                                    Start time:05:52:00
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                    Imagebase:0x700000
                                                                                                                                                                    File size:1'793'040 bytes
                                                                                                                                                                    MD5 hash:8A19D654CB37E4E51BE045ACAF097E74
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000005.00000003.1721215690.00000000011E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000005.00000002.1732128904.0000000000701000.00000020.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:6
                                                                                                                                                                    Start time:05:52:01
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe
                                                                                                                                                                    Wow64 process (32bit):
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\5454e6f062\explorta.exe"
                                                                                                                                                                    Imagebase:
                                                                                                                                                                    File size:1'793'040 bytes
                                                                                                                                                                    MD5 hash:8A19D654CB37E4E51BE045ACAF097E74
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:7
                                                                                                                                                                    Start time:05:52:09
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\1000019001\amert.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\1000019001\amert.exe"
                                                                                                                                                                    Imagebase:0x610000
                                                                                                                                                                    File size:1'885'696 bytes
                                                                                                                                                                    MD5 hash:E67C8B3E5EC9F64052FCD2F45341CFA5
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000007.00000002.1868102298.0000000000611000.00000040.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000007.00000003.1826787054.0000000004E00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:9
                                                                                                                                                                    Start time:05:52:14
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe"
                                                                                                                                                                    Imagebase:0x7e0000
                                                                                                                                                                    File size:2'390'528 bytes
                                                                                                                                                                    MD5 hash:C1BF02296C415ABC8B1F0ED13088D96D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.3073575028.0000000001456000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000009.00000002.3082656269.0000000007D70000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:10
                                                                                                                                                                    Start time:05:52:14
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe"
                                                                                                                                                                    Imagebase:0x930000
                                                                                                                                                                    File size:1'885'696 bytes
                                                                                                                                                                    MD5 hash:E67C8B3E5EC9F64052FCD2F45341CFA5
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000000A.00000003.1894101326.0000000005260000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:11
                                                                                                                                                                    Start time:05:52:17
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:C:\Users\user\AppData\Local\Temp\09fd851a4f\explorha.exe
                                                                                                                                                                    Imagebase:0x930000
                                                                                                                                                                    File size:1'885'696 bytes
                                                                                                                                                                    MD5 hash:E67C8B3E5EC9F64052FCD2F45341CFA5
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000000B.00000003.1904362561.0000000004F10000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 0000000B.00000002.1945079164.0000000000931000.00000040.00000001.01000000.0000000D.sdmp, Author: Joe Security
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:14
                                                                                                                                                                    Start time:05:52:21
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 HR" /sc HOURLY /rl HIGHEST
                                                                                                                                                                    Imagebase:0xb50000
                                                                                                                                                                    File size:187'904 bytes
                                                                                                                                                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:15
                                                                                                                                                                    Start time:05:52:21
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:16
                                                                                                                                                                    Start time:05:52:21
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\1000021002\ac861238af.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\1000021002\ac861238af.exe"
                                                                                                                                                                    Imagebase:0x6a0000
                                                                                                                                                                    File size:1'166'336 bytes
                                                                                                                                                                    MD5 hash:34C3E84E001DB4CF23A94BE34D462F11
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Antivirus matches:
                                                                                                                                                                    • Detection: 100%, Avira
                                                                                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                                                                                    • Detection: 35%, Virustotal, Browse
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:17
                                                                                                                                                                    Start time:05:52:21
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:schtasks /create /f /RU "user" /tr "C:\ProgramData\MPGPH131\MPGPH131.exe" /tn "MPGPH131 LG" /sc ONLOGON /rl HIGHEST
                                                                                                                                                                    Imagebase:0xb50000
                                                                                                                                                                    File size:187'904 bytes
                                                                                                                                                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:18
                                                                                                                                                                    Start time:05:52:21
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:19
                                                                                                                                                                    Start time:05:52:22
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/account
                                                                                                                                                                    Imagebase:0x7ff76e190000
                                                                                                                                                                    File size:3'242'272 bytes
                                                                                                                                                                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:20
                                                                                                                                                                    Start time:05:52:22
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                                                                                                                                                    Imagebase:0x5a0000
                                                                                                                                                                    File size:61'440 bytes
                                                                                                                                                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:21
                                                                                                                                                                    Start time:05:52:22
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\rundll32.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\cred64.dll, Main
                                                                                                                                                                    Imagebase:0x7ff600a40000
                                                                                                                                                                    File size:71'680 bytes
                                                                                                                                                                    MD5 hash:EF3179D498793BF4234F708D3BE28633
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:22
                                                                                                                                                                    Start time:05:52:23
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\netsh.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:netsh wlan show profiles
                                                                                                                                                                    Imagebase:0x7ff6c8ed0000
                                                                                                                                                                    File size:96'768 bytes
                                                                                                                                                                    MD5 hash:6F1E6DD688818BC3D1391D0CC7D597EB
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:moderate
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:23
                                                                                                                                                                    Start time:05:52:23
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:24
                                                                                                                                                                    Start time:05:52:23
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\1000066001\swiiiii.exe"
                                                                                                                                                                    Imagebase:0x940000
                                                                                                                                                                    File size:329'352 bytes
                                                                                                                                                                    MD5 hash:1C7D0F34BB1D85B5D2C01367CC8F62EF
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:25
                                                                                                                                                                    Start time:05:52:23
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:26
                                                                                                                                                                    Start time:05:52:25
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main
                                                                                                                                                                    Imagebase:0x5a0000
                                                                                                                                                                    File size:61'440 bytes
                                                                                                                                                                    MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:27
                                                                                                                                                                    Start time:05:52:26
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                                                                                    Imagebase:0x700000
                                                                                                                                                                    File size:2'390'528 bytes
                                                                                                                                                                    MD5 hash:C1BF02296C415ABC8B1F0ED13088D96D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 0000001B.00000002.3354975509.0000000008152000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Antivirus matches:
                                                                                                                                                                    • Detection: 100%, Joe Sandbox ML
                                                                                                                                                                    • Detection: 53%, Virustotal, Browse
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:28
                                                                                                                                                                    Start time:05:52:26
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:C:\ProgramData\MPGPH131\MPGPH131.exe
                                                                                                                                                                    Imagebase:0x700000
                                                                                                                                                                    File size:2'390'528 bytes
                                                                                                                                                                    MD5 hash:C1BF02296C415ABC8B1F0ED13088D96D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:29
                                                                                                                                                                    Start time:05:52:26
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                                                                    Imagebase:0x480000
                                                                                                                                                                    File size:65'440 bytes
                                                                                                                                                                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:30
                                                                                                                                                                    Start time:05:52:26
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
                                                                                                                                                                    Imagebase:0x7ff788560000
                                                                                                                                                                    File size:452'608 bytes
                                                                                                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:31
                                                                                                                                                                    Start time:05:52:26
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:34
                                                                                                                                                                    Start time:05:52:26
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 928
                                                                                                                                                                    Imagebase:0xa0000
                                                                                                                                                                    File size:483'680 bytes
                                                                                                                                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:35
                                                                                                                                                                    Start time:05:52:29
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe"
                                                                                                                                                                    Imagebase:0xe50000
                                                                                                                                                                    File size:428'544 bytes
                                                                                                                                                                    MD5 hash:0099A99F5FFB3C3AE78AF0084136FAB3
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000023.00000000.2011865777.0000000000E51000.00000020.00000001.01000000.00000015.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe, Author: Joe Security
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:36
                                                                                                                                                                    Start time:05:52:29
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\1000020001\d361f35322.exe"
                                                                                                                                                                    Imagebase:0x7e0000
                                                                                                                                                                    File size:2'390'528 bytes
                                                                                                                                                                    MD5 hash:C1BF02296C415ABC8B1F0ED13088D96D
                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000024.00000003.2840876152.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000024.00000003.2839845792.0000000007CE8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000024.00000002.3088709368.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000024.00000003.2839809905.0000000007CCF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000024.00000003.2840195887.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_RiseProStealer, Description: Yara detected RisePro Stealer, Source: 00000024.00000003.2839878527.0000000007C6E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:37
                                                                                                                                                                    Start time:05:52:30
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe" /F
                                                                                                                                                                    Imagebase:0xb50000
                                                                                                                                                                    File size:187'904 bytes
                                                                                                                                                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:38
                                                                                                                                                                    Start time:05:52:30
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:39
                                                                                                                                                                    Start time:05:52:33
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:C:\Users\user\AppData\Local\Temp\1000069001\NewB.exe
                                                                                                                                                                    Imagebase:0xe50000
                                                                                                                                                                    File size:428'544 bytes
                                                                                                                                                                    MD5 hash:0099A99F5FFB3C3AE78AF0084136FAB3
                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000027.00000000.2050930258.0000000000E51000.00000020.00000001.01000000.00000015.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_Amadey_2, Description: Yara detected Amadey\'s stealer DLL, Source: 00000027.00000002.2069776940.0000000000E51000.00000020.00000001.01000000.00000015.sdmp, Author: Joe Security
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:40
                                                                                                                                                                    Start time:05:52:33
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\1000071001\jok.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\1000071001\jok.exe"
                                                                                                                                                                    Imagebase:0x7c0000
                                                                                                                                                                    File size:311'296 bytes
                                                                                                                                                                    MD5 hash:8510BCF5BC264C70180ABE78298E4D5B
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000028.00000000.2051081332.00000000007C2000.00000002.00000001.01000000.00000018.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: C:\Users\user\AppData\Local\Temp\1000071001\jok.exe, Author: Joe Security
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:41
                                                                                                                                                                    Start time:05:52:33
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\1000234001\ISetup8.exe"
                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                    File size:473'601 bytes
                                                                                                                                                                    MD5 hash:85D23A7E1BF2207A3FA825136090E00D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:43
                                                                                                                                                                    Start time:05:52:35
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3696 --field-trial-handle=2296,i,9301016893778941798,11505312185340456869,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                                                                                                                                                    Imagebase:0x7ff76e190000
                                                                                                                                                                    File size:3'242'272 bytes
                                                                                                                                                                    MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:44
                                                                                                                                                                    Start time:05:52:37
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\1000073001\swiiii.exe"
                                                                                                                                                                    Imagebase:0x930000
                                                                                                                                                                    File size:162'304 bytes
                                                                                                                                                                    MD5 hash:586F7FECACD49ADAB650FAE36E2DB994
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000002C.00000002.2151525456.0000000003CB5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 0000002C.00000002.2151525456.0000000003CB5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:45
                                                                                                                                                                    Start time:05:52:38
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:46
                                                                                                                                                                    Start time:05:52:38
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\RageMP131\RageMP131.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\RageMP131\RageMP131.exe"
                                                                                                                                                                    Imagebase:0x890000
                                                                                                                                                                    File size:2'390'528 bytes
                                                                                                                                                                    MD5 hash:C1BF02296C415ABC8B1F0ED13088D96D
                                                                                                                                                                    Has elevated privileges:false
                                                                                                                                                                    Has administrator privileges:false
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:47
                                                                                                                                                                    Start time:05:52:38
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                                                                                    Imagebase:0x8e0000
                                                                                                                                                                    File size:65'440 bytes
                                                                                                                                                                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 0000002F.00000002.2102303995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 0000002F.00000002.2102303995.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:49
                                                                                                                                                                    Start time:05:52:39
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\1000235001\toolspub1.exe"
                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                    File size:279'040 bytes
                                                                                                                                                                    MD5 hash:A9C28724B16C3BB3AF2FDB5AA9BE277C
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000031.00000002.2229022734.0000000003640000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000031.00000002.2229022734.0000000003640000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                    • Rule: JoeSecurity_SmokeLoader_2, Description: Yara detected SmokeLoader, Source: 00000031.00000002.2229087093.0000000003661000.00000004.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: Windows_Trojan_Smokeloader_4e31426e, Description: unknown, Source: 00000031.00000002.2229087093.0000000003661000.00000004.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                                                                    • Rule: Windows_Trojan_Smokeloader_3687686f, Description: unknown, Source: 00000031.00000002.2228939653.00000000034F0000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                    • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000031.00000002.2228816968.0000000001B2B000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:50
                                                                                                                                                                    Start time:05:52:42
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe"
                                                                                                                                                                    Imagebase:0x1f3f4660000
                                                                                                                                                                    File size:399'464 bytes
                                                                                                                                                                    MD5 hash:18B50C6016CD5D7FF2F01B71A5E3373B
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000032.00000002.7140120246.000001F380020000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:51
                                                                                                                                                                    Start time:05:52:43
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\u6po.0.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\u6po.0.exe"
                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                    File size:325'632 bytes
                                                                                                                                                                    MD5 hash:F2CE35E5AA2A7771759D7F424F2803AC
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000033.00000003.2152173443.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000033.00000003.2152173443.0000000003680000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:52
                                                                                                                                                                    Start time:05:52:47
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\1000075001\file300un.exe" -Force
                                                                                                                                                                    Imagebase:0x7ff788560000
                                                                                                                                                                    File size:452'608 bytes
                                                                                                                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:53
                                                                                                                                                                    Start time:05:52:47
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    Imagebase:0x7ff7699e0000
                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:54
                                                                                                                                                                    Start time:05:52:47
                                                                                                                                                                    Start date:04/05/2024
                                                                                                                                                                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                                                                                                                                    Imagebase:0x910000
                                                                                                                                                                    File size:65'440 bytes
                                                                                                                                                                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Reset < >
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000007.00000002.1895338123.0000000005010000.00000040.00001000.00020000.00000000.sdmp, Offset: 05010000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_7_2_5010000_amert.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: fe492b1d21f3e29d67347740321dcc394221f498d2307a53f503dc78b40c7b9b
                                                                                                                                                                      • Instruction ID: a92a6b9f492ce002c250ac17af73eca9a3e2f423a243a4e1d7f19a5e732d6e03
                                                                                                                                                                      • Opcode Fuzzy Hash: fe492b1d21f3e29d67347740321dcc394221f498d2307a53f503dc78b40c7b9b
                                                                                                                                                                      • Instruction Fuzzy Hash: 93F074EB18C0117D7042D1863B68AFEA76EE1D7B343718827F842D0506A2890B9D2136
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Execution Graph

                                                                                                                                                                      Execution Coverage:20.9%
                                                                                                                                                                      Dynamic/Decrypted Code Coverage:10.5%
                                                                                                                                                                      Signature Coverage:47%
                                                                                                                                                                      Total number of Nodes:2000
                                                                                                                                                                      Total number of Limit Nodes:109
                                                                                                                                                                      execution_graph 62878 83dc20 62879 83dc6d 62878->62879 62880 83dd52 62878->62880 62882 7fab20 2 API calls 62879->62882 62892 7fab20 62880->62892 62884 83dcc9 62882->62884 62950 7fb980 RtlAllocateHeap RtlFreeHeap 62884->62950 62887 83ddd8 62902 85f730 62887->62902 62889 83dd20 62951 7f88d0 62889->62951 62891 83dde5 62893 7fab55 62892->62893 62894 7faba3 62893->62894 62956 7fe8a0 62893->62956 62896 7fab83 62897 7f63b0 62896->62897 62899 7f63d8 62897->62899 62898 7f63e7 62898->62887 62899->62898 62900 7e32d0 std::_Throw_Cpp_error 2 API calls 62899->62900 62901 7f642a std::locale::_Locimp::_Locimp 62900->62901 62901->62887 62970 8c4050 62902->62970 62904 861f5c 62904->62891 62905 861fa9 std::_Throw_Cpp_error 62906 7e2cf0 std::_Throw_Cpp_error 2 API calls 62905->62906 62907 861fcd 62906->62907 62909 861fe8 std::_Throw_Cpp_error 62914 818c60 std::_Throw_Cpp_error 2 API calls 62909->62914 62910 8620a4 std::_Throw_Cpp_error 62911 7e2cf0 std::_Throw_Cpp_error 2 API calls 62910->62911 62912 8620c8 62911->62912 62921 862001 Concurrency::cancel_current_task 62914->62921 62915 861f7e 63036 7e2cf0 62915->63036 62919 7fb0e0 RtlAllocateHeap RtlFreeHeap 62946 85f78c __fread_nolock std::_Facet_Register std::locale::_Locimp::_Locimp 62919->62946 62923 7e2cf0 std::_Throw_Cpp_error 2 API calls 62921->62923 62922 7faf80 RtlAllocateHeap RtlFreeHeap 62922->62946 62924 862023 62923->62924 62928 862050 std::_Throw_Cpp_error 62930 7e2cf0 std::_Throw_Cpp_error 2 API calls 62928->62930 62932 862077 62930->62932 62936 8c3880 FindFirstFileExW RtlAllocateHeap RtlFreeHeap 62936->62946 62937 8602b3 SHGetFolderPathA 62937->62946 62938 8605b5 SHGetFolderPathA 62938->62946 62939 8608b3 SHGetFolderPathA 62939->62946 62940 860f3b SHGetFolderPathA 62940->62946 62941 7e2fe0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 62941->62946 62942 861245 SHGetFolderPathA 62942->62946 62943 7e32d0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 62943->62946 62945 7f8b00 RtlAllocateHeap RtlFreeHeap 62945->62946 62946->62904 62946->62905 62946->62909 62946->62910 62946->62915 62946->62919 62946->62921 62946->62922 62946->62928 62946->62936 62946->62937 62946->62938 62946->62939 62946->62940 62946->62941 62946->62942 62946->62943 62946->62945 62947 7f85d0 RtlAllocateHeap RtlFreeHeap 62946->62947 62948 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 62946->62948 62949 7e3040 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 62946->62949 62982 7f6130 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 62946->62982 62983 8212a7 RtlAllocateHeap RtlFreeHeap __fread_nolock 62946->62983 62984 862100 62946->62984 62947->62946 62948->62946 62949->62946 62950->62889 62952 7f88f3 62951->62952 62953 7f8914 std::ios_base::_Ios_base_dtor 62951->62953 62952->62953 62954 818c60 std::_Throw_Cpp_error 2 API calls 62952->62954 62953->62880 62955 7f8947 62954->62955 62957 7fe8ce 62956->62957 62959 7fe8f8 std::locale::_Locimp::_Locimp 62956->62959 62960 7e32d0 62957->62960 62959->62896 62961 7e3306 std::_Facet_Register 62960->62961 62962 7e32e2 Concurrency::cancel_current_task std::_Facet_Register 62960->62962 62961->62959 62964 7e32f8 62962->62964 62966 818c60 62962->62966 62964->62959 62969 818b9c RtlAllocateHeap RtlFreeHeap __fread_nolock 62966->62969 62968 818c6f __Getctype 62969->62968 63062 812b89 62970->63062 62973 8c40fd 63065 812524 62973->63065 62974 8c4087 62975 8c4104 62974->62975 62976 8c4093 62974->62976 62978 812524 std::_Throw_Cpp_error 2 API calls 62975->62978 62980 8c40ab GetFileAttributesA 62976->62980 62981 8c40b7 62976->62981 62979 8c4115 62978->62979 62980->62981 62981->62946 62982->62946 62983->62946 62985 862161 62984->62985 62986 8c4050 4 API calls 62985->62986 62993 8638fa Concurrency::cancel_current_task 62985->62993 63037 7e2d13 63036->63037 63037->63037 63071 812bb8 63062->63071 63064 812b96 63064->62973 63064->62974 63066 81253a std::_Throw_Cpp_error 63065->63066 63076 8124d7 63066->63076 63074 812bd2 63071->63074 63072 812be2 _ValidateLocalCookies 63072->63064 63074->63072 63075 81301b GetSystemTimePreciseAsFileTime __aulldiv __aullrem __Xtime_get_ticks 63074->63075 63075->63074 63077 8124e3 __EH_prolog3_GS 63076->63077 63078 7e2cf0 std::_Throw_Cpp_error 2 API calls 63077->63078 63079 8124f7 63078->63079 63235 83f560 63236 83f5b4 63235->63236 63237 84010a 63235->63237 63239 7fab20 2 API calls 63236->63239 63238 7fab20 2 API calls 63237->63238 63240 8401fe 63238->63240 63241 83f696 63239->63241 63242 8c4050 4 API calls 63240->63242 63243 8c4050 4 API calls 63241->63243 63244 840224 63242->63244 63245 83f6bc 63243->63245 63249 840247 63244->63249 63357 8c3fc0 63244->63357 63246 8c3fc0 4 API calls 63245->63246 63248 83f6df 63245->63248 63246->63248 63248->63237 63250 7fb260 2 API calls 63248->63250 63255 8400e0 63248->63255 63254 84193b 63249->63254 63256 841911 63249->63256 63368 7fb260 63249->63368 63288 83f70f 63250->63288 63252 8c3b20 7 API calls 63252->63237 63253 8c3b20 7 API calls 63253->63254 63255->63237 63255->63252 63256->63253 63256->63254 63257 7f30f0 RtlAllocateHeap RtlFreeHeap 63293 840277 std::ios_base::_Ios_base_dtor 63257->63293 63258 7f3200 RtlAllocateHeap RtlFreeHeap 63258->63288 63259 7f3200 RtlAllocateHeap RtlFreeHeap 63259->63293 63260 7fb260 2 API calls 63260->63288 63261 7fb260 2 API calls 63261->63293 63262 7fac50 RtlAllocateHeap RtlFreeHeap 63262->63288 63263 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 63263->63288 63264 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 63264->63293 63265 7f6240 RtlAllocateHeap RtlFreeHeap 63265->63288 63266 7f6240 RtlAllocateHeap RtlFreeHeap 63266->63293 63267 7fac50 RtlAllocateHeap RtlFreeHeap 63267->63293 63269 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 63269->63288 63271 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 63271->63293 63272 7e2cf0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 63272->63288 63273 8c3fc0 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap CreateDirectoryA 63273->63293 63274 8c3fc0 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap CreateDirectoryA 63274->63288 63276 819810 2 API calls 63276->63288 63278 7fae20 2 API calls 63278->63293 63280 7fabb0 2 API calls 63280->63293 63281 7f30f0 RtlAllocateHeap RtlFreeHeap 63281->63288 63282 81d098 5 API calls 63282->63293 63284 7e2cf0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 63284->63293 63285 7faf80 RtlAllocateHeap RtlFreeHeap 63285->63288 63288->63255 63288->63258 63288->63260 63288->63262 63288->63263 63288->63265 63288->63269 63288->63272 63288->63274 63288->63276 63288->63281 63288->63285 63392 7f6210 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 63288->63392 63393 7fae20 63288->63393 63396 7fabb0 63288->63396 63400 7fb400 RtlAllocateHeap RtlFreeHeap 63288->63400 63401 7fbae0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 63288->63401 63402 7e3350 63288->63402 63406 81d098 63288->63406 63291 7e3040 std::_Throw_Cpp_error 2 API calls 63291->63293 63292 7f6260 RtlAllocateHeap RtlFreeHeap 63292->63293 63293->63256 63293->63257 63293->63259 63293->63261 63293->63264 63293->63266 63293->63267 63293->63271 63293->63273 63293->63278 63293->63280 63293->63282 63293->63284 63293->63291 63293->63292 63294 7face0 2 API calls 63293->63294 63295 7fb400 RtlAllocateHeap RtlFreeHeap 63293->63295 63296 841c24 63293->63296 63303 7faf80 RtlAllocateHeap RtlFreeHeap 63293->63303 63305 7e3350 4 API calls 63293->63305 63380 819810 63293->63380 63383 8019a0 63293->63383 63412 7f6210 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 63293->63412 63294->63293 63295->63293 63297 818c60 std::_Throw_Cpp_error 2 API calls 63296->63297 63298 841c29 63297->63298 63299 7fab20 2 API calls 63298->63299 63300 841d54 63299->63300 63301 8c4050 4 API calls 63300->63301 63302 841d7a 63301->63302 63304 8c3fc0 4 API calls 63302->63304 63306 841d9d 63302->63306 63303->63293 63304->63306 63305->63293 63307 7fb260 2 API calls 63306->63307 63309 8427de 63306->63309 63310 8427b0 63306->63310 63351 841dcd 63307->63351 63308 8c3b20 7 API calls 63308->63309 63311 7fab20 2 API calls 63309->63311 63310->63308 63310->63309 63312 8428c3 63311->63312 63313 8c4050 4 API calls 63312->63313 63319 7f30f0 RtlAllocateHeap RtlFreeHeap 63319->63351 63322 7fb260 2 API calls 63322->63351 63323 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 63323->63351 63326 7f6240 RtlAllocateHeap RtlFreeHeap 63326->63351 63329 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 63329->63351 63330 819810 2 API calls 63330->63351 63331 7fac50 RtlAllocateHeap RtlFreeHeap 63331->63351 63332 8c3fc0 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap CreateDirectoryA 63332->63351 63333 7fae20 2 API calls 63333->63351 63335 7fabb0 2 API calls 63335->63351 63338 81d098 5 API calls 63338->63351 63340 7f3200 RtlAllocateHeap RtlFreeHeap 63340->63351 63344 7e2cf0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 63344->63351 63348 7faf80 RtlAllocateHeap RtlFreeHeap 63348->63351 63350 7e3350 4 API calls 63350->63351 63351->63310 63351->63319 63351->63322 63351->63323 63351->63326 63351->63329 63351->63330 63351->63331 63351->63332 63351->63333 63351->63335 63351->63338 63351->63340 63351->63344 63351->63348 63351->63350 63352 7fb400 RtlAllocateHeap RtlFreeHeap 63351->63352 63413 7f6210 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 63351->63413 63352->63351 63358 812b89 GetSystemTimePreciseAsFileTime 63357->63358 63359 8c3fed 63358->63359 63360 8c3ff4 63359->63360 63361 8c4032 63359->63361 63362 8c4039 63360->63362 63363 8c4000 CreateDirectoryA 63360->63363 63364 812524 std::_Throw_Cpp_error 2 API calls 63361->63364 63366 812524 std::_Throw_Cpp_error 2 API calls 63362->63366 63365 8c401e 63363->63365 63364->63362 63365->63249 63367 8c404a 63366->63367 63369 7fb2b8 std::_Facet_Register 63368->63369 63370 7fb3b4 63369->63370 63372 7fb2e2 std::_Facet_Register 63369->63372 63371 7e2cf0 std::_Throw_Cpp_error 2 API calls 63370->63371 63373 7fb3c4 63371->63373 63415 80e7d0 63372->63415 63374 7face0 2 API calls 63373->63374 63376 7fb3d9 63374->63376 63377 7e7cf0 2 API calls 63376->63377 63378 7fb3ee std::_Throw_Cpp_error 63377->63378 63379 7fb33b std::ios_base::_Ios_base_dtor 63379->63293 63453 81974e 63380->63453 63382 819822 63382->63293 63384 8019d0 63383->63384 63385 8019f5 63383->63385 63384->63293 63386 7e2cf0 std::_Throw_Cpp_error 2 API calls 63385->63386 63387 801a03 63386->63387 63388 7face0 2 API calls 63387->63388 63389 801a18 63388->63389 63390 7e7cf0 2 API calls 63389->63390 63391 801a2d std::_Throw_Cpp_error 63390->63391 63392->63288 63494 7fe710 63393->63494 63395 7fae54 63395->63288 63397 7fabe1 63396->63397 63397->63397 63398 7f8f00 std::_Throw_Cpp_error 2 API calls 63397->63398 63399 7fabf6 63398->63399 63399->63288 63400->63288 63401->63288 63403 7e3367 63402->63403 63499 820d23 63403->63499 63407 81d0ab __fread_nolock 63406->63407 63629 81cf73 63407->63629 63409 81d0b7 63410 81898c __fread_nolock 2 API calls 63409->63410 63411 81d0c3 63410->63411 63411->63288 63412->63293 63413->63351 63418 80e81a std::_Facet_Register 63415->63418 63419 80e9ef 63415->63419 63417 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 63417->63418 63418->63417 63418->63419 63420 7f3d50 63418->63420 63419->63379 63421 7f3d8f 63420->63421 63433 7f3df7 std::_Facet_Register std::locale::_Locimp::_Locimp 63420->63433 63422 7f3f1e 63421->63422 63424 7f3e69 std::_Facet_Register 63421->63424 63425 7f3d96 std::_Facet_Register 63421->63425 63426 7f3f7d Concurrency::cancel_current_task std::_Facet_Register 63421->63426 63421->63433 63449 7f7e80 63422->63449 63424->63433 63444 80bf20 63424->63444 63434 80f450 63425->63434 63431 818c60 std::_Throw_Cpp_error 2 API calls 63426->63431 63426->63433 63429 7f3eb1 63430 7f3d50 2 API calls 63429->63430 63429->63433 63430->63429 63432 7f409d 63431->63432 63433->63418 63435 80f488 std::_Facet_Register 63434->63435 63436 80f52f 63434->63436 63437 7f63b0 std::_Throw_Cpp_error 2 API calls 63435->63437 63436->63433 63438 80f4c0 63437->63438 63439 7f3d50 2 API calls 63438->63439 63440 80f4d0 63439->63440 63441 80f450 2 API calls 63440->63441 63442 80f521 63441->63442 63443 80f450 2 API calls 63442->63443 63443->63436 63445 80bf32 Concurrency::cancel_current_task std::_Facet_Register 63444->63445 63446 818c60 std::_Throw_Cpp_error 2 API calls 63445->63446 63447 80bf53 std::_Facet_Register 63445->63447 63448 80bfaa 63446->63448 63447->63429 63450 7f7ea6 std::_Facet_Register 63449->63450 63451 7f63b0 std::_Throw_Cpp_error 2 API calls 63450->63451 63452 7f7ec5 63451->63452 63452->63433 63456 81975a __fread_nolock 63453->63456 63454 819761 63471 8216ef RtlAllocateHeap RtlFreeHeap __dosmaperr 63454->63471 63456->63454 63458 819781 63456->63458 63457 819766 63472 818c50 RtlAllocateHeap RtlFreeHeap __fread_nolock 63457->63472 63460 819793 63458->63460 63461 819786 63458->63461 63467 82a8e1 63460->63467 63473 8216ef RtlAllocateHeap RtlFreeHeap __dosmaperr 63461->63473 63464 81979c 63466 819771 63464->63466 63466->63382 63468 82a8ed __fread_nolock std::_Lockit::_Lockit 63467->63468 63475 82a985 63468->63475 63470 82a908 63470->63464 63471->63457 63472->63466 63473->63466 63479 82a9a8 __fread_nolock 63475->63479 63480 82a9ee __fread_nolock std::locale::_Setgloballocale 63479->63480 63481 82a64c 63479->63481 63480->63470 63486 82a659 __dosmaperr std::_Facet_Register 63481->63486 63482 82a699 63483 82a684 RtlAllocateHeap 63483->63486 63486->63482 63486->63483 63495 7fe753 63494->63495 63496 7e32d0 std::_Throw_Cpp_error 2 API calls 63495->63496 63497 7fe758 std::locale::_Locimp::_Locimp 63495->63497 63498 7fe843 std::locale::_Locimp::_Locimp 63496->63498 63497->63395 63498->63395 63500 820d37 __fread_nolock 63499->63500 63501 820d59 63500->63501 63503 820d80 63500->63503 63518 818bd3 RtlAllocateHeap RtlFreeHeap __fread_nolock __Getctype 63501->63518 63508 81e386 63503->63508 63504 820d74 63512 81898c 63504->63512 63509 81e392 __fread_nolock 63508->63509 63519 81f2bb 63509->63519 63513 818998 63512->63513 63514 8189af 63513->63514 63627 818a37 RtlAllocateHeap RtlFreeHeap __fread_nolock __Getctype 63513->63627 63516 7e3371 63514->63516 63628 818a37 RtlAllocateHeap RtlFreeHeap __fread_nolock __Getctype 63514->63628 63516->63288 63518->63504 63528 82c89c 63519->63528 63521 81f2e2 63533 81f503 63521->63533 63550 82c85e 63528->63550 63530 82c90f 63530->63521 63531 82c8ad std::_Locinfo::_Locinfo_dtor 63531->63530 63532 82b00c __dosmaperr 2 API calls 63531->63532 63532->63530 63578 820ac5 63533->63578 63551 82c86a 63550->63551 63552 82c894 63551->63552 63557 82a1db 63551->63557 63552->63531 63554 82c885 63564 833bd1 63554->63564 63558 82a1e7 63557->63558 63559 82a1fc 63557->63559 63573 8216ef RtlAllocateHeap RtlFreeHeap __dosmaperr 63558->63573 63559->63554 63561 82a1ec 63574 818c50 RtlAllocateHeap RtlFreeHeap __fread_nolock 63561->63574 63563 82a1f7 63563->63554 63565 833bde 63564->63565 63566 833beb 63564->63566 63575 8216ef RtlAllocateHeap RtlFreeHeap __dosmaperr 63565->63575 63568 833bf7 63566->63568 63576 8216ef RtlAllocateHeap RtlFreeHeap __dosmaperr 63566->63576 63573->63561 63574->63563 63627->63514 63628->63516 63630 81cf7f __fread_nolock 63629->63630 63631 81cf89 63630->63631 63634 81cfac __fread_nolock 63630->63634 63650 818bd3 RtlAllocateHeap RtlFreeHeap __fread_nolock __Getctype 63631->63650 63633 81cfa4 63633->63409 63634->63633 63636 81d00a 63634->63636 63637 81d017 63636->63637 63638 81d03a 63636->63638 63668 818bd3 RtlAllocateHeap RtlFreeHeap __fread_nolock __Getctype 63637->63668 63640 81d032 63638->63640 63651 819a81 63638->63651 63640->63633 63645 82a1db __fread_nolock 2 API calls 63646 81d066 63645->63646 63661 828d1c 63646->63661 63649 82b00c __dosmaperr 2 API calls 63649->63640 63650->63633 63652 819a9a 63651->63652 63653 819ac1 63651->63653 63652->63653 63654 82a1db __fread_nolock 2 API calls 63652->63654 63657 82b046 63653->63657 63655 819ab6 63654->63655 63669 829668 63655->63669 63658 81d05a 63657->63658 63659 82b05d 63657->63659 63658->63645 63659->63658 63660 82b00c __dosmaperr 2 API calls 63659->63660 63660->63658 63663 828d45 63661->63663 63665 81d06d 63661->63665 63662 828d94 63729 818bd3 RtlAllocateHeap RtlFreeHeap __fread_nolock __Getctype 63662->63729 63663->63662 63666 828d6c 63663->63666 63665->63640 63665->63649 63725 828c8b 63666->63725 63668->63640 63670 829674 __fread_nolock 63669->63670 63671 8296b5 63670->63671 63673 8296fb 63670->63673 63674 82967c 63670->63674 63690 818bd3 RtlAllocateHeap RtlFreeHeap __fread_nolock __Getctype 63671->63690 63673->63674 63676 829779 63673->63676 63674->63653 63677 8297a1 63676->63677 63689 8297c4 __fread_nolock 63676->63689 63678 8297a5 63677->63678 63680 829800 63677->63680 63689->63674 63690->63674 63729->63665 63743 83f280 63744 83f2ec 63743->63744 63745 83f2cd 63743->63745 63746 7f63b0 std::_Throw_Cpp_error 2 API calls 63745->63746 63747 83f2df 63746->63747 63749 871a60 63747->63749 63750 871ab5 __fread_nolock 63749->63750 63750->63750 63751 7e3040 std::_Throw_Cpp_error 2 API calls 63750->63751 63752 871c3c 63751->63752 63753 7ffbf0 2 API calls 63752->63753 63756 871c6d std::ios_base::_Ios_base_dtor 63753->63756 63754 8c4050 4 API calls 63759 871d2d 63754->63759 63755 873299 63757 818c60 std::_Throw_Cpp_error 2 API calls 63755->63757 63756->63754 63756->63755 63758 87329e 63757->63758 63844 7f7ef0 63758->63844 63759->63758 63760 87324a 63759->63760 63761 7fe8a0 2 API calls 63759->63761 63760->63744 63763 871e13 63761->63763 63765 8c4050 4 API calls 63763->63765 63764 8732fd 63853 7f40c0 63764->63853 63767 871e34 63765->63767 63767->63760 63773 7fab20 2 API calls 63767->63773 63769 8733dc 63771 8733f7 63769->63771 63772 873e1d 63769->63772 63770 7f7ef0 2 API calls 63770->63769 63775 7e3040 std::_Throw_Cpp_error 2 API calls 63771->63775 63777 7e2cf0 std::_Throw_Cpp_error 2 API calls 63772->63777 63774 871f64 63773->63774 63776 819810 2 API calls 63774->63776 63778 87343d 63775->63778 63784 871f80 63776->63784 63779 873e30 63777->63779 63859 806db0 63778->63859 63781 7face0 2 API calls 63779->63781 63783 871f9e 63786 7fab20 2 API calls 63783->63786 63784->63783 63787 81d098 5 API calls 63784->63787 63829 87205c std::ios_base::_Ios_base_dtor 63786->63829 63787->63783 63795 87249b 63797 7fab20 2 API calls 63795->63797 63820 87320e 63795->63820 63801 7fab20 2 API calls 63801->63829 63809 7f8f00 std::_Throw_Cpp_error 2 API calls 63809->63829 63812 7fabb0 2 API calls 63812->63829 63815 819810 2 API calls 63815->63829 63827 81d098 5 API calls 63827->63829 63829->63755 63829->63795 63829->63801 63829->63809 63829->63812 63829->63815 63829->63827 63833 7e3040 std::_Throw_Cpp_error 2 API calls 63829->63833 63863 8042a0 RtlAllocateHeap RtlFreeHeap 63829->63863 63833->63829 63845 7f8034 63844->63845 63846 7f7f1d 63844->63846 63848 7e2cf0 std::_Throw_Cpp_error 2 API calls 63845->63848 63849 7f7f24 std::_Facet_Register 63845->63849 63846->63849 63875 7fcf80 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error std::_Facet_Register 63846->63875 63850 7f804f 63848->63850 63849->63764 63876 7e7f90 RtlAllocateHeap RtlFreeHeap std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 63850->63876 63852 7f8062 std::_Throw_Cpp_error 63854 7f40ff std::_Facet_Register 63853->63854 63855 7f41ac 63854->63855 63856 80bf20 2 API calls 63854->63856 63855->63769 63855->63770 63857 7f4171 63856->63857 63857->63855 63877 7f9860 RtlAllocateHeap RtlFreeHeap 63857->63877 63863->63829 63875->63849 63876->63852 63877->63857 63879 84a8a0 64107 84a8da 63879->64107 63880 856644 63881 84a901 63882 7f63b0 std::_Throw_Cpp_error 2 API calls 63881->63882 63883 7f63b0 std::_Throw_Cpp_error 2 API calls 63881->63883 63882->63881 63884 84a95c 63883->63884 63885 84a9e4 63884->63885 63887 84a9fe 63885->63887 63886 7e3040 std::_Throw_Cpp_error 2 API calls 63886->63887 63887->63886 63888 7e3040 std::_Throw_Cpp_error 2 API calls 63887->63888 63889 84ab79 63888->63889 63891 84aba2 63889->63891 65016 854d4b 63889->65016 65017 887d20 63889->65017 63893 84abb4 63891->63893 63892 854d59 63894 854d7b 63892->63894 63895 84abd6 63893->63895 63897 7f63b0 std::_Throw_Cpp_error 2 API calls 63894->63897 63896 7f63b0 std::_Throw_Cpp_error 2 API calls 63895->63896 63898 84abde 63896->63898 63899 854d8a 63897->63899 63900 84abf8 63898->63900 63907 854da7 63899->63907 63901 84abff 63900->63901 63902 7f63b0 std::_Throw_Cpp_error 2 API calls 63901->63902 63904 84ac07 63902->63904 63903 7f63b0 std::_Throw_Cpp_error 2 API calls 63903->63907 63906 7e2cf0 std::_Throw_Cpp_error 2 API calls 63904->63906 63905 7e2cf0 std::_Throw_Cpp_error 2 API calls 63905->63907 63908 84ac81 63906->63908 63907->63903 63907->63905 63915 854faa 63907->63915 63909 7e2cf0 std::_Throw_Cpp_error 2 API calls 63908->63909 63911 84adab 63909->63911 63910 7e2cf0 std::_Throw_Cpp_error 2 API calls 63910->63915 63912 887d20 19 API calls 63911->63912 63914 84adc4 63912->63914 63913 887d20 19 API calls 63913->63915 63918 84add9 63914->63918 63915->63910 63915->63913 63916 854fdc 63915->63916 63917 854ffe 63916->63917 63920 7f63b0 std::_Throw_Cpp_error 2 API calls 63917->63920 63919 84adfb 63918->63919 63922 85500d 63920->63922 63932 85502a 63922->63932 63927 7f63b0 std::_Throw_Cpp_error 2 API calls 63927->63932 63930 7e2cf0 std::_Throw_Cpp_error 2 API calls 63930->63932 63932->63927 63932->63930 63938 85522d 63932->63938 63933 7e2cf0 std::_Throw_Cpp_error 2 API calls 63933->63938 63936 887d20 19 API calls 63936->63938 63938->63933 63938->63936 63940 85525f 63938->63940 63942 855281 63940->63942 63945 7f63b0 std::_Throw_Cpp_error 2 API calls 63942->63945 63947 855290 63945->63947 64102 7e2cf0 std::_Throw_Cpp_error 2 API calls 64102->64107 64105 887d20 19 API calls 64105->64107 64107->63880 64107->63881 64107->64102 64107->64105 65016->63892 65018 887d7b __fread_nolock 65017->65018 65798 7fac50 65018->65798 65020 887daf 65021 888f5a 65020->65021 65022 887dcd 65020->65022 65024 7f52b0 2 API calls 65021->65024 65023 7f63b0 std::_Throw_Cpp_error 2 API calls 65022->65023 65025 887dde 65023->65025 65028 888f58 65024->65028 65026 8a33b0 4 API calls 65025->65026 65027 887df4 65026->65027 65029 887e14 65027->65029 65215 887e81 std::locale::_Locimp::_Locimp 65027->65215 65169 889000 std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 65028->65169 65945 8042a0 RtlAllocateHeap RtlFreeHeap 65028->65945 65032 7f85d0 2 API calls 65029->65032 65030 888f46 65034 7f85d0 2 API calls 65030->65034 65031 887e23 65035 7f85d0 2 API calls 65031->65035 65032->65031 65034->65028 65044 887e2f 65035->65044 65036 88aebb 65038 7f7ef0 2 API calls 65036->65038 65037 7fe8a0 RtlAllocateHeap RtlFreeHeap 65037->65215 65039 88af2a 65038->65039 65040 7f40c0 2 API calls 65039->65040 65041 88af54 65040->65041 65042 7fad80 RtlAllocateHeap RtlFreeHeap 65042->65169 65044->63889 65046 88aeb6 65049 818c60 std::_Throw_Cpp_error 2 API calls 65046->65049 65048 7fabb0 RtlAllocateHeap RtlFreeHeap 65048->65215 65049->65036 65058 7fe710 RtlAllocateHeap RtlFreeHeap 65058->65169 65092 7fe8a0 RtlAllocateHeap RtlFreeHeap 65092->65169 65100 7f8f00 std::_Throw_Cpp_error 2 API calls 65100->65169 65103 7fabb0 2 API calls 65103->65169 65130 7fab20 RtlAllocateHeap RtlFreeHeap 65130->65169 65133 8c4120 SetFilePointerEx FindCloseChangeNotification WriteFile RtlAllocateHeap RtlFreeHeap 65133->65169 65135 7f8f00 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 65135->65215 65152 7e32d0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 65152->65169 65159 8035f0 RtlAllocateHeap RtlFreeHeap 65159->65169 65161 7e3040 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 65161->65169 65169->65031 65169->65036 65169->65042 65169->65046 65169->65058 65169->65092 65169->65100 65169->65103 65169->65130 65169->65133 65169->65152 65169->65159 65169->65161 65172 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 65169->65172 65188 7e2fe0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 65169->65188 65172->65169 65188->65169 65192 8c4120 SetFilePointerEx FindCloseChangeNotification WriteFile RtlAllocateHeap RtlFreeHeap 65192->65215 65195 7e32d0 std::_Throw_Cpp_error 2 API calls 65195->65215 65214 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 65214->65215 65215->65030 65215->65036 65215->65037 65215->65048 65215->65135 65215->65192 65215->65195 65215->65214 65943 7e2fe0 RtlAllocateHeap RtlFreeHeap std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 65215->65943 65944 804400 3 API calls 4 library calls 65215->65944 65799 7fac81 65798->65799 65799->65799 65800 7fac9b 65799->65800 65803 7facd3 65799->65803 65801 7fe8a0 2 API calls 65800->65801 65802 7facb2 65801->65802 65802->65020 65804 7ffbf0 2 API calls 65803->65804 65805 7fad24 65804->65805 65805->65020 65943->65215 65944->65215 65945->65169 66687 846b40 66688 846b8a 66687->66688 66689 7fab20 2 API calls 66688->66689 66691 848520 66688->66691 66696 84956b 66688->66696 66693 846c21 66689->66693 66690 849954 66784 86ff60 66690->66784 66694 7fab20 2 API calls 66691->66694 66695 8c4050 4 API calls 66693->66695 66697 84860b 66694->66697 66699 846c47 66695->66699 66696->66690 66701 7fab20 2 API calls 66696->66701 66703 819810 2 API calls 66697->66703 66698 849c70 66828 7f2c30 RtlAllocateHeap RtlFreeHeap std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 66698->66828 66705 8c3fc0 4 API calls 66699->66705 66707 846c6a 66699->66707 66706 849658 66701->66706 66702 849c82 66711 848633 66703->66711 66704 849962 66704->66698 66709 7fab20 2 API calls 66704->66709 66705->66707 66708 819810 2 API calls 66706->66708 66707->66691 66710 7fb260 2 API calls 66707->66710 66714 84791c 66707->66714 66717 849680 66708->66717 66712 849a51 66709->66712 66776 846c99 66710->66776 66711->66696 66718 7e3350 4 API calls 66711->66718 66716 819810 2 API calls 66712->66716 66713 8484f6 66713->66691 66719 8c3b20 7 API calls 66713->66719 66714->66713 66715 7fb260 2 API calls 66714->66715 66781 84794e 66715->66781 66721 849a79 66716->66721 66717->66690 66720 7e3350 4 API calls 66717->66720 66723 8486dd 66718->66723 66719->66691 66738 849731 66720->66738 66721->66698 66725 7e3350 4 API calls 66721->66725 66724 7fb260 2 API calls 66723->66724 66729 848e14 66723->66729 66755 848703 66724->66755 66739 849b2a 66725->66739 66726 84994e 66731 81d098 5 API calls 66726->66731 66727 7f30f0 2 API calls 66727->66781 66730 849554 66729->66730 66733 7fb260 2 API calls 66729->66733 66732 81d098 5 API calls 66730->66732 66731->66690 66732->66696 66760 848e46 66733->66760 66734 849c6a 66736 81d098 5 API calls 66734->66736 66735 7f3200 2 API calls 66735->66781 66736->66698 66737 7e2cf0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66737->66781 66738->66726 66740 7e3350 4 API calls 66738->66740 66739->66734 66742 7e3350 4 API calls 66739->66742 66740->66738 66741 7f30f0 2 API calls 66741->66755 66742->66739 66743 7f30f0 2 API calls 66743->66760 66744 7f3200 2 API calls 66744->66755 66745 7f3200 2 API calls 66745->66760 66746 7e2cf0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66746->66755 66747 7faf80 RtlAllocateHeap RtlFreeHeap 66747->66776 66748 7e2cf0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66748->66760 66749 7faf80 RtlAllocateHeap RtlFreeHeap 66749->66755 66750 7faf80 RtlAllocateHeap RtlFreeHeap 66750->66781 66751 7fb400 RtlAllocateHeap RtlFreeHeap 66751->66781 66752 7fb400 RtlAllocateHeap RtlFreeHeap 66752->66776 66753 7fac50 RtlAllocateHeap RtlFreeHeap 66753->66776 66754 7fac50 RtlAllocateHeap RtlFreeHeap 66754->66781 66755->66729 66755->66741 66755->66744 66755->66746 66755->66749 66756 7fb400 RtlAllocateHeap RtlFreeHeap 66755->66756 66758 7e3350 4 API calls 66755->66758 66756->66755 66757 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 66757->66781 66758->66755 66759 7faf80 RtlAllocateHeap RtlFreeHeap 66759->66760 66760->66730 66760->66743 66760->66745 66760->66748 66760->66759 66761 7e3350 4 API calls 66760->66761 66764 7fb400 RtlAllocateHeap RtlFreeHeap 66760->66764 66761->66760 66762 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66762->66781 66763 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66763->66776 66764->66760 66766 7e2cf0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66766->66776 66768 7f6240 RtlAllocateHeap RtlFreeHeap 66768->66781 66769 8c4120 5 API calls 66769->66776 66771 8c4120 5 API calls 66771->66781 66772 819810 RtlAllocateHeap RtlFreeHeap 66772->66776 66773 8c3fc0 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap CreateDirectoryA 66773->66781 66774 819810 RtlAllocateHeap RtlFreeHeap 66774->66781 66775 7f6240 RtlAllocateHeap RtlFreeHeap 66775->66776 66776->66714 66776->66747 66776->66752 66776->66753 66776->66763 66776->66766 66776->66769 66776->66772 66776->66775 66777 7e3350 SetFilePointerEx WriteFile RtlAllocateHeap RtlFreeHeap 66776->66777 66778 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 66776->66778 66779 81d098 5 API calls 66776->66779 66782 8c3fc0 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap CreateDirectoryA 66776->66782 66807 7f30f0 66776->66807 66814 7f3200 66776->66814 66825 8c3820 RtlAllocateHeap RtlFreeHeap 66776->66825 66826 7f6210 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66776->66826 66777->66776 66778->66776 66779->66776 66780 7e3350 SetFilePointerEx WriteFile RtlAllocateHeap RtlFreeHeap 66780->66781 66781->66713 66781->66727 66781->66735 66781->66737 66781->66750 66781->66751 66781->66754 66781->66757 66781->66762 66781->66768 66781->66771 66781->66773 66781->66774 66781->66780 66783 81d098 5 API calls 66781->66783 66827 7f6210 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66781->66827 66782->66776 66783->66781 66829 871680 66784->66829 66786 86ffc7 66787 7e3040 std::_Throw_Cpp_error 2 API calls 66786->66787 66793 86ffcd 66786->66793 66788 87000e 66787->66788 66789 7f8f00 std::_Throw_Cpp_error 2 API calls 66788->66789 66790 8700c0 66789->66790 66843 8713f0 RtlAllocateHeap RtlFreeHeap std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 66790->66843 66792 7f85d0 2 API calls 66792->66793 66793->66704 66794 870594 66796 818c60 std::_Throw_Cpp_error 2 API calls 66794->66796 66795 7fe8a0 2 API calls 66805 8700e7 std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 66795->66805 66798 87059e 66796->66798 66797 7fad80 2 API calls 66797->66805 66799 7fab20 2 API calls 66799->66805 66802 7e32d0 std::_Throw_Cpp_error 2 API calls 66802->66805 66803 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66803->66805 66805->66794 66805->66795 66805->66797 66805->66799 66805->66802 66805->66803 66806 870553 66805->66806 66844 870ba0 2 API calls 4 library calls 66805->66844 66845 8705a0 2 API calls 5 library calls 66805->66845 66846 802ac0 2 API calls 4 library calls 66805->66846 66806->66792 66808 7f316c 66807->66808 66809 7f3114 66807->66809 66810 7e2cf0 std::_Throw_Cpp_error 2 API calls 66808->66810 66809->66776 66811 7f3179 66810->66811 66847 7e7b10 RtlAllocateHeap RtlFreeHeap std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error ___std_exception_destroy 66811->66847 66813 7f3191 std::_Throw_Cpp_error 66815 7f325c 66814->66815 66818 7f3225 std::_Throw_Cpp_error 66814->66818 66816 7e2cf0 std::_Throw_Cpp_error 2 API calls 66815->66816 66817 7f3269 66816->66817 66848 7e7b10 RtlAllocateHeap RtlFreeHeap std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error ___std_exception_destroy 66817->66848 66819 7f3235 66818->66819 66821 7e2cf0 std::_Throw_Cpp_error 2 API calls 66818->66821 66819->66776 66822 7f329f 66821->66822 66849 7e7b10 RtlAllocateHeap RtlFreeHeap std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error ___std_exception_destroy 66822->66849 66824 7f32b7 std::_Throw_Cpp_error 66825->66776 66826->66776 66827->66781 66828->66702 66830 8716c5 __fread_nolock 66829->66830 66831 8716f7 RegOpenKeyExA 66830->66831 66832 871a3b 66831->66832 66833 8718b7 66831->66833 66832->66786 66833->66832 66833->66833 66834 7e3040 std::_Throw_Cpp_error 2 API calls 66833->66834 66835 87190a 66834->66835 66836 7e3040 std::_Throw_Cpp_error 2 API calls 66835->66836 66839 871955 std::locale::_Locimp::_Locimp 66835->66839 66836->66839 66837 818c60 std::_Throw_Cpp_error 2 API calls 66838 8719b7 std::ios_base::_Ios_base_dtor 66837->66838 66840 818c60 std::_Throw_Cpp_error 2 API calls 66838->66840 66842 871a09 std::ios_base::_Ios_base_dtor 66838->66842 66839->66837 66839->66838 66841 871a5f 66840->66841 66842->66786 66843->66805 66844->66805 66845->66805 66846->66805 66847->66813 66848->66818 66849->66824 66850 849f60 66855 849f9b 66850->66855 66851 84a880 66852 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66852->66855 66855->66851 66855->66852 66857 7faf80 RtlAllocateHeap RtlFreeHeap 66855->66857 66858 7f3d50 RtlAllocateHeap RtlFreeHeap 66855->66858 66859 7f38b0 RtlAllocateHeap RtlFreeHeap 66855->66859 66862 87cbf0 66855->66862 66980 87aec0 66855->66980 67094 878a80 66855->67094 67207 8761d0 66855->67207 67318 873ed0 66855->67318 66857->66855 66858->66855 66859->66855 66863 87cc26 66862->66863 66864 7f7ef0 2 API calls 66863->66864 66865 87cc4f 66864->66865 66866 7f40c0 2 API calls 66865->66866 66867 87cc79 66866->66867 66868 7faf80 2 API calls 66867->66868 66869 87cd14 __fread_nolock 66868->66869 66870 7fac50 2 API calls 66869->66870 66871 87cd5f 66870->66871 66872 7fab20 2 API calls 66871->66872 66873 87ce04 __fread_nolock 66872->66873 67431 52e01b9 66873->67431 67437 52e01de 66873->67437 67443 52e01d5 66873->67443 67447 52e021a 66873->67447 67453 52e0151 66873->67453 67459 52e02af 66873->67459 67463 52e00bb 66873->67463 67469 52e0050 66873->67469 67475 52e00ee 66873->67475 67481 52e0076 66873->67481 67487 52e017f 66873->67487 67493 52e0069 66873->67493 67499 52e0279 66873->67499 67503 52e030c 66873->67503 67507 52e0131 66873->67507 67513 52e0089 66873->67513 67519 52e032c 66873->67519 67522 52e00e1 66873->67522 67528 52e010b 66873->67528 67534 52e0245 66873->67534 67538 52e02c4 GetPrivateProfileStringA 66873->67538 67540 52e0000 66873->67540 67546 52e0022 66873->67546 67552 52e0285 66873->67552 67556 52e015e 66873->67556 67562 52e01fb 66873->67562 67566 52e0280 66873->67566 67570 52e011c 66873->67570 66875 7fe8a0 RtlAllocateHeap RtlFreeHeap 66907 87ce47 std::ios_base::_Ios_base_dtor __fread_nolock std::_Facet_Register std::locale::_Locimp::_Locimp 66875->66907 66876 88101b 66878 7e2cf0 std::_Throw_Cpp_error 2 API calls 66876->66878 66877 880fc3 66877->66855 66879 881034 66878->66879 66880 7face0 2 API calls 66879->66880 66881 881049 66880->66881 66882 7e7cf0 2 API calls 66881->66882 66883 881061 std::_Throw_Cpp_error 66882->66883 66884 818c60 std::_Throw_Cpp_error 2 API calls 66883->66884 66885 88107a 66884->66885 66888 7e2cf0 std::_Throw_Cpp_error 2 API calls 66885->66888 66886 8c49f0 6 API calls 66886->66907 66887 8b3b40 7 API calls 66887->66907 66889 88108d 66888->66889 66892 7face0 2 API calls 66889->66892 66890 7e32d0 std::_Throw_Cpp_error 2 API calls 66890->66907 66891 7fb430 2 API calls 66891->66907 66893 8810a2 66892->66893 66894 7e7cf0 2 API calls 66893->66894 66896 8810ba std::_Throw_Cpp_error 66894->66896 66895 8b39a0 4 API calls 66895->66907 66897 7e2cf0 std::_Throw_Cpp_error 2 API calls 66896->66897 66898 8810e2 66897->66898 66899 7face0 2 API calls 66898->66899 66900 8810f7 66899->66900 66901 7e7cf0 2 API calls 66900->66901 66902 88110f std::_Throw_Cpp_error 66901->66902 66903 7f3200 2 API calls 66903->66907 66904 7f7ef0 RtlAllocateHeap RtlFreeHeap 66904->66907 66906 7e3040 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66906->66907 66907->66875 66907->66876 66907->66877 66907->66883 66907->66885 66907->66886 66907->66887 66907->66890 66907->66891 66907->66895 66907->66896 66907->66903 66907->66904 66907->66906 66908 7fad80 2 API calls 66907->66908 66909 7fabb0 RtlAllocateHeap RtlFreeHeap 66907->66909 66910 806db0 RtlAllocateHeap RtlFreeHeap 66907->66910 66911 7fb0e0 RtlAllocateHeap RtlFreeHeap 66907->66911 66912 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 66907->66912 66913 7fab20 RtlAllocateHeap RtlFreeHeap 66907->66913 66915 7e2cf0 std::_Throw_Cpp_error 2 API calls 66907->66915 66916 7face0 RtlAllocateHeap RtlFreeHeap 66907->66916 66917 8c4120 SetFilePointerEx FindCloseChangeNotification WriteFile RtlAllocateHeap RtlFreeHeap 66907->66917 66918 7e2fe0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66907->66918 66919 819810 RtlAllocateHeap RtlFreeHeap 66907->66919 66920 7faf80 RtlAllocateHeap RtlFreeHeap 66907->66920 66922 881130 8 API calls 66907->66922 66923 821618 SetFilePointerEx WriteFile RtlAllocateHeap RtlFreeHeap 66907->66923 66924 7f3980 RtlAllocateHeap RtlFreeHeap 66907->66924 66925 7f30f0 RtlAllocateHeap RtlFreeHeap 66907->66925 66926 81d098 SetFilePointerEx FindCloseChangeNotification WriteFile RtlAllocateHeap RtlFreeHeap 66907->66926 66927 7f3d50 RtlAllocateHeap RtlFreeHeap 66907->66927 67576 820f9e 66907->67576 67590 52903e8 66907->67590 67596 529062e 66907->67596 67600 5290584 66907->67600 67604 52903b5 66907->67604 67610 52905e4 66907->67610 67614 52903c5 66907->67614 67620 5290386 66907->67620 67626 529040b 66907->67626 67633 52904ce 66907->67633 67639 5290521 66907->67639 67643 5290642 66907->67643 67647 5290608 66907->67647 67651 529042c 66907->67651 67657 5290518 66907->67657 67661 529052a 66907->67661 67665 5290564 66907->67665 67669 5290672 66907->67669 67673 52904c6 66907->67673 67679 5290489 66907->67679 67685 52905d9 66907->67685 67689 529069d 66907->67689 67693 529061b 66907->67693 67697 52904b4 66907->67697 67703 80c070 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error std::_Facet_Register 66907->67703 67704 804900 RtlAllocateHeap RtlFreeHeap 66907->67704 67705 7fb9d0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error std::_Facet_Register 66907->67705 67706 7f36c0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 66907->67706 66908->66907 66909->66907 66910->66907 66911->66907 66912->66907 66913->66907 66915->66907 66916->66907 66917->66907 66918->66907 66919->66907 66920->66907 66922->66907 66923->66907 66924->66907 66925->66907 66926->66907 66927->66907 66981 87aef6 66980->66981 66982 7f7ef0 2 API calls 66981->66982 66983 87af1f 66982->66983 66984 7f40c0 2 API calls 66983->66984 66985 87af49 66984->66985 66986 7faf80 2 API calls 66985->66986 66987 87afe4 __fread_nolock 66986->66987 66988 7fac50 2 API calls 66987->66988 66989 87b02f 66988->66989 66990 7fab20 2 API calls 66989->66990 66991 87b0d4 __fread_nolock 66990->66991 67066 52e00ee 2 API calls 66991->67066 67067 52e02af GetPrivateProfileStringA 66991->67067 67068 52e032c GetPrivateProfileStringA 66991->67068 67069 52e0069 2 API calls 66991->67069 67070 52e0022 2 API calls 66991->67070 67071 52e00e1 2 API calls 66991->67071 67072 52e017f 2 API calls 66991->67072 67073 52e01fb GetPrivateProfileStringA 66991->67073 67074 52e00bb 2 API calls 66991->67074 67075 52e01b9 2 API calls 66991->67075 67076 52e0279 GetPrivateProfileStringA 66991->67076 67077 52e0076 2 API calls 66991->67077 67078 52e0131 2 API calls 66991->67078 67079 52e030c GetPrivateProfileStringA 66991->67079 67080 52e010b 2 API calls 66991->67080 67081 52e0089 2 API calls 66991->67081 67082 52e02c4 GetPrivateProfileStringA 66991->67082 67083 52e0245 GetPrivateProfileStringA 66991->67083 67084 52e0285 GetPrivateProfileStringA 66991->67084 67085 52e0000 2 API calls 66991->67085 67086 52e0280 GetPrivateProfileStringA 66991->67086 67087 52e015e 2 API calls 66991->67087 67088 52e01de 2 API calls 66991->67088 67089 52e011c 2 API calls 66991->67089 67090 52e021a 2 API calls 66991->67090 67091 52e01d5 GetPrivateProfileStringA 66991->67091 67092 52e0050 2 API calls 66991->67092 67093 52e0151 2 API calls 66991->67093 66992 820f9e 2 API calls 67037 87b117 std::ios_base::_Ios_base_dtor __fread_nolock std::_Facet_Register std::locale::_Locimp::_Locimp 66992->67037 66993 7fe8a0 2 API calls 66993->67037 66994 87ca67 66994->66855 66995 818c60 std::_Throw_Cpp_error 2 API calls 66997 87cb92 66995->66997 66996 7fabb0 2 API calls 66996->67037 66998 7e2cf0 std::_Throw_Cpp_error 2 API calls 66997->66998 66999 87cba9 66998->66999 67000 7face0 2 API calls 66999->67000 67001 87cbbe 67000->67001 67002 7e7cf0 2 API calls 67001->67002 67003 87cbd6 std::_Throw_Cpp_error 67002->67003 67004 7fab20 2 API calls 67004->67037 67005 819810 2 API calls 67005->67037 67006 81d098 5 API calls 67006->67037 67007 7f7ef0 RtlAllocateHeap RtlFreeHeap 67007->67037 67008 7f40c0 2 API calls 67008->67037 67009 8c3880 FindFirstFileExW RtlAllocateHeap RtlFreeHeap 67009->67037 67010 87cae0 67014 7e2cf0 std::_Throw_Cpp_error 2 API calls 67010->67014 67011 7e32d0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 67011->67037 67012 7f85d0 RtlAllocateHeap RtlFreeHeap 67012->67037 67013 7f80a0 RtlAllocateHeap RtlFreeHeap 67013->67037 67015 87caf7 67014->67015 67017 7face0 2 API calls 67015->67017 67016 7f6130 RtlAllocateHeap RtlFreeHeap 67016->67037 67018 87cb0c 67017->67018 67020 7e7cf0 2 API calls 67018->67020 67019 8b3b40 7 API calls 67019->67037 67021 87cb24 std::_Throw_Cpp_error 67020->67021 67021->66995 67022 87caa6 67024 7e2cf0 std::_Throw_Cpp_error 2 API calls 67022->67024 67023 8b39a0 4 API calls 67023->67037 67025 87cab9 67024->67025 67026 7face0 2 API calls 67025->67026 67032 87c9a7 67026->67032 67027 7e7cf0 2 API calls 67027->67021 67028 87c97e 67029 7e2cf0 std::_Throw_Cpp_error 2 API calls 67028->67029 67030 87c992 67029->67030 67031 7face0 2 API calls 67030->67031 67031->67032 67032->67027 67033 7e3040 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 67033->67037 67035 806db0 RtlAllocateHeap RtlFreeHeap 67035->67037 67036 87cb34 67038 7e2cf0 std::_Throw_Cpp_error 2 API calls 67036->67038 67037->66992 67037->66993 67037->66994 67037->66996 67037->66997 67037->67004 67037->67005 67037->67006 67037->67007 67037->67008 67037->67009 67037->67010 67037->67011 67037->67012 67037->67013 67037->67016 67037->67019 67037->67021 67037->67022 67037->67023 67037->67028 67037->67033 67037->67035 67037->67036 67039 7f3d50 RtlAllocateHeap RtlFreeHeap 67037->67039 67040 804900 RtlAllocateHeap RtlFreeHeap 67037->67040 67043 5290489 2 API calls 67037->67043 67044 5290608 BaseDllReadWriteIniFile 67037->67044 67045 52903e8 2 API calls 67037->67045 67046 529040b 2 API calls 67037->67046 67047 529052a BaseDllReadWriteIniFile 67037->67047 67048 529042c 2 API calls 67037->67048 67049 52904ce 2 API calls 67037->67049 67050 529062e BaseDllReadWriteIniFile 67037->67050 67051 5290521 BaseDllReadWriteIniFile 67037->67051 67052 5290642 BaseDllReadWriteIniFile 67037->67052 67053 52903c5 2 API calls 67037->67053 67054 5290564 BaseDllReadWriteIniFile 67037->67054 67055 5290584 BaseDllReadWriteIniFile 67037->67055 67056 52905e4 BaseDllReadWriteIniFile 67037->67056 67057 52904c6 2 API calls 67037->67057 67058 5290386 2 API calls 67037->67058 67059 52905d9 BaseDllReadWriteIniFile 67037->67059 67060 5290518 BaseDllReadWriteIniFile 67037->67060 67061 529061b BaseDllReadWriteIniFile 67037->67061 67062 529069d BaseDllReadWriteIniFile 67037->67062 67063 5290672 BaseDllReadWriteIniFile 67037->67063 67064 52903b5 2 API calls 67037->67064 67065 52904b4 2 API calls 67037->67065 67712 803f40 5 API calls 4 library calls 67037->67712 67041 87cb47 67038->67041 67039->67037 67040->67037 67042 7face0 2 API calls 67041->67042 67042->67032 67043->67037 67044->67037 67045->67037 67046->67037 67047->67037 67048->67037 67049->67037 67050->67037 67051->67037 67052->67037 67053->67037 67054->67037 67055->67037 67056->67037 67057->67037 67058->67037 67059->67037 67060->67037 67061->67037 67062->67037 67063->67037 67064->67037 67065->67037 67066->67037 67067->67037 67068->67037 67069->67037 67070->67037 67071->67037 67072->67037 67073->67037 67074->67037 67075->67037 67076->67037 67077->67037 67078->67037 67079->67037 67080->67037 67081->67037 67082->67037 67083->67037 67084->67037 67085->67037 67086->67037 67087->67037 67088->67037 67089->67037 67090->67037 67091->67037 67092->67037 67093->67037 67095 878ab6 67094->67095 67096 7f7ef0 2 API calls 67095->67096 67097 878adf 67096->67097 67098 7f40c0 2 API calls 67097->67098 67099 878b09 67098->67099 67100 7faf80 2 API calls 67099->67100 67101 878c48 __fread_nolock 67100->67101 67102 7fac50 2 API calls 67101->67102 67103 878c93 67102->67103 67104 7fab20 2 API calls 67103->67104 67105 878d47 __fread_nolock 67104->67105 67179 52e00ee 2 API calls 67105->67179 67180 52e02af GetPrivateProfileStringA 67105->67180 67181 52e032c GetPrivateProfileStringA 67105->67181 67182 52e0069 2 API calls 67105->67182 67183 52e0022 2 API calls 67105->67183 67184 52e00e1 2 API calls 67105->67184 67185 52e017f 2 API calls 67105->67185 67186 52e01fb GetPrivateProfileStringA 67105->67186 67187 52e00bb 2 API calls 67105->67187 67188 52e01b9 2 API calls 67105->67188 67189 52e0279 GetPrivateProfileStringA 67105->67189 67190 52e0076 2 API calls 67105->67190 67191 52e0131 2 API calls 67105->67191 67192 52e030c GetPrivateProfileStringA 67105->67192 67193 52e010b 2 API calls 67105->67193 67194 52e0089 2 API calls 67105->67194 67195 52e02c4 GetPrivateProfileStringA 67105->67195 67196 52e0245 GetPrivateProfileStringA 67105->67196 67197 52e0285 GetPrivateProfileStringA 67105->67197 67198 52e0000 2 API calls 67105->67198 67199 52e0280 GetPrivateProfileStringA 67105->67199 67200 52e015e 2 API calls 67105->67200 67201 52e01de 2 API calls 67105->67201 67202 52e011c 2 API calls 67105->67202 67203 52e021a 2 API calls 67105->67203 67204 52e01d5 GetPrivateProfileStringA 67105->67204 67205 52e0050 2 API calls 67105->67205 67206 52e0151 2 API calls 67105->67206 67106 820f9e 2 API calls 67138 878d8a std::ios_base::_Ios_base_dtor __fread_nolock std::_Facet_Register std::locale::_Locimp::_Locimp 67106->67138 67107 7fe8a0 2 API calls 67107->67138 67108 87ad62 67108->66855 67109 7fabb0 2 API calls 67109->67138 67110 818c60 std::_Throw_Cpp_error 2 API calls 67111 87ae53 67110->67111 67112 7e2cf0 std::_Throw_Cpp_error 2 API calls 67111->67112 67113 87ae6f 67112->67113 67114 7face0 2 API calls 67113->67114 67115 87ae84 67114->67115 67116 7e7cf0 2 API calls 67115->67116 67118 87ae9c std::_Throw_Cpp_error 67116->67118 67117 7fab20 2 API calls 67117->67138 67119 819810 2 API calls 67119->67138 67120 81d098 5 API calls 67120->67138 67121 7f40c0 2 API calls 67121->67138 67122 8c3880 FindFirstFileExW RtlAllocateHeap RtlFreeHeap 67122->67138 67123 7e32d0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 67123->67138 67124 87ada1 67127 7e2cf0 std::_Throw_Cpp_error 2 API calls 67124->67127 67125 7f85d0 RtlAllocateHeap RtlFreeHeap 67125->67138 67126 7f80a0 RtlAllocateHeap RtlFreeHeap 67126->67138 67129 87adb8 67127->67129 67128 7f6130 RtlAllocateHeap RtlFreeHeap 67128->67138 67130 7face0 2 API calls 67129->67130 67132 87adcd 67130->67132 67131 8b3b40 7 API calls 67131->67138 67133 7e7cf0 2 API calls 67132->67133 67134 87ade5 std::_Throw_Cpp_error 67133->67134 67134->67110 67135 7faf80 2 API calls 67135->67138 67136 87abf3 67141 7e2cf0 std::_Throw_Cpp_error 2 API calls 67136->67141 67137 8b39a0 4 API calls 67137->67138 67138->67106 67138->67107 67138->67108 67138->67109 67138->67111 67138->67117 67138->67119 67138->67120 67138->67121 67138->67122 67138->67123 67138->67124 67138->67125 67138->67126 67138->67128 67138->67131 67138->67134 67138->67135 67138->67136 67138->67137 67139 7f3d50 RtlAllocateHeap RtlFreeHeap 67138->67139 67140 804900 RtlAllocateHeap RtlFreeHeap 67138->67140 67145 7ffbf0 2 API calls 67138->67145 67146 7f8f00 std::_Throw_Cpp_error 2 API calls 67138->67146 67147 7f7ef0 RtlAllocateHeap RtlFreeHeap 67138->67147 67148 7e3040 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 67138->67148 67149 806db0 RtlAllocateHeap RtlFreeHeap 67138->67149 67150 7f63b0 std::_Throw_Cpp_error 2 API calls 67138->67150 67151 87adf5 67138->67151 67156 5290489 2 API calls 67138->67156 67157 5290608 BaseDllReadWriteIniFile 67138->67157 67158 52903e8 2 API calls 67138->67158 67159 529040b 2 API calls 67138->67159 67160 529052a BaseDllReadWriteIniFile 67138->67160 67161 529042c 2 API calls 67138->67161 67162 52904ce 2 API calls 67138->67162 67163 529062e BaseDllReadWriteIniFile 67138->67163 67164 5290521 BaseDllReadWriteIniFile 67138->67164 67165 5290642 BaseDllReadWriteIniFile 67138->67165 67166 52903c5 2 API calls 67138->67166 67167 5290564 BaseDllReadWriteIniFile 67138->67167 67168 5290584 BaseDllReadWriteIniFile 67138->67168 67169 52905e4 BaseDllReadWriteIniFile 67138->67169 67170 52904c6 2 API calls 67138->67170 67171 5290386 2 API calls 67138->67171 67172 52905d9 BaseDllReadWriteIniFile 67138->67172 67173 5290518 BaseDllReadWriteIniFile 67138->67173 67174 529061b BaseDllReadWriteIniFile 67138->67174 67175 529069d BaseDllReadWriteIniFile 67138->67175 67176 5290672 BaseDllReadWriteIniFile 67138->67176 67177 52903b5 2 API calls 67138->67177 67178 52904b4 2 API calls 67138->67178 67139->67138 67140->67138 67142 87ac06 67141->67142 67143 7face0 2 API calls 67142->67143 67155 87ac1b 67143->67155 67144 7e7cf0 2 API calls 67144->67134 67145->67138 67146->67138 67147->67138 67148->67138 67149->67138 67150->67138 67152 7e2cf0 std::_Throw_Cpp_error 2 API calls 67151->67152 67153 87ae08 67152->67153 67154 7face0 2 API calls 67153->67154 67154->67155 67155->67144 67156->67138 67157->67138 67158->67138 67159->67138 67160->67138 67161->67138 67162->67138 67163->67138 67164->67138 67165->67138 67166->67138 67167->67138 67168->67138 67169->67138 67170->67138 67171->67138 67172->67138 67173->67138 67174->67138 67175->67138 67176->67138 67177->67138 67178->67138 67179->67138 67180->67138 67181->67138 67182->67138 67183->67138 67184->67138 67185->67138 67186->67138 67187->67138 67188->67138 67189->67138 67190->67138 67191->67138 67192->67138 67193->67138 67194->67138 67195->67138 67196->67138 67197->67138 67198->67138 67199->67138 67200->67138 67201->67138 67202->67138 67203->67138 67204->67138 67205->67138 67206->67138 67208 876206 67207->67208 67209 7f7ef0 2 API calls 67208->67209 67210 87622f 67209->67210 67211 7f40c0 2 API calls 67210->67211 67212 876259 67211->67212 67213 7faf80 2 API calls 67212->67213 67214 8762f4 __fread_nolock 67213->67214 67215 7fac50 2 API calls 67214->67215 67216 87633f 67215->67216 67217 7fab20 2 API calls 67216->67217 67218 8763e4 __fread_nolock 67217->67218 67290 52e00ee 2 API calls 67218->67290 67291 52e02af GetPrivateProfileStringA 67218->67291 67292 52e032c GetPrivateProfileStringA 67218->67292 67293 52e0069 2 API calls 67218->67293 67294 52e0022 2 API calls 67218->67294 67295 52e00e1 2 API calls 67218->67295 67296 52e017f 2 API calls 67218->67296 67297 52e01fb GetPrivateProfileStringA 67218->67297 67298 52e00bb 2 API calls 67218->67298 67299 52e01b9 2 API calls 67218->67299 67300 52e0279 GetPrivateProfileStringA 67218->67300 67301 52e0076 2 API calls 67218->67301 67302 52e0131 2 API calls 67218->67302 67303 52e030c GetPrivateProfileStringA 67218->67303 67304 52e010b 2 API calls 67218->67304 67305 52e0089 2 API calls 67218->67305 67306 52e02c4 GetPrivateProfileStringA 67218->67306 67307 52e0245 GetPrivateProfileStringA 67218->67307 67308 52e0285 GetPrivateProfileStringA 67218->67308 67309 52e0000 2 API calls 67218->67309 67310 52e0280 GetPrivateProfileStringA 67218->67310 67311 52e015e 2 API calls 67218->67311 67312 52e01de 2 API calls 67218->67312 67313 52e011c 2 API calls 67218->67313 67314 52e021a 2 API calls 67218->67314 67315 52e01d5 GetPrivateProfileStringA 67218->67315 67316 52e0050 2 API calls 67218->67316 67317 52e0151 2 API calls 67218->67317 67219 820f9e 2 API calls 67259 876427 std::ios_base::_Ios_base_dtor __fread_nolock std::_Facet_Register std::locale::_Locimp::_Locimp 67219->67259 67220 878a03 std::_Throw_Cpp_error 67223 818c60 std::_Throw_Cpp_error 2 API calls 67220->67223 67221 7fe8a0 2 API calls 67221->67259 67222 878949 67222->66855 67225 878a21 67223->67225 67224 7fabb0 2 API calls 67224->67259 67226 7e2cf0 std::_Throw_Cpp_error 2 API calls 67225->67226 67227 878a35 67226->67227 67229 7face0 2 API calls 67227->67229 67228 7e3040 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 67228->67259 67230 878a4a 67229->67230 67231 7e7cf0 2 API calls 67230->67231 67232 878a62 std::_Throw_Cpp_error 67231->67232 67233 7fab20 2 API calls 67233->67259 67234 819810 2 API calls 67234->67259 67235 81d098 5 API calls 67235->67259 67236 7f40c0 2 API calls 67236->67259 67237 7e2fe0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 67237->67259 67238 7e32d0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 67238->67259 67239 8c3880 FindFirstFileExW RtlAllocateHeap RtlFreeHeap 67239->67259 67240 878988 67244 7e2cf0 std::_Throw_Cpp_error 2 API calls 67240->67244 67241 7f85d0 RtlAllocateHeap RtlFreeHeap 67241->67259 67242 7f80a0 RtlAllocateHeap RtlFreeHeap 67242->67259 67243 7f6130 RtlAllocateHeap RtlFreeHeap 67243->67259 67245 87899f 67244->67245 67246 7face0 2 API calls 67245->67246 67247 878862 67246->67247 67249 7e7cf0 2 API calls 67247->67249 67248 8b3b40 7 API calls 67248->67259 67249->67220 67250 7faf80 2 API calls 67250->67259 67251 87883a 67255 7e2cf0 std::_Throw_Cpp_error 2 API calls 67251->67255 67252 8b39a0 4 API calls 67252->67259 67253 804900 RtlAllocateHeap RtlFreeHeap 67253->67259 67254 7f3d50 RtlAllocateHeap RtlFreeHeap 67254->67259 67256 87884d 67255->67256 67257 7face0 2 API calls 67256->67257 67257->67247 67258 7f7ef0 RtlAllocateHeap RtlFreeHeap 67258->67259 67259->67219 67259->67220 67259->67221 67259->67222 67259->67224 67259->67225 67259->67228 67259->67233 67259->67234 67259->67235 67259->67236 67259->67237 67259->67238 67259->67239 67259->67240 67259->67241 67259->67242 67259->67243 67259->67248 67259->67250 67259->67251 67259->67252 67259->67253 67259->67254 67259->67258 67259->67259 67260 806db0 RtlAllocateHeap RtlFreeHeap 67259->67260 67261 8212e6 2 API calls 67259->67261 67263 8789c3 67259->67263 67267 5290489 2 API calls 67259->67267 67268 5290608 BaseDllReadWriteIniFile 67259->67268 67269 52903e8 2 API calls 67259->67269 67270 529040b 2 API calls 67259->67270 67271 529052a BaseDllReadWriteIniFile 67259->67271 67272 529042c 2 API calls 67259->67272 67273 52904ce 2 API calls 67259->67273 67274 529062e BaseDllReadWriteIniFile 67259->67274 67275 5290521 BaseDllReadWriteIniFile 67259->67275 67276 5290642 BaseDllReadWriteIniFile 67259->67276 67277 52903c5 2 API calls 67259->67277 67278 5290564 BaseDllReadWriteIniFile 67259->67278 67279 5290584 BaseDllReadWriteIniFile 67259->67279 67280 52905e4 BaseDllReadWriteIniFile 67259->67280 67281 52904c6 2 API calls 67259->67281 67282 5290386 2 API calls 67259->67282 67283 52905d9 BaseDllReadWriteIniFile 67259->67283 67284 5290518 BaseDllReadWriteIniFile 67259->67284 67285 529061b BaseDllReadWriteIniFile 67259->67285 67286 529069d BaseDllReadWriteIniFile 67259->67286 67287 5290672 BaseDllReadWriteIniFile 67259->67287 67288 52903b5 2 API calls 67259->67288 67289 52904b4 2 API calls 67259->67289 67713 80c070 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error std::_Facet_Register 67259->67713 67260->67259 67261->67259 67264 7e2cf0 std::_Throw_Cpp_error 2 API calls 67263->67264 67265 8789d6 67264->67265 67266 7face0 2 API calls 67265->67266 67266->67247 67267->67259 67268->67259 67269->67259 67270->67259 67271->67259 67272->67259 67273->67259 67274->67259 67275->67259 67276->67259 67277->67259 67278->67259 67279->67259 67280->67259 67281->67259 67282->67259 67283->67259 67284->67259 67285->67259 67286->67259 67287->67259 67288->67259 67289->67259 67290->67259 67291->67259 67292->67259 67293->67259 67294->67259 67295->67259 67296->67259 67297->67259 67298->67259 67299->67259 67300->67259 67301->67259 67302->67259 67303->67259 67304->67259 67305->67259 67306->67259 67307->67259 67308->67259 67309->67259 67310->67259 67311->67259 67312->67259 67313->67259 67314->67259 67315->67259 67316->67259 67317->67259 67319 873f06 67318->67319 67320 7f7ef0 2 API calls 67319->67320 67321 873f2f 67320->67321 67322 7f40c0 2 API calls 67321->67322 67323 873f59 67322->67323 67324 7faf80 2 API calls 67323->67324 67325 873ff4 __fread_nolock 67324->67325 67326 7fac50 2 API calls 67325->67326 67327 87403f 67326->67327 67328 7fab20 2 API calls 67327->67328 67329 8740e4 __fread_nolock 67328->67329 67403 52e00ee 2 API calls 67329->67403 67404 52e02af GetPrivateProfileStringA 67329->67404 67405 52e032c GetPrivateProfileStringA 67329->67405 67406 52e0069 2 API calls 67329->67406 67407 52e0022 2 API calls 67329->67407 67408 52e00e1 2 API calls 67329->67408 67409 52e017f 2 API calls 67329->67409 67410 52e01fb GetPrivateProfileStringA 67329->67410 67411 52e00bb 2 API calls 67329->67411 67412 52e01b9 2 API calls 67329->67412 67413 52e0279 GetPrivateProfileStringA 67329->67413 67414 52e0076 2 API calls 67329->67414 67415 52e0131 2 API calls 67329->67415 67416 52e030c GetPrivateProfileStringA 67329->67416 67417 52e010b 2 API calls 67329->67417 67418 52e0089 2 API calls 67329->67418 67419 52e02c4 GetPrivateProfileStringA 67329->67419 67420 52e0245 GetPrivateProfileStringA 67329->67420 67421 52e0285 GetPrivateProfileStringA 67329->67421 67422 52e0000 2 API calls 67329->67422 67423 52e0280 GetPrivateProfileStringA 67329->67423 67424 52e015e 2 API calls 67329->67424 67425 52e01de 2 API calls 67329->67425 67426 52e011c 2 API calls 67329->67426 67427 52e021a 2 API calls 67329->67427 67428 52e01d5 GetPrivateProfileStringA 67329->67428 67429 52e0050 2 API calls 67329->67429 67430 52e0151 2 API calls 67329->67430 67330 820f9e 2 API calls 67374 874127 std::ios_base::_Ios_base_dtor __fread_nolock __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z std::_Facet_Register std::locale::_Locimp::_Locimp 67330->67374 67331 7fe8a0 2 API calls 67331->67374 67332 876084 67332->66855 67333 7fabb0 2 API calls 67333->67374 67334 818c60 std::_Throw_Cpp_error 2 API calls 67335 876175 67334->67335 67336 7e2cf0 std::_Throw_Cpp_error 2 API calls 67335->67336 67337 87618c 67336->67337 67339 7face0 2 API calls 67337->67339 67338 7e3040 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 67338->67374 67340 8761a1 67339->67340 67341 7e7cf0 2 API calls 67340->67341 67342 8761b9 std::_Throw_Cpp_error 67341->67342 67343 7fab20 2 API calls 67343->67374 67344 819810 2 API calls 67344->67374 67345 81d098 5 API calls 67345->67374 67346 7f40c0 2 API calls 67346->67374 67347 8c3880 FindFirstFileExW RtlAllocateHeap RtlFreeHeap 67347->67374 67348 8760c3 67353 7e2cf0 std::_Throw_Cpp_error 2 API calls 67348->67353 67349 7e32d0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 67349->67374 67350 7f85d0 RtlAllocateHeap RtlFreeHeap 67350->67374 67351 7f80a0 RtlAllocateHeap RtlFreeHeap 67351->67374 67352 7f6130 RtlAllocateHeap RtlFreeHeap 67352->67374 67354 8760da 67353->67354 67355 7face0 2 API calls 67354->67355 67356 8760ef 67355->67356 67358 7e7cf0 2 API calls 67356->67358 67357 8b3b40 7 API calls 67357->67374 67359 876107 std::_Throw_Cpp_error 67358->67359 67359->67334 67360 7faf80 2 API calls 67360->67374 67361 8b39a0 4 API calls 67361->67374 67362 875f15 67363 7e2cf0 std::_Throw_Cpp_error 2 API calls 67362->67363 67364 875f28 67363->67364 67365 7face0 2 API calls 67364->67365 67366 875f3d 67365->67366 67367 7e7cf0 2 API calls 67366->67367 67367->67359 67368 7ffbf0 2 API calls 67368->67374 67369 7f8f00 std::_Throw_Cpp_error 2 API calls 67369->67374 67370 8212e6 2 API calls 67370->67374 67371 806db0 RtlAllocateHeap RtlFreeHeap 67371->67374 67372 876117 67375 7e2cf0 std::_Throw_Cpp_error 2 API calls 67372->67375 67373 7f7ef0 RtlAllocateHeap RtlFreeHeap 67373->67374 67374->67330 67374->67331 67374->67332 67374->67333 67374->67335 67374->67338 67374->67343 67374->67344 67374->67345 67374->67346 67374->67347 67374->67348 67374->67349 67374->67350 67374->67351 67374->67352 67374->67357 67374->67359 67374->67360 67374->67361 67374->67362 67374->67368 67374->67369 67374->67370 67374->67371 67374->67372 67374->67373 67376 7f3d50 RtlAllocateHeap RtlFreeHeap 67374->67376 67377 804900 RtlAllocateHeap RtlFreeHeap 67374->67377 67380 5290489 2 API calls 67374->67380 67381 5290608 BaseDllReadWriteIniFile 67374->67381 67382 52903e8 2 API calls 67374->67382 67383 529040b 2 API calls 67374->67383 67384 529052a BaseDllReadWriteIniFile 67374->67384 67385 529042c 2 API calls 67374->67385 67386 52904ce 2 API calls 67374->67386 67387 529062e BaseDllReadWriteIniFile 67374->67387 67388 5290521 BaseDllReadWriteIniFile 67374->67388 67389 5290642 BaseDllReadWriteIniFile 67374->67389 67390 52903c5 2 API calls 67374->67390 67391 5290564 BaseDllReadWriteIniFile 67374->67391 67392 5290584 BaseDllReadWriteIniFile 67374->67392 67393 52905e4 BaseDllReadWriteIniFile 67374->67393 67394 52904c6 2 API calls 67374->67394 67395 5290386 2 API calls 67374->67395 67396 52905d9 BaseDllReadWriteIniFile 67374->67396 67397 5290518 BaseDllReadWriteIniFile 67374->67397 67398 529061b BaseDllReadWriteIniFile 67374->67398 67399 529069d BaseDllReadWriteIniFile 67374->67399 67400 5290672 BaseDllReadWriteIniFile 67374->67400 67401 52903b5 2 API calls 67374->67401 67402 52904b4 2 API calls 67374->67402 67378 87612a 67375->67378 67376->67374 67377->67374 67379 7face0 2 API calls 67378->67379 67379->67366 67380->67374 67381->67374 67382->67374 67383->67374 67384->67374 67385->67374 67386->67374 67387->67374 67388->67374 67389->67374 67390->67374 67391->67374 67392->67374 67393->67374 67394->67374 67395->67374 67396->67374 67397->67374 67398->67374 67399->67374 67400->67374 67401->67374 67402->67374 67403->67374 67404->67374 67405->67374 67406->67374 67407->67374 67408->67374 67409->67374 67410->67374 67411->67374 67412->67374 67413->67374 67414->67374 67415->67374 67416->67374 67417->67374 67418->67374 67419->67374 67420->67374 67421->67374 67422->67374 67423->67374 67424->67374 67425->67374 67426->67374 67427->67374 67428->67374 67429->67374 67430->67374 67432 52e01bb 67431->67432 67433 52e01d5 GetPrivateProfileStringA 67432->67433 67434 52e01c6 GetPrivateProfileStringA 67433->67434 67436 52e02fd 67434->67436 67436->66907 67438 52e018b 67437->67438 67440 52e01c6 GetPrivateProfileStringA 67437->67440 67439 52e01d5 GetPrivateProfileStringA 67438->67439 67439->67440 67442 52e02fd 67440->67442 67442->66907 67444 52e01f0 GetPrivateProfileStringA 67443->67444 67446 52e02fd 67444->67446 67446->66907 67448 52e018b 67447->67448 67450 52e01c6 GetPrivateProfileStringA 67447->67450 67449 52e01d5 GetPrivateProfileStringA 67448->67449 67448->67450 67449->67450 67452 52e02fd 67450->67452 67452->66907 67454 52e0156 67453->67454 67455 52e01d5 GetPrivateProfileStringA 67454->67455 67456 52e01c6 GetPrivateProfileStringA 67455->67456 67458 52e02fd 67456->67458 67458->66907 67460 52e02cb GetPrivateProfileStringA 67459->67460 67462 52e02fd 67460->67462 67462->66907 67464 52e005b 67463->67464 67465 52e01d5 GetPrivateProfileStringA 67464->67465 67466 52e01c6 GetPrivateProfileStringA 67465->67466 67468 52e02fd 67466->67468 67468->66907 67470 52e005b 67469->67470 67471 52e01d5 GetPrivateProfileStringA 67470->67471 67472 52e01c6 GetPrivateProfileStringA 67471->67472 67474 52e02fd 67472->67474 67474->66907 67476 52e0101 67475->67476 67477 52e01d5 GetPrivateProfileStringA 67476->67477 67478 52e01c6 GetPrivateProfileStringA 67477->67478 67480 52e02fd 67478->67480 67480->66907 67482 52e0080 67481->67482 67483 52e01d5 GetPrivateProfileStringA 67482->67483 67484 52e01c6 GetPrivateProfileStringA 67483->67484 67486 52e02fd 67484->67486 67486->66907 67488 52e018b 67487->67488 67489 52e01d5 GetPrivateProfileStringA 67488->67489 67490 52e01c6 GetPrivateProfileStringA 67489->67490 67492 52e02fd 67490->67492 67492->66907 67494 52e0071 67493->67494 67495 52e01d5 GetPrivateProfileStringA 67494->67495 67496 52e01c6 GetPrivateProfileStringA 67495->67496 67498 52e02fd 67496->67498 67498->66907 67500 52e0290 GetPrivateProfileStringA 67499->67500 67502 52e02fd 67500->67502 67502->66907 67504 52e02a9 67503->67504 67506 52e02fd 67503->67506 67505 52e02d8 GetPrivateProfileStringA 67504->67505 67504->67506 67505->67506 67506->66907 67508 52e0120 67507->67508 67509 52e01d5 GetPrivateProfileStringA 67508->67509 67510 52e01c6 GetPrivateProfileStringA 67509->67510 67512 52e02fd 67510->67512 67512->66907 67514 52e008e 67513->67514 67515 52e01d5 GetPrivateProfileStringA 67514->67515 67516 52e01c6 GetPrivateProfileStringA 67515->67516 67518 52e02fd 67516->67518 67518->66907 67520 52e02ca GetPrivateProfileStringA 67519->67520 67521 52e02fd 67519->67521 67520->67521 67521->66907 67523 52e00aa 67522->67523 67524 52e01d5 GetPrivateProfileStringA 67523->67524 67525 52e01c6 GetPrivateProfileStringA 67524->67525 67527 52e02fd 67525->67527 67527->66907 67529 52e0126 67528->67529 67530 52e01d5 GetPrivateProfileStringA 67529->67530 67531 52e01c6 GetPrivateProfileStringA 67530->67531 67533 52e02fd 67531->67533 67533->66907 67535 52e0244 GetPrivateProfileStringA 67534->67535 67537 52e02fd 67535->67537 67537->66907 67539 52e02fd 67538->67539 67539->66907 67541 52e000d 67540->67541 67542 52e01d5 GetPrivateProfileStringA 67541->67542 67543 52e01c6 GetPrivateProfileStringA 67542->67543 67545 52e02fd 67543->67545 67545->66907 67547 52e0048 67546->67547 67548 52e01d5 GetPrivateProfileStringA 67547->67548 67549 52e01c6 GetPrivateProfileStringA 67548->67549 67551 52e02fd 67549->67551 67551->66907 67553 52e0290 GetPrivateProfileStringA 67552->67553 67555 52e02fd 67553->67555 67555->66907 67557 52e016a 67556->67557 67558 52e01d5 GetPrivateProfileStringA 67557->67558 67559 52e01c6 GetPrivateProfileStringA 67558->67559 67561 52e02fd 67559->67561 67561->66907 67563 52e0220 GetPrivateProfileStringA 67562->67563 67565 52e02fd 67563->67565 67565->66907 67567 52e0289 GetPrivateProfileStringA 67566->67567 67569 52e02fd 67567->67569 67569->66907 67571 52e0126 67570->67571 67572 52e01d5 GetPrivateProfileStringA 67571->67572 67573 52e01c6 GetPrivateProfileStringA 67572->67573 67575 52e02fd 67573->67575 67575->66907 67577 820ff5 67576->67577 67578 820fad 67576->67578 67711 82100b RtlAllocateHeap RtlFreeHeap __fread_nolock __dosmaperr std::_Locinfo::_Locinfo_dtor 67577->67711 67580 820fb3 67578->67580 67583 820fd0 67578->67583 67707 8216ef RtlAllocateHeap RtlFreeHeap __dosmaperr 67580->67707 67581 820fc3 67581->66907 67589 820fee 67583->67589 67709 8216ef RtlAllocateHeap RtlFreeHeap __dosmaperr 67583->67709 67584 820fb8 67708 818c50 RtlAllocateHeap RtlFreeHeap __fread_nolock 67584->67708 67587 820fdf 67710 818c50 RtlAllocateHeap RtlFreeHeap __fread_nolock 67587->67710 67589->66907 67591 52903f0 67590->67591 67592 5290518 BaseDllReadWriteIniFile 67591->67592 67593 5290507 BaseDllReadWriteIniFile 67592->67593 67595 52906df 67593->67595 67598 5290638 BaseDllReadWriteIniFile 67596->67598 67599 52906df 67598->67599 67601 5290595 BaseDllReadWriteIniFile 67600->67601 67603 52906df 67601->67603 67605 52903bd 67604->67605 67606 5290518 BaseDllReadWriteIniFile 67605->67606 67607 5290507 BaseDllReadWriteIniFile 67606->67607 67609 52906df 67607->67609 67611 5290610 BaseDllReadWriteIniFile 67610->67611 67613 52906df 67611->67613 67615 52903d9 67614->67615 67616 5290518 BaseDllReadWriteIniFile 67615->67616 67617 5290507 BaseDllReadWriteIniFile 67616->67617 67619 52906df 67617->67619 67621 52903bd 67620->67621 67622 5290518 BaseDllReadWriteIniFile 67621->67622 67623 5290507 BaseDllReadWriteIniFile 67622->67623 67625 52906df 67623->67625 67628 529040e 67626->67628 67627 52903a8 67627->66907 67628->67627 67629 5290518 BaseDllReadWriteIniFile 67628->67629 67630 5290507 BaseDllReadWriteIniFile 67629->67630 67632 52906df 67630->67632 67634 52904ea 67633->67634 67635 5290518 BaseDllReadWriteIniFile 67634->67635 67636 5290507 BaseDllReadWriteIniFile 67635->67636 67638 52906df 67636->67638 67640 5290525 BaseDllReadWriteIniFile 67639->67640 67642 52906df 67640->67642 67645 529064c BaseDllReadWriteIniFile 67643->67645 67646 52906df 67645->67646 67648 5290627 BaseDllReadWriteIniFile 67647->67648 67650 52906df 67648->67650 67652 529043a 67651->67652 67653 5290518 BaseDllReadWriteIniFile 67652->67653 67654 5290507 BaseDllReadWriteIniFile 67653->67654 67656 52906df 67654->67656 67658 5290525 BaseDllReadWriteIniFile 67657->67658 67660 52906df 67658->67660 67662 529052e BaseDllReadWriteIniFile 67661->67662 67664 52906df 67662->67664 67666 5290570 BaseDllReadWriteIniFile 67665->67666 67668 52906df 67666->67668 67670 529067d BaseDllReadWriteIniFile 67669->67670 67672 52906df 67670->67672 67674 52904d2 67673->67674 67675 5290518 BaseDllReadWriteIniFile 67674->67675 67676 5290507 BaseDllReadWriteIniFile 67675->67676 67678 52906df 67676->67678 67680 5290487 67679->67680 67680->67679 67681 5290518 BaseDllReadWriteIniFile 67680->67681 67682 5290507 BaseDllReadWriteIniFile 67681->67682 67684 52906df 67682->67684 67686 52905e7 BaseDllReadWriteIniFile 67685->67686 67688 52906df 67686->67688 67690 529066a BaseDllReadWriteIniFile 67689->67690 67692 52906df 67690->67692 67694 5290627 BaseDllReadWriteIniFile 67693->67694 67696 52906df 67694->67696 67698 52904d7 67697->67698 67699 5290518 BaseDllReadWriteIniFile 67698->67699 67700 5290507 BaseDllReadWriteIniFile 67699->67700 67702 52906df 67700->67702 67703->66907 67704->66907 67705->66907 67706->66907 67707->67584 67708->67581 67709->67587 67710->67581 67711->67581 67712->67037 67713->67259 67714 7e2e70 67715 7e2e88 67714->67715 67716 7e2ea9 67714->67716 67717 7e2f60 67716->67717 67718 7e32d0 std::_Throw_Cpp_error 2 API calls 67716->67718 67720 7e2eee std::locale::_Locimp::_Locimp 67718->67720 67719 7e2f3c std::locale::_Locimp::_Locimp 67720->67719 67723 7e2fe0 RtlAllocateHeap RtlFreeHeap std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 67720->67723 67722 7e2f2b 67723->67722 67724 82672c 67727 826478 67724->67727 67726 82675d 67728 826484 __fread_nolock std::_Lockit::_Lockit 67727->67728 67731 8264d3 67728->67731 67730 82649f 67730->67726 67732 8264ee 67731->67732 67733 826561 std::locale::_Setgloballocale 67731->67733 67732->67733 67734 826541 67732->67734 67741 8311b9 67732->67741 67733->67730 67734->67733 67735 8311b9 2 API calls 67734->67735 67737 826557 67735->67737 67740 82b00c __dosmaperr 2 API calls 67737->67740 67738 826537 67739 82b00c __dosmaperr 2 API calls 67738->67739 67739->67734 67740->67733 67742 8311e1 67741->67742 67743 8311c6 67741->67743 67745 8311f0 67742->67745 67758 836988 RtlAllocateHeap RtlFreeHeap __fread_nolock __dosmaperr 67742->67758 67743->67742 67744 8311d2 67743->67744 67757 8216ef RtlAllocateHeap RtlFreeHeap __dosmaperr 67744->67757 67750 82b9ea 67745->67750 67749 8311d7 __fread_nolock 67749->67738 67751 82ba02 67750->67751 67755 82b9f7 std::_Locinfo::_Locinfo_dtor 67750->67755 67752 82ba0a 67751->67752 67756 82ba13 __dosmaperr std::_Facet_Register 67751->67756 67753 82b00c __dosmaperr 2 API calls 67752->67753 67753->67755 67755->67749 67756->67755 67759 8216ef RtlAllocateHeap RtlFreeHeap __dosmaperr 67756->67759 67757->67749 67758->67745 67759->67755 67760 7f9950 67761 7f9978 std::ios_base::_Ios_base_dtor 67760->67761 67762 7f9968 67760->67762 67762->67761 67763 818c60 std::_Throw_Cpp_error 2 API calls 67762->67763 67764 7f998d 67763->67764 67765 7f9a4f 67764->67765 67772 812b64 67764->67772 67769 7f99dd 67779 7fc430 2 API calls 4 library calls 67769->67779 67771 7f9a04 67774 812ae7 67772->67774 67773 7f99cc 67773->67765 67778 7f83b0 RtlAllocateHeap RtlFreeHeap 67773->67778 67774->67773 67775 81d5e6 4 API calls 67774->67775 67776 812b4e 67775->67776 67776->67773 67777 81d098 5 API calls 67776->67777 67777->67773 67778->67769 67779->67771 67780 800ad0 67785 8014a0 67780->67785 67782 800ae0 67783 800b2a 67782->67783 67784 809e20 2 API calls 67782->67784 67784->67783 67786 8014cb 67785->67786 67787 8014ee 67786->67787 67788 809e20 2 API calls 67786->67788 67787->67782 67789 80150b 67788->67789 67789->67782 67790 83e090 67829 7eb8e0 67790->67829 67792 83e0f1 67793 7fab20 2 API calls 67792->67793 67794 83e168 CreateDirectoryA 67793->67794 67796 83e82d 67794->67796 67815 83e19c 67794->67815 67795 83e7f4 67797 7f63b0 std::_Throw_Cpp_error 2 API calls 67795->67797 67798 83ef7c 67796->67798 67799 7fab20 2 API calls 67796->67799 67800 83e808 67797->67800 67801 83e8b1 CreateDirectoryA 67799->67801 68235 8bc3e0 67800->68235 67801->67798 67814 83e8df 67801->67814 67803 83e818 67803->67796 67804 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 67804->67815 67805 83ef43 67807 7f63b0 std::_Throw_Cpp_error 2 API calls 67805->67807 67808 83ef57 67807->67808 68307 8b49b0 67808->68307 67812 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 67812->67814 67813 7fad80 RtlAllocateHeap RtlFreeHeap 67813->67815 67814->67805 67814->67812 67816 7fad80 RtlAllocateHeap RtlFreeHeap 67814->67816 67818 7fab20 RtlAllocateHeap RtlFreeHeap 67814->67818 67821 7e2cf0 std::_Throw_Cpp_error 2 API calls 67814->67821 67823 7fae20 2 API calls 67814->67823 67826 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 67814->67826 67828 8bd2b0 81 API calls 67814->67828 69187 7f6290 RtlAllocateHeap RtlFreeHeap 67814->69187 67815->67795 67815->67804 67815->67813 67817 7e2cf0 std::_Throw_Cpp_error 2 API calls 67815->67817 67819 7fab20 RtlAllocateHeap RtlFreeHeap 67815->67819 67820 7fae20 2 API calls 67815->67820 67825 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 67815->67825 68952 7f6290 RtlAllocateHeap RtlFreeHeap 67815->68952 68953 8bd2b0 67815->68953 67816->67814 67817->67815 67818->67814 67819->67815 67820->67815 67821->67814 67823->67814 67825->67815 67826->67814 67828->67814 67830 7eb916 67829->67830 67831 7fab20 2 API calls 67830->67831 67877 7ebfd1 67830->67877 67833 7eb9e7 CreateDirectoryA 67831->67833 67832 7fab20 2 API calls 67836 7ec0ab CreateDirectoryA 67832->67836 67834 7eba12 67833->67834 67833->67877 67838 7fab20 2 API calls 67834->67838 67835 7f2270 67835->67792 67840 7ec0d6 67836->67840 68102 7ef315 67836->68102 67837 7fab20 2 API calls 67841 7ef43a 67837->67841 67842 7ebab4 CreateDirectoryA 67838->67842 67839 7fab20 2 API calls 67843 7f1e4d CreateDirectoryA 67839->67843 67844 7fab20 2 API calls 67840->67844 67851 7fab20 2 API calls 67841->67851 68097 7f1d37 67841->68097 67845 7ebae2 __fread_nolock 67842->67845 67921 7ebc28 67842->67921 67843->67835 67846 7f1e78 67843->67846 67847 7ec178 CreateDirectoryA 67844->67847 67852 7ebaf5 SHGetFolderPathA 67845->67852 67848 7fab20 2 API calls 67846->67848 67849 7ec1a0 67847->67849 67958 7ec495 67847->67958 67853 7f1fa0 CreateDirectoryA 67848->67853 67855 7e2cf0 std::_Throw_Cpp_error 2 API calls 67849->67855 67850 7fab20 2 API calls 67856 7ebcea CreateDirectoryA 67850->67856 67881 7ef507 67851->67881 67857 7e2cf0 std::_Throw_Cpp_error 2 API calls 67852->67857 67858 7f1fc8 67853->67858 67985 7f223a 67853->67985 67854 7fab20 2 API calls 67859 7ec557 CreateDirectoryA 67854->67859 67860 7ec2be 67855->67860 67861 7ebd12 __fread_nolock 67856->67861 67974 7ebf9b 67856->67974 67863 7ebba1 67857->67863 67874 7e3040 std::_Throw_Cpp_error 2 API calls 67858->67874 67864 7ed196 67859->67864 67865 7ec57f 67859->67865 67871 7face0 2 API calls 67860->67871 67866 7ebd25 SHGetFolderPathA 67861->67866 67862 8c3b20 7 API calls 67862->67835 67867 7face0 2 API calls 67863->67867 67868 7fab20 2 API calls 67864->67868 67869 7e2cf0 std::_Throw_Cpp_error 2 API calls 67865->67869 67872 7e2cf0 std::_Throw_Cpp_error 2 API calls 67866->67872 67873 7ebbb7 67867->67873 67875 7ed27c CreateDirectoryA 67868->67875 67876 7ec727 67869->67876 67870 8c3b20 7 API calls 67870->67877 67878 7ec367 67871->67878 67879 7ebe57 67872->67879 67890 8c4050 4 API calls 67873->67890 67882 7f211c 67874->67882 67883 7ed2a4 67875->67883 68043 7ed618 67875->68043 67892 7face0 2 API calls 67876->67892 67877->67832 67877->68102 67894 7e2cf0 std::_Throw_Cpp_error 2 API calls 67878->67894 67884 7face0 2 API calls 67879->67884 67880 7fab20 2 API calls 67885 7ef915 CreateDirectoryA 67880->67885 67881->67881 67889 7e3040 std::_Throw_Cpp_error 2 API calls 67881->67889 68005 7ef853 67881->68005 67900 7face0 2 API calls 67882->67900 67901 7e2cf0 std::_Throw_Cpp_error 2 API calls 67883->67901 67887 7ebe6d 67884->67887 67888 7ef93d 67885->67888 68027 7efb75 67885->68027 67886 7fab20 2 API calls 67891 7ed6da CreateDirectoryA 67886->67891 67911 7e2cf0 std::_Throw_Cpp_error 2 API calls 67887->67911 67895 7e2cf0 std::_Throw_Cpp_error 2 API calls 67888->67895 67896 7ef704 67889->67896 67898 7ebbe2 67890->67898 67899 7ed702 67891->67899 68052 7ed9f7 67891->68052 67893 7ec7d0 67892->67893 67919 7e2cf0 std::_Throw_Cpp_error 2 API calls 67893->67919 67904 7ec39b 67894->67904 67905 7efa5b 67895->67905 67922 7face0 2 API calls 67896->67922 67897 7fab20 2 API calls 67907 7efc37 CreateDirectoryA 67897->67907 67908 7ebc21 67898->67908 67915 7f63b0 std::_Throw_Cpp_error 2 API calls 67898->67915 67909 7e2cf0 std::_Throw_Cpp_error 2 API calls 67899->67909 67902 7f21c9 67900->67902 67903 7ed3bb 67901->67903 67934 8c4050 4 API calls 67902->67934 67935 7face0 2 API calls 67903->67935 67910 8c4120 5 API calls 67904->67910 67930 7face0 2 API calls 67905->67930 67906 7fab20 2 API calls 67913 7edab9 CreateDirectoryA 67906->67913 67914 7efc5f 67907->67914 68055 7efe11 67907->68055 67912 8c3b20 7 API calls 67908->67912 67908->67921 67916 7ed820 67909->67916 67920 7ec3a8 67910->67920 67924 7ebea1 67911->67924 67912->67921 67923 7edae1 67913->67923 68077 7ede5c 67913->68077 67917 7e2cf0 std::_Throw_Cpp_error 2 API calls 67914->67917 67918 7ebbfa 67915->67918 67945 7face0 2 API calls 67916->67945 67926 7efcf7 67917->67926 67927 7f63b0 std::_Throw_Cpp_error 2 API calls 67918->67927 67928 7ec804 67919->67928 67929 7ec451 67920->67929 67940 7fab20 2 API calls 67920->67940 67921->67850 67932 7ef7b1 67922->67932 67933 7e2cf0 std::_Throw_Cpp_error 2 API calls 67923->67933 67936 8c4120 5 API calls 67924->67936 67925 7fab20 2 API calls 67937 7efed3 CreateDirectoryA 67925->67937 67962 7face0 2 API calls 67926->67962 67938 7ebc12 67927->67938 67939 8c4120 5 API calls 67928->67939 67946 8c3b20 7 API calls 67929->67946 67929->67958 67941 7efb04 67930->67941 67931 7fab20 2 API calls 67942 7edf1e CreateDirectoryA 67931->67942 67943 7ef7d6 67932->67943 69217 7e2fe0 RtlAllocateHeap RtlFreeHeap std::ios_base::_Ios_base_dtor std::_Throw_Cpp_error 67932->69217 67944 7edc85 67933->67944 67947 7f21f4 67934->67947 67948 7ed464 67935->67948 67949 7ebeae 67936->67949 67950 7efefb 67937->67950 68078 7f0e44 67937->68078 67951 8bd2b0 81 API calls 67938->67951 67952 7ec811 67939->67952 67940->67929 67976 8c4050 4 API calls 67941->67976 67953 7edf46 67942->67953 68111 7ee629 67942->68111 67956 8c4050 4 API calls 67943->67956 67980 7face0 2 API calls 67944->67980 67957 7ed8c9 67945->67957 67946->67958 67959 7f2233 67947->67959 67969 7f63b0 std::_Throw_Cpp_error 2 API calls 67947->67969 67984 7e2cf0 std::_Throw_Cpp_error 2 API calls 67948->67984 67960 7ebf57 67949->67960 67970 7fab20 2 API calls 67949->67970 67961 7e2cf0 std::_Throw_Cpp_error 2 API calls 67950->67961 67951->67908 67964 7ec940 67952->67964 67975 7fab20 2 API calls 67952->67975 67954 7fab20 2 API calls 67966 7f0ef4 CreateDirectoryA 67954->67966 67968 7ef80d 67956->67968 67993 7e2cf0 std::_Throw_Cpp_error 2 API calls 67957->67993 67958->67854 67972 8c3b20 7 API calls 67959->67972 67959->67985 67963 8c3b20 7 API calls 67960->67963 67960->67974 67971 7eff97 67961->67971 67973 7efda0 67962->67973 67963->67974 67981 7e2cf0 std::_Throw_Cpp_error 2 API calls 67964->67981 67978 7f0f1c 67966->67978 68122 7f1833 67966->68122 67982 7ef84c 67968->67982 67992 7f63b0 std::_Throw_Cpp_error 2 API calls 67968->67992 67983 7f220c 67969->67983 67970->67960 68006 7face0 2 API calls 67971->68006 67972->67985 68008 8c4050 4 API calls 67973->68008 67974->67870 67974->67877 67975->67964 67987 7efb2f 67976->67987 67988 7e2cf0 std::_Throw_Cpp_error 2 API calls 67978->67988 67991 7ecb30 67981->67991 67996 8c3b20 7 API calls 67982->67996 67982->68005 67994 7f63b0 std::_Throw_Cpp_error 2 API calls 67983->67994 67995 7ed498 67984->67995 67985->67835 67985->67862 67986 7fab20 2 API calls 67997 7f18e6 CreateDirectoryA 67986->67997 67998 7efb6e 67987->67998 68012 7f63b0 std::_Throw_Cpp_error 2 API calls 67987->68012 67999 7f0fb9 67988->67999 68025 7face0 2 API calls 67991->68025 68001 7ef825 67992->68001 68002 7ed8fd 67993->68002 68003 7f2224 67994->68003 68004 8c4120 5 API calls 67995->68004 67996->68005 68009 7f190e 67997->68009 68010 7f1d01 67997->68010 68016 8c3b20 7 API calls 67998->68016 67998->68027 68034 7face0 2 API calls 67999->68034 68015 7f63b0 std::_Throw_Cpp_error 2 API calls 68001->68015 68017 8c4120 5 API calls 68002->68017 68018 8bd2b0 81 API calls 68003->68018 68019 7ed4a5 68004->68019 68005->67880 68007 7f0040 68006->68007 68041 8c4050 4 API calls 68007->68041 68020 7efdcb 68008->68020 68010->68097 68021 7efb47 68012->68021 68026 7ef83d 68015->68026 68016->68027 68018->67959 68029 7ed5d4 68019->68029 68040 7fab20 2 API calls 68019->68040 68031 7efe0a 68020->68031 68044 7f63b0 std::_Throw_Cpp_error 2 API calls 68020->68044 68033 7f63b0 std::_Throw_Cpp_error 2 API calls 68021->68033 68038 8bd2b0 81 API calls 68026->68038 68027->67897 68029->68043 68046 8c3b20 7 API calls 68031->68046 68031->68055 68047 7efb5f 68033->68047 68038->67982 68040->68029 68051 7f006b 68041->68051 68043->67886 68053 7efde3 68044->68053 68046->68055 68056 8bd2b0 81 API calls 68047->68056 68052->67906 68061 7f63b0 std::_Throw_Cpp_error 2 API calls 68053->68061 68055->67925 68056->67998 68077->67931 68078->67954 68097->67835 68097->67839 68102->67837 68102->68097 68122->67986 68236 8bc438 __fread_nolock 68235->68236 68236->68236 68237 7e3040 std::_Throw_Cpp_error 2 API calls 68236->68237 68238 8bc51c 68237->68238 68239 7ffbf0 2 API calls 68238->68239 68240 8bc54d 68239->68240 68241 8bc5c0 std::ios_base::_Ios_base_dtor 68240->68241 68243 8bd289 68240->68243 68242 8c4050 4 API calls 68241->68242 68244 8bc5f5 68242->68244 68245 818c60 std::_Throw_Cpp_error 2 API calls 68243->68245 68247 7fab20 2 API calls 68244->68247 68299 8bd1b0 68244->68299 68245->68299 68246 8bd24b std::ios_base::_Ios_base_dtor 68246->67803 68248 8bc698 68247->68248 68250 818c60 std::_Throw_Cpp_error 2 API calls 68251 8bd2a2 68250->68251 68299->68246 68299->68250 68308 8b49e6 __fread_nolock 68307->68308 68309 8b4a04 SHGetFolderPathA 68308->68309 69304 8159a0 68309->69304 68312 8b4b78 68312->68312 68313 7e3040 std::_Throw_Cpp_error 2 API calls 68312->68313 68314 8b4b94 68313->68314 68952->67815 68954 7fab20 2 API calls 68953->68954 68955 8bd40f 68954->68955 68956 8bda6c 68955->68956 69000 8bd44f std::ios_base::_Ios_base_dtor std::locale::_Locimp::_Locimp 68955->69000 68957 818c60 std::_Throw_Cpp_error 2 API calls 68956->68957 68961 8bd92b std::ios_base::_Ios_base_dtor 68957->68961 68958 818c60 std::_Throw_Cpp_error 2 API calls 68959 8bda7b 68958->68959 68960 7fab20 2 API calls 68959->68960 68963 8bdbea 68960->68963 68961->68958 68964 8bda20 std::ios_base::_Ios_base_dtor 68961->68964 68962 7f8f00 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 68962->69000 68965 819810 2 API calls 68963->68965 68964->67815 68969 8bdc98 68965->68969 68966 8c18ce std::ios_base::_Ios_base_dtor 68967 7f63b0 std::_Throw_Cpp_error 2 API calls 68966->68967 68968 8c1958 68967->68968 68969->68966 68971 7e3350 4 API calls 68969->68971 68974 8bdd74 68971->68974 68972 7fe8a0 RtlAllocateHeap RtlFreeHeap 68972->69000 68976 7e3350 4 API calls 68974->68976 68988 8c4050 4 API calls 68988->69000 69000->68961 69000->68962 69000->68972 69000->68988 69001 8bd2b0 64 API calls 69000->69001 69002 7e32d0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69000->69002 69001->69000 69002->69000 69187->67814 69217->67943 69305 8159b7 SHGetFolderPathA 69304->69305 69305->68312 69485 841c30 69486 841c80 69485->69486 69487 7fab20 2 API calls 69486->69487 69488 841d54 69487->69488 69489 8c4050 4 API calls 69488->69489 69490 841d7a 69489->69490 69491 8c3fc0 4 API calls 69490->69491 69492 841d9d 69490->69492 69491->69492 69493 7fb260 2 API calls 69492->69493 69495 8427de 69492->69495 69496 8427b0 69492->69496 69509 841dcd 69493->69509 69494 8c3b20 7 API calls 69494->69495 69497 7fab20 2 API calls 69495->69497 69496->69494 69496->69495 69498 8428c3 69497->69498 69499 8c4050 4 API calls 69498->69499 69500 8428e9 69499->69500 69501 8c3fc0 4 API calls 69500->69501 69502 84290c 69500->69502 69501->69502 69503 7fb260 2 API calls 69502->69503 69506 843349 69502->69506 69507 84331f 69502->69507 69541 84293c 69503->69541 69504 8c3b20 7 API calls 69504->69506 69505 7f30f0 RtlAllocateHeap RtlFreeHeap 69505->69509 69507->69504 69507->69506 69508 7fb260 2 API calls 69508->69509 69509->69496 69509->69505 69509->69508 69510 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69509->69510 69513 7f6240 RtlAllocateHeap RtlFreeHeap 69509->69513 69515 7e2cf0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69509->69515 69517 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 69509->69517 69518 819810 2 API calls 69509->69518 69519 7fac50 RtlAllocateHeap RtlFreeHeap 69509->69519 69520 8c3fc0 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap CreateDirectoryA 69509->69520 69521 7fae20 2 API calls 69509->69521 69523 7fabb0 2 API calls 69509->69523 69525 81d098 5 API calls 69509->69525 69527 7f3200 RtlAllocateHeap RtlFreeHeap 69509->69527 69533 7faf80 RtlAllocateHeap RtlFreeHeap 69509->69533 69537 7fb400 RtlAllocateHeap RtlFreeHeap 69509->69537 69538 7e3350 4 API calls 69509->69538 69543 7f6210 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69509->69543 69510->69509 69511 7f3200 RtlAllocateHeap RtlFreeHeap 69511->69541 69512 7fb260 2 API calls 69512->69541 69513->69509 69515->69509 69516 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69516->69541 69517->69509 69518->69509 69519->69509 69520->69509 69521->69509 69522 7fac50 RtlAllocateHeap RtlFreeHeap 69522->69541 69523->69509 69525->69509 69526 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 69526->69541 69527->69509 69528 819810 2 API calls 69528->69541 69529 8c3fc0 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap CreateDirectoryA 69529->69541 69530 7fae20 2 API calls 69530->69541 69531 7fabb0 2 API calls 69531->69541 69532 7f6240 RtlAllocateHeap RtlFreeHeap 69532->69541 69533->69509 69534 7f30f0 RtlAllocateHeap RtlFreeHeap 69534->69541 69535 81d098 5 API calls 69535->69541 69536 7e2cf0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69536->69541 69537->69509 69538->69509 69539 7faf80 RtlAllocateHeap RtlFreeHeap 69539->69541 69540 7e3350 4 API calls 69540->69541 69541->69507 69541->69511 69541->69512 69541->69516 69541->69522 69541->69526 69541->69528 69541->69529 69541->69530 69541->69531 69541->69532 69541->69534 69541->69535 69541->69536 69541->69539 69541->69540 69542 7fb400 RtlAllocateHeap RtlFreeHeap 69541->69542 69544 7f6210 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69541->69544 69542->69541 69543->69509 69544->69541 69545 843650 69578 843699 69545->69578 69546 8436b1 69548 7fab20 2 API calls 69546->69548 69547 7fab20 2 API calls 69547->69578 69549 845a89 69548->69549 69551 8c4050 4 API calls 69549->69551 69550 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 69550->69578 69552 845aaf 69551->69552 69553 845ab3 CreateDirectoryA 69552->69553 69555 845ade 69552->69555 69553->69555 69556 8465f7 69553->69556 69554 846849 69558 7f85d0 2 API calls 69554->69558 69557 7fb260 2 API calls 69555->69557 69562 8465cd 69555->69562 69556->69554 69561 7fab20 2 API calls 69556->69561 69576 845b06 69557->69576 69560 846867 69558->69560 69559 8c3b20 7 API calls 69559->69556 69564 846742 69561->69564 69562->69556 69562->69559 69563 7fb260 RtlAllocateHeap RtlFreeHeap 69563->69578 69566 819810 2 API calls 69564->69566 69565 8c3b20 7 API calls 69565->69578 69570 84676a 69566->69570 69567 846843 69569 81d098 5 API calls 69567->69569 69568 7f30f0 RtlAllocateHeap RtlFreeHeap 69568->69578 69569->69554 69570->69554 69570->69567 69572 7e3350 4 API calls 69570->69572 69571 7f3200 RtlAllocateHeap RtlFreeHeap 69571->69576 69572->69570 69573 7f3200 RtlAllocateHeap RtlFreeHeap 69573->69578 69574 7fb260 2 API calls 69574->69576 69575 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69575->69578 69576->69562 69576->69571 69576->69574 69577 7f63b0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69576->69577 69582 8c4050 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap GetFileAttributesA 69576->69582 69583 7e2cf0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69576->69583 69584 7fac50 RtlAllocateHeap RtlFreeHeap 69576->69584 69586 819810 2 API calls 69576->69586 69587 7fae20 2 API calls 69576->69587 69590 7fabb0 2 API calls 69576->69590 69592 7f6240 RtlAllocateHeap RtlFreeHeap 69576->69592 69593 7f30f0 RtlAllocateHeap RtlFreeHeap 69576->69593 69595 81d098 5 API calls 69576->69595 69599 7faf80 RtlAllocateHeap RtlFreeHeap 69576->69599 69600 7e3350 4 API calls 69576->69600 69601 7fb400 RtlAllocateHeap RtlFreeHeap 69576->69601 69607 7f6210 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69576->69607 69608 7f5310 FindFirstFileExW RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69576->69608 69577->69576 69578->69546 69578->69547 69578->69550 69578->69563 69578->69565 69578->69568 69578->69573 69578->69575 69579 7f6240 RtlAllocateHeap RtlFreeHeap 69578->69579 69580 7fac50 RtlAllocateHeap RtlFreeHeap 69578->69580 69585 7f6210 RtlAllocateHeap RtlFreeHeap 69578->69585 69588 7fae20 RtlAllocateHeap RtlFreeHeap 69578->69588 69589 819810 RtlAllocateHeap RtlFreeHeap 69578->69589 69591 8c3fc0 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap CreateDirectoryA 69578->69591 69594 7fabb0 RtlAllocateHeap RtlFreeHeap 69578->69594 69596 81d098 SetFilePointerEx FindCloseChangeNotification WriteFile RtlAllocateHeap RtlFreeHeap 69578->69596 69597 7e2cf0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69578->69597 69598 7faf80 RtlAllocateHeap RtlFreeHeap 69578->69598 69603 7fb400 RtlAllocateHeap RtlFreeHeap 69578->69603 69604 7fbae0 RtlAllocateHeap RtlFreeHeap 69578->69604 69605 7fb1e0 RtlAllocateHeap RtlFreeHeap 69578->69605 69606 7e3350 SetFilePointerEx WriteFile RtlAllocateHeap RtlFreeHeap 69578->69606 69579->69578 69580->69578 69582->69576 69583->69576 69584->69576 69585->69578 69586->69576 69587->69576 69588->69578 69589->69578 69590->69576 69591->69578 69592->69576 69593->69576 69594->69578 69595->69576 69596->69578 69597->69578 69598->69578 69599->69576 69600->69576 69601->69576 69603->69578 69604->69578 69605->69578 69606->69578 69607->69576 69608->69576 69609 8a4eb0 69610 8a527c 69609->69610 69628 8a4eee std::ios_base::_Ios_base_dtor __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 69609->69628 69611 8a4f37 setsockopt recv 69611->69628 69613 8a5267 Sleep 69613->69610 69613->69628 69615 8a51c5 recv 69616 8a525f Sleep 69615->69616 69616->69613 69617 7f8dc0 2 API calls 69618 8a4fdd recv 69617->69618 69619 8a4ffe recv 69618->69619 69618->69628 69619->69628 69620 8a5291 69624 818c60 std::_Throw_Cpp_error 2 API calls 69620->69624 69621 7f63b0 std::_Throw_Cpp_error 2 API calls 69621->69628 69622 7e9280 3 API calls 69622->69628 69623 7f8dc0 2 API calls 69625 8a5086 setsockopt recv 69623->69625 69626 8a5296 69624->69626 69625->69628 69628->69610 69628->69611 69628->69613 69628->69615 69628->69616 69628->69617 69628->69620 69628->69621 69628->69622 69628->69623 69628->69625 69629 8a5940 WSAStartup 69628->69629 69635 8a52a0 69628->69635 69691 813059 69628->69691 69630 8a5978 69629->69630 69631 8a5a36 69629->69631 69630->69631 69632 8a5a04 socket 69630->69632 69631->69628 69632->69631 69633 8a5a1a connect 69632->69633 69633->69631 69634 8a5a2c closesocket 69633->69634 69634->69631 69634->69632 69636 8a52ee 69635->69636 69637 8a531c 69635->69637 69638 7e2cf0 std::_Throw_Cpp_error 2 API calls 69636->69638 69639 8a533e 69637->69639 69640 8a5324 69637->69640 69641 8a5300 69638->69641 69643 8a5360 69639->69643 69644 8a5346 69639->69644 69694 7f6290 RtlAllocateHeap RtlFreeHeap 69640->69694 69648 7e9280 3 API calls 69641->69648 69646 8a5368 69643->69646 69647 8a5385 69643->69647 69695 7f6290 RtlAllocateHeap RtlFreeHeap 69644->69695 69689 8a5314 69646->69689 69696 7f6290 RtlAllocateHeap RtlFreeHeap 69646->69696 69649 8a53ab 69647->69649 69650 8a538d 69647->69650 69648->69689 69653 8a53cb 69649->69653 69654 8a5670 69649->69654 69649->69689 69697 8212a7 RtlAllocateHeap RtlFreeHeap __fread_nolock 69650->69697 69698 7e5400 GetSystemTimePreciseAsFileTime RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69653->69698 69655 8a56cb 69654->69655 69656 8a5678 69654->69656 69659 8a56d3 69655->69659 69660 8a5726 69655->69660 69658 7fb430 2 API calls 69656->69658 69658->69689 69663 7fb430 2 API calls 69659->69663 69661 8a572e 69660->69661 69662 8a5781 69660->69662 69664 7fb430 2 API calls 69661->69664 69665 8a5789 69662->69665 69666 8a57dc 69662->69666 69663->69689 69664->69689 69668 7fb430 2 API calls 69665->69668 69669 8a5834 69666->69669 69670 8a57e4 69666->69670 69667 7e2cf0 std::_Throw_Cpp_error 2 API calls 69674 8a53f0 69667->69674 69668->69689 69669->69689 69702 838af0 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error std::locale::_Locimp::_Locimp 69669->69702 69671 7fb430 2 API calls 69670->69671 69671->69689 69673 7face0 2 API calls 69673->69674 69674->69667 69674->69673 69675 8a54bb 69674->69675 69674->69689 69699 7e2d30 RtlAllocateHeap RtlFreeHeap std::_Throw_Cpp_error 69675->69699 69677 8a54df 69700 8b3670 3 API calls 5 library calls 69677->69700 69679 8a54f0 69680 8a5562 69679->69680 69681 8a5595 69679->69681 69682 7f63b0 std::_Throw_Cpp_error 2 API calls 69680->69682 69683 819810 2 API calls 69681->69683 69684 8a557e 69682->69684 69685 8a55f7 69683->69685 69701 8ac630 RtlAllocateHeap RtlFreeHeap std::ios_base::_Ios_base_dtor __fread_nolock std::_Throw_Cpp_error 69684->69701 69687 821618 4 API calls 69685->69687 69685->69689 69688 8a5623 69687->69688 69690 81d098 5 API calls 69688->69690 69689->69628 69690->69689 69703 81360d 69691->69703 69694->69689 69695->69689 69696->69689 69697->69689 69698->69674 69699->69677 69700->69679 69701->69689 69702->69689 69704 813067 69703->69704 69705 81363d GetSystemTimePreciseAsFileTime 69703->69705 69704->69628 69705->69704
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileFindFirst
                                                                                                                                                                      • String ID: #iR@$#iR@$#iR@$#iR@$&\U$&I$&I$&I$&I$0aVM$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$FoST$GG)$HFd$HWg$KGa$MXg$MXg$P081$P081$P081$P081$Q z$Q z$Q z$Q z$UP~$UWy$UWy$UYw$UYw$V!T$WGf$WS{$WS{$XFv$XFv$X[y$YX~$\oST$^W`$^W`$^W`$_C|$cannot use operator[] with a string argument with $cannot use push_back() with $l$r,$l$r-$v}{$v}{$v}{$v}{$wWs$wWs$wWs$wWs$x<$x<$x<$x<
                                                                                                                                                                      • API String ID: 1974802433-3165033430
                                                                                                                                                                      • Opcode ID: 0969db3039299a5d705aea9891ff9b66bc0fa05ba13665e3e3d3a2eb38079180
                                                                                                                                                                      • Instruction ID: 46ef1a473d79fb2abca86570b9f8bb15d4757decf80e910a5a686bc1e6a0fb26
                                                                                                                                                                      • Opcode Fuzzy Hash: 0969db3039299a5d705aea9891ff9b66bc0fa05ba13665e3e3d3a2eb38079180
                                                                                                                                                                      • Instruction Fuzzy Hash: 67B410B0D052A9CBDB25CF68C994BEEBBB1BF48304F1481D9D449A7282DB346B85CF51
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AttributesFile
                                                                                                                                                                      • String ID: #iR@$3gX$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$KGa$KGa$P: 1$P?2'$PM!$PM&$SGf$VoST$VoST$VoST$VoST$VoST$VoST$WS{$WS{$WS{$WS{$WS{$WS{$XFf$XFf$^W`$^W`$cannot use operator[] with a string argument with $cannot use push_back() with $gQ`$gQ`$gQ`$gQ`$gQ`$gQ`$gQk$gQk$gQk$gQk$gQk$gQk$g[u$k,6&$k@z$*ct$*ct$*ct$x<
                                                                                                                                                                      • API String ID: 3188754299-1554121391
                                                                                                                                                                      • Opcode ID: c5f73c54136242247460ad87c7b013862a55039b487c3ffb053002571195a9c8
                                                                                                                                                                      • Instruction ID: 3853bd039c5862363c513ccf2223006bdc7b658122fe9ff1e8b6f0fc6f863584
                                                                                                                                                                      • Opcode Fuzzy Hash: c5f73c54136242247460ad87c7b013862a55039b487c3ffb053002571195a9c8
                                                                                                                                                                      • Instruction Fuzzy Hash: 1793DCB4D056A88BDB65CF18C990BEDBBB1BF48304F1081DAE94DA7241DB346B85CF46
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 008C4050: GetFileAttributesA.KERNELBASE(?,?,?,00840224), ref: 008C40AC
                                                                                                                                                                      • SHGetFolderPathA.SHELL32(00000000,00000000,00000000,00000000,?), ref: 008602CB
                                                                                                                                                                      • SHGetFolderPathA.SHELL32(00000000,00000005,00000000,00000000,?,?,?,?,?,?,?,?), ref: 008605C7
                                                                                                                                                                      • SHGetFolderPathA.SHELL32(00000000,00000028,00000000,00000000,?), ref: 008608C5
                                                                                                                                                                      • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 00860F53
                                                                                                                                                                      • SHGetFolderPathA.SHELL32(00000000,00000008,00000000,00000000,?), ref: 00861257
                                                                                                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 00862001
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FolderPath$AttributesConcurrency::cancel_current_taskFile
                                                                                                                                                                      • String ID: 4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$P!T$Q086$X0 $`<vT$`<vT$cannot compare iterators of different containers$cannot get value$type must be boolean, but is $type must be string, but is
                                                                                                                                                                      • API String ID: 3713541779-3377599526
                                                                                                                                                                      • Opcode ID: 372fbba53ff11e894401527d9e52d7cd3ce58c4970ee62a55ac9d090eec853d3
                                                                                                                                                                      • Instruction ID: 0e0325d2a9c9d0c52fc13b75b42ea48cd9cc75bb3d9291f83cf090e33178abdb
                                                                                                                                                                      • Opcode Fuzzy Hash: 372fbba53ff11e894401527d9e52d7cd3ce58c4970ee62a55ac9d090eec853d3
                                                                                                                                                                      • Instruction Fuzzy Hash: B94301B0D05268CBDB25CF24C894BEEBBB5BF48304F1482D9D949A7282DB356B85CF51
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EBA08
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EBAD2
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EC575
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007ED6F8
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EDF3C
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EFC55
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EFEF1
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007F0F12
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007F1904
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007F1E6E
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007F1FBE
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EF933
                                                                                                                                                                        • Part of subcall function 008C3B20: RemoveDirectoryA.KERNELBASE(?), ref: 008C3EBB
                                                                                                                                                                        • Part of subcall function 008C3B20: std::_Throw_Cpp_error.LIBCPMT ref: 008C3F97
                                                                                                                                                                        • Part of subcall function 008C3B20: std::_Throw_Cpp_error.LIBCPMT ref: 008C3FA8
                                                                                                                                                                        • Part of subcall function 008C4050: std::_Throw_Cpp_error.LIBCPMT ref: 008C40FF
                                                                                                                                                                        • Part of subcall function 008C4050: std::_Throw_Cpp_error.LIBCPMT ref: 008C4110
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EE6FA
                                                                                                                                                                        • Part of subcall function 008A33B0: FindFirstFileA.KERNELBASE(00000000,?,00000000), ref: 008A34EF
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EDAD7
                                                                                                                                                                        • Part of subcall function 008C3B20: FindNextFileA.KERNELBASE(?,00000010), ref: 008C3E68
                                                                                                                                                                        • Part of subcall function 008C3B20: SetFileAttributesA.KERNELBASE(?,00000080), ref: 008C3E9D
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007ED29A
                                                                                                                                                                        • Part of subcall function 008C3B20: FindFirstFileA.KERNELBASE(00000000,?,009664F8,?,?,?,\*.*,00000004), ref: 008C3C95
                                                                                                                                                                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 007EBB07
                                                                                                                                                                        • Part of subcall function 008C4050: GetFileAttributesA.KERNELBASE(?,?,?,00840224), ref: 008C40AC
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EBD08
                                                                                                                                                                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 007EBD37
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EC0CC
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EC196
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Directory$Create$File$Cpp_errorThrow_std::_$Find$AttributesFirstFolderPath$NextRemove
                                                                                                                                                                      • String ID: .eN$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$<`L
                                                                                                                                                                      • API String ID: 928721092-464024716
                                                                                                                                                                      • Opcode ID: 841a720ee7043de612e57055b18096d914c30f057173718006a4f1d9d203b9a1
                                                                                                                                                                      • Instruction ID: b9ae7635d6359a199b60bb2cdc10e760d63fa39c6c91f33a6c5bfa960192b3da
                                                                                                                                                                      • Opcode Fuzzy Hash: 841a720ee7043de612e57055b18096d914c30f057173718006a4f1d9d203b9a1
                                                                                                                                                                      • Instruction Fuzzy Hash: D3F3DCB4D0529DCBDB25CF98C991AEEBBB1BF08300F104199E949B7341DB346A85CF66
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 008C4050: GetFileAttributesA.KERNELBASE(?,?,?,00840224), ref: 008C40AC
                                                                                                                                                                        • Part of subcall function 008C4050: std::_Throw_Cpp_error.LIBCPMT ref: 008C40FF
                                                                                                                                                                        • Part of subcall function 008C4050: std::_Throw_Cpp_error.LIBCPMT ref: 008C4110
                                                                                                                                                                      • CredEnumerateA.ADVAPI32(00000000,00000001,00000000,?,?,?,?,?,?,?,?,?,00000004), ref: 0087351D
                                                                                                                                                                      • LocalFree.KERNELBASE(00000000,?,?,?,00000004), ref: 00873DF7
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Cpp_errorThrow_std::_$AttributesCredEnumerateFileFreeLocal
                                                                                                                                                                      • String ID: 4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$KGa$WS{$WS{$cannot use operator[] with a string argument with $gUb$gUb
                                                                                                                                                                      • API String ID: 1490588210-977541193
                                                                                                                                                                      • Opcode ID: e09fde5d4b8087c3cd1bf5a3629ecfdf3393a54d436aebbaf2eac95c86d0b0fb
                                                                                                                                                                      • Instruction ID: 90e7e97dc918eafa61dc9483db39f9cd49de419abdd96a56fc1c4f3f5d95056d
                                                                                                                                                                      • Opcode Fuzzy Hash: e09fde5d4b8087c3cd1bf5a3629ecfdf3393a54d436aebbaf2eac95c86d0b0fb
                                                                                                                                                                      • Instruction Fuzzy Hash: 5333DDB4D052A9CBDB25CF68C894BEDBBB1BF08304F1081D9E949A7241DB349B85CF56
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: #iR@$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$HWg$K@z$MXg$UYw$X[y$_Ys$cannot use operator[] with a string argument with $cannot use push_back() with $g[}$k@z$nI?/$x<
                                                                                                                                                                      • API String ID: 0-1367517158
                                                                                                                                                                      • Opcode ID: 232e0996b2b4813b419db8b04c2be50b96fe0e865e56c0b9a6f0ac989de86f4d
                                                                                                                                                                      • Instruction ID: 423694b0cf271f3b6995055706865f3224db78feff5c3e5c0229167e8916534e
                                                                                                                                                                      • Opcode Fuzzy Hash: 232e0996b2b4813b419db8b04c2be50b96fe0e865e56c0b9a6f0ac989de86f4d
                                                                                                                                                                      • Instruction Fuzzy Hash: A64311B0D052A88BDB25CF28C894BEEBBB5BF49304F1481D9E44DA7242DB356B85CF51
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: 1.9$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$6hR$>oST$POpq$combo$z,^
                                                                                                                                                                      • API String ID: 0-1089530112
                                                                                                                                                                      • Opcode ID: 89fb70d7f99bf4e6465c34f09e66c1f6b1b8c9294035f986bc6733633c3fca23
                                                                                                                                                                      • Instruction ID: 22fa5904ef1de085b165b0507b6688b6f94495c57c351815c8b69f914f5b02bd
                                                                                                                                                                      • Opcode Fuzzy Hash: 89fb70d7f99bf4e6465c34f09e66c1f6b1b8c9294035f986bc6733633c3fca23
                                                                                                                                                                      • Instruction Fuzzy Hash: B1A3CDB4D05259CFDB25CF98C981AEEBBB1BF48300F244199E909B7341DB346A85CFA5
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: #iR@$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$9lX$Gr}$K@z$]Xw$]Xw$_C|$cannot use operator[] with a string argument with $cannot use push_back() with $k@z$x<
                                                                                                                                                                      • API String ID: 0-653804416
                                                                                                                                                                      • Opcode ID: 5849815e8d641ecffeb23ace3da55649725e95cd99113c53d1e074a2681361f8
                                                                                                                                                                      • Instruction ID: 3033867ead725c869d4f48a9aa1fcc1977a118193f0505befaddbb4161f9b9cf
                                                                                                                                                                      • Opcode Fuzzy Hash: 5849815e8d641ecffeb23ace3da55649725e95cd99113c53d1e074a2681361f8
                                                                                                                                                                      • Instruction Fuzzy Hash: B42321B0D052688BDB25CF28C894BEDBBB5BF49304F1082D9E54DA7282DB346B85CF55
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,009380C7,000000FF), ref: 008B4A1C
                                                                                                                                                                      • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 008B4A43
                                                                                                                                                                        • Part of subcall function 008C4050: GetFileAttributesA.KERNELBASE(?,?,?,00840224), ref: 008C40AC
                                                                                                                                                                        • Part of subcall function 008C4050: std::_Throw_Cpp_error.LIBCPMT ref: 008C40FF
                                                                                                                                                                        • Part of subcall function 008C4050: std::_Throw_Cpp_error.LIBCPMT ref: 008C4110
                                                                                                                                                                        • Part of subcall function 008C3B20: FindFirstFileA.KERNELBASE(00000000,?,009664F8,?,?,?,\*.*,00000004), ref: 008C3C95
                                                                                                                                                                        • Part of subcall function 008C3B20: FindNextFileA.KERNELBASE(?,00000010), ref: 008C3E68
                                                                                                                                                                        • Part of subcall function 008C3B20: SetFileAttributesA.KERNELBASE(?,00000080), ref: 008C3E9D
                                                                                                                                                                        • Part of subcall function 008C3B20: RemoveDirectoryA.KERNELBASE(?), ref: 008C3EBB
                                                                                                                                                                        • Part of subcall function 008C3B20: std::_Throw_Cpp_error.LIBCPMT ref: 008C3F97
                                                                                                                                                                        • Part of subcall function 008C3B20: std::_Throw_Cpp_error.LIBCPMT ref: 008C3FA8
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Cpp_errorFileThrow_std::_$AttributesFindFolderPath$DirectoryFirstNextRemove
                                                                                                                                                                      • String ID: 4oST$4oST$=lY
                                                                                                                                                                      • API String ID: 3204276717-1766083014
                                                                                                                                                                      • Opcode ID: 8fa85aab7f1864777d1fbfaaf999028b5318c59b69ae092dc9b1b45f61f5853f
                                                                                                                                                                      • Instruction ID: 72f8a7fec88ba1d8ad52a38b1bc48c9b68b70a70c7334d10355bf453ea7b8836
                                                                                                                                                                      • Opcode Fuzzy Hash: 8fa85aab7f1864777d1fbfaaf999028b5318c59b69ae092dc9b1b45f61f5853f
                                                                                                                                                                      • Instruction Fuzzy Hash: F0F301B4D05299CBDB15CF98C991AEEBBB1BF08300F244199D949B7341DB306B85CFA6
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 15261 8a4130-8a418c 15262 8a4192-8a41a1 call 812b89 15261->15262 15263 8a43b4-8a43c8 call 8139a3 15261->15263 15268 8a43ff-8a4401 call 812524 15262->15268 15269 8a41a7-8a41b1 15262->15269 15263->15262 15270 8a43ce-8a43fa call 7e8710 call 8138ce call 813952 15263->15270 15272 8a4406-8a455d call 812524 call 7fae80 call 7f63b0 call 8c4870 DeleteFileA call 8159a0 call 815260 call 8159a0 call 815260 call 8159a0 call 815260 15268->15272 15269->15272 15273 8a41b7-8a42af call 8c77d0 call 7fab20 call 7fad80 call 7e9280 call 7e2df0 15269->15273 15270->15262 15331 8a455f-8a4566 15272->15331 15332 8a4570-8a4575 call 7f8dc0 15272->15332 15301 8a4365-8a43b3 call 7f63b0 call 812b9a call 7e2df0 * 2 15273->15301 15302 8a42b5-8a42bc 15273->15302 15302->15301 15305 8a42c2-8a42ce GetPEB 15302->15305 15308 8a42d0-8a42e4 15305->15308 15311 8a42e6-8a42eb 15308->15311 15312 8a4337-8a4339 15308->15312 15311->15312 15315 8a42ed-8a42f3 15311->15315 15312->15308 15318 8a42f5-8a430a 15315->15318 15321 8a430c 15318->15321 15322 8a432d-8a4335 15318->15322 15325 8a4310-8a4323 15321->15325 15322->15312 15322->15318 15325->15325 15328 8a4325-8a432b 15325->15328 15328->15322 15330 8a433b-8a435f 15328->15330 15330->15301 15330->15305 15334 8a456a-8a456e 15331->15334 15335 8a4568 15331->15335 15337 8a457a-8a4581 15332->15337 15334->15337 15335->15334 15338 8a4583 15337->15338 15339 8a4585-8a4599 15337->15339 15338->15339 15340 8a459b 15339->15340 15341 8a459d-8a45b4 15339->15341 15340->15341 15342 8a45b8-8a45d4 15341->15342 15343 8a45b6 15341->15343 15344 8a45d8-8a45df 15342->15344 15345 8a45d6 15342->15345 15343->15342 15346 8a45e3-8a469f call 815260 call 8c77d0 15344->15346 15347 8a45e1 15344->15347 15345->15344 15352 8a46a2-8a46a7 15346->15352 15347->15346 15352->15352 15353 8a46a9-8a46f7 call 7e3040 call 7e9280 call 8c77d0 15352->15353 15360 8a46f9 15353->15360 15361 8a46fd-8a47c3 call 7e8f20 call 8c77d0 15353->15361 15360->15361 15366 8a47c6-8a47cb 15361->15366 15366->15366 15367 8a47cd-8a47e8 call 7e3040 call 7e9280 15366->15367 15371 8a47ed-8a47fc 15367->15371 15372 8a47fe-8a4805 15371->15372 15373 8a481d-8a4826 15371->15373 15372->15373 15374 8a4807-8a4814 15372->15374 15375 8a4828-8a482f 15373->15375 15376 8a4846-8a4873 call 7e2df0 * 2 15373->15376 15374->15373 15382 8a4816-8a4818 15374->15382 15375->15376 15378 8a4831-8a483d 15375->15378 15378->15376 15385 8a483f-8a4841 15378->15385 15382->15373 15385->15376
                                                                                                                                                                      APIs
                                                                                                                                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 008A4401
                                                                                                                                                                        • Part of subcall function 00812524: __EH_prolog3.LIBCMT ref: 00812560
                                                                                                                                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 008A4412
                                                                                                                                                                        • Part of subcall function 008C4870: __fread_nolock.LIBCMT ref: 008C49B9
                                                                                                                                                                      • DeleteFileA.KERNELBASE(?), ref: 008A449B
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Cpp_errorThrow_std::_$DeleteFileH_prolog3__fread_nolock
                                                                                                                                                                      • String ID: 131$4oST$4oST$combo
                                                                                                                                                                      • API String ID: 3880692912-4163733096
                                                                                                                                                                      • Opcode ID: 7e46f1213aaadb24dec4fbc1ef4e54b9c01bf7c86489de4ffaab7593df612661
                                                                                                                                                                      • Instruction ID: b52f2d5493351dd96c3734508b787708a516538db8f2512c554b672cee387931
                                                                                                                                                                      • Opcode Fuzzy Hash: 7e46f1213aaadb24dec4fbc1ef4e54b9c01bf7c86489de4ffaab7593df612661
                                                                                                                                                                      • Instruction Fuzzy Hash: 4F329CB0D04248CFDF05CFA8C845BAEBBB1FF89304F244159E905AB382D775AA45DB92
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 15386 8c3b20-8c3b73 call 812b89 15389 8c3b79-8c3b83 15386->15389 15390 8c3f95-8c3f97 call 812524 15386->15390 15392 8c3f9c-8c3fa8 call 812524 15389->15392 15393 8c3b89-8c3bd2 15389->15393 15390->15392 15395 8c3fad call 7e2c60 15392->15395 15393->15395 15396 8c3bd8-8c3bde 15393->15396 15401 8c3fb2 call 818c60 15395->15401 15398 8c3be0 15396->15398 15399 8c3be2-8c3c04 call 7fe8a0 15396->15399 15398->15399 15404 8c3c06-8c3c12 15399->15404 15405 8c3c32-8c3ca1 call 7e2df0 FindFirstFileA 15399->15405 15406 8c3fb7-8c3fbf call 818c60 15401->15406 15407 8c3c28-8c3c2f call 8138e3 15404->15407 15408 8c3c14-8c3c22 15404->15408 15415 8c3eda 15405->15415 15416 8c3ca7 15405->15416 15407->15405 15408->15401 15408->15407 15417 8c3edc-8c3ee6 15415->15417 15418 8c3cb0-8c3cb9 15416->15418 15419 8c3ee8-8c3ef4 15417->15419 15420 8c3f14-8c3f30 15417->15420 15421 8c3cc0-8c3cc5 15418->15421 15422 8c3f0a-8c3f11 call 8138e3 15419->15422 15423 8c3ef6-8c3f04 15419->15423 15424 8c3f5a-8c3f94 call 812b9a 15420->15424 15425 8c3f32-8c3f3e 15420->15425 15421->15421 15426 8c3cc7-8c3cd2 15421->15426 15422->15420 15423->15406 15423->15422 15429 8c3f50-8c3f57 call 8138e3 15425->15429 15430 8c3f40-8c3f4e 15425->15430 15431 8c3cdd-8c3ce0 15426->15431 15432 8c3cd4-8c3cd7 15426->15432 15429->15424 15430->15406 15430->15429 15435 8c3ce2-8c3ce5 15431->15435 15436 8c3cf3-8c3d19 15431->15436 15432->15431 15433 8c3e5e-8c3e71 FindNextFileA 15432->15433 15433->15418 15441 8c3e77-8c3e8b 15433->15441 15435->15436 15439 8c3ce7-8c3ced 15435->15439 15436->15395 15440 8c3d1f-8c3d25 15436->15440 15439->15433 15439->15436 15443 8c3d29-8c3d51 call 7fe8a0 15440->15443 15444 8c3d27 15440->15444 15441->15417 15450 8c3e8d-8c3e93 15441->15450 15449 8c3d54-8c3d59 15443->15449 15444->15443 15449->15449 15451 8c3d5b-8c3e09 call 7f8f00 call 7e2df0 * 3 15449->15451 15452 8c3e95 15450->15452 15453 8c3e97-8c3ea5 SetFileAttributesA 15450->15453 15469 8c3e29-8c3e42 15451->15469 15470 8c3e0b-8c3e1e call 8c3b20 15451->15470 15452->15453 15455 8c3ea7-8c3eb0 15453->15455 15456 8c3eb2-8c3eb6 15453->15456 15455->15417 15458 8c3eb8 15456->15458 15459 8c3eba-8c3ec3 RemoveDirectoryA 15456->15459 15458->15459 15459->15415 15462 8c3ec5-8c3ece 15459->15462 15462->15417 15475 8c3e48-8c3e5c 15469->15475 15476 8c3ed0-8c3ed8 15469->15476 15470->15417 15474 8c3e24-8c3e27 15470->15474 15474->15433 15475->15433 15475->15476 15476->15417
                                                                                                                                                                      APIs
                                                                                                                                                                      • FindFirstFileA.KERNELBASE(00000000,?,009664F8,?,?,?,\*.*,00000004), ref: 008C3C95
                                                                                                                                                                      • FindNextFileA.KERNELBASE(?,00000010), ref: 008C3E68
                                                                                                                                                                      • SetFileAttributesA.KERNELBASE(?,00000080), ref: 008C3E9D
                                                                                                                                                                      • RemoveDirectoryA.KERNELBASE(?), ref: 008C3EBB
                                                                                                                                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 008C3F97
                                                                                                                                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 008C3FA8
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$Cpp_errorFindThrow_std::_$AttributesDirectoryFirstNextRemove
                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                      • API String ID: 527909128-1173974218
                                                                                                                                                                      • Opcode ID: 4dfca41a53aabf591f5dbdf58e50bf337402301d17615841e60d767a16ff57b8
                                                                                                                                                                      • Instruction ID: 9e09822c9f74f3f7ccf0c30e36af50bbfd0b38afab17d1866d383a77bffff902
                                                                                                                                                                      • Opcode Fuzzy Hash: 4dfca41a53aabf591f5dbdf58e50bf337402301d17615841e60d767a16ff57b8
                                                                                                                                                                      • Instruction Fuzzy Hash: A0D1BE71D012489FDB10DBA8C948BEDBBB5FF45304F20825DE454BB292DB749B8ACB51
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 15567 8d8080-8d809e call 8d9280 15570 8d86de-8d86e4 15567->15570 15571 8d80a4-8d80ad 15567->15571 15572 8d80af-8d80b1 15571->15572 15573 8d80b3-8d80b9 15571->15573 15574 8d80d3-8d80d9 15572->15574 15575 8d80bf-8d80d0 15573->15575 15576 8d80bb-8d80bd 15573->15576 15577 8d80db-8d80e1 15574->15577 15578 8d80e3-8d80ea 15574->15578 15575->15574 15576->15574 15580 8d80f2-8d810f call 927470 15577->15580 15579 8d80ec 15578->15579 15578->15580 15579->15580 15583 8d86c8 15580->15583 15584 8d8115-8d8127 call 8159a0 15580->15584 15586 8d86ca 15583->15586 15590 8d8129-8d8130 15584->15590 15591 8d816b-8d8170 15584->15591 15587 8d86cf-8d86d4 call 928490 15586->15587 15597 8d86d6-8d86db 15587->15597 15595 8d8149-8d8159 15590->15595 15596 8d8132-8d8144 call 927110 15590->15596 15593 8d817c-8d8234 call 927c40 15591->15593 15594 8d8172-8d8179 15591->15594 15604 8d8299-8d8308 call 8d86f0 * 4 15593->15604 15605 8d8236-8d8244 call 924950 15593->15605 15594->15593 15595->15591 15606 8d815b-8d8166 call 927110 15595->15606 15596->15586 15597->15570 15616 8d8249-8d824e 15604->15616 15631 8d830e 15604->15631 15614 8d8247 15605->15614 15606->15586 15614->15616 15618 8d825a-8d8262 15616->15618 15619 8d8250-8d8257 15616->15619 15620 8d8268-8d826d 15618->15620 15621 8d869b-8d86a1 15618->15621 15619->15618 15620->15621 15623 8d8273-8d8278 15620->15623 15621->15586 15624 8d86a3-8d86ac 15621->15624 15623->15621 15627 8d827e-8d8298 15623->15627 15624->15587 15628 8d86ae-8d86b0 15624->15628 15628->15597 15630 8d86b2-8d86c7 15628->15630 15632 8d8313-8d8317 15631->15632 15632->15632 15633 8d8319-8d832f 15632->15633 15634 8d8331-8d833d 15633->15634 15635 8d8380 15633->15635 15636 8d833f-8d8341 15634->15636 15637 8d8370-8d837e 15634->15637 15638 8d8382-8d8395 call 923530 15635->15638 15639 8d8343-8d8362 15636->15639 15637->15638 15643 8d839c 15638->15643 15644 8d8397-8d839a 15638->15644 15639->15639 15641 8d8364-8d836d 15639->15641 15641->15637 15645 8d839e-8d83e3 call 8d86f0 call 8d8950 15643->15645 15644->15645 15650 8d83e5-8d83fe call 924950 15645->15650 15651 8d8403-8d8451 call 8f8da0 * 2 15645->15651 15650->15614 15651->15614 15658 8d8457-8d8482 call 924950 call 8d8a90 15651->15658 15663 8d8488-8d848d 15658->15663 15664 8d8524-8d8532 15658->15664 15667 8d8490-8d8494 15663->15667 15665 8d8538-8d853d 15664->15665 15666 8d8641-8d864b 15664->15666 15670 8d8540-8d8547 15665->15670 15668 8d864d-8d8652 15666->15668 15669 8d865f-8d8663 15666->15669 15667->15667 15671 8d8496-8d84a7 15667->15671 15668->15669 15674 8d8654-8d8659 15668->15674 15669->15616 15675 8d8669-8d866f 15669->15675 15676 8d854d-8d855c 15670->15676 15677 8d8549-8d854b 15670->15677 15672 8d84a9-8d84b0 15671->15672 15673 8d84b3-8d84cb call 8f8f50 15671->15673 15672->15673 15688 8d84cd-8d84e6 call 8d8a90 15673->15688 15689 8d84e9-8d84ee 15673->15689 15674->15616 15674->15669 15675->15616 15679 8d8675-8d868e call 924950 call 8d8f50 15675->15679 15680 8d8568-8d856e 15676->15680 15691 8d855e-8d8565 15676->15691 15677->15680 15701 8d8693-8d8696 15679->15701 15685 8d8577-8d857c 15680->15685 15686 8d8570-8d8575 15680->15686 15687 8d857f-8d8581 15685->15687 15686->15687 15692 8d858d-8d8594 15687->15692 15693 8d8583-8d858a 15687->15693 15688->15689 15696 8d8505-8d850f 15689->15696 15697 8d84f0-8d8500 call 924950 15689->15697 15691->15680 15698 8d8596-8d85a7 15692->15698 15699 8d85c2-8d85c4 15692->15699 15693->15692 15704 8d851b-8d851e 15696->15704 15705 8d8511-8d8518 15696->15705 15697->15696 15715 8d85bf 15698->15715 15716 8d85a9-8d85bc call 924950 15698->15716 15709 8d85c6-8d85cd 15699->15709 15710 8d8630-8d863b 15699->15710 15701->15616 15704->15664 15706 8d8520 15704->15706 15705->15704 15706->15664 15713 8d85cf-8d85d6 15709->15713 15714 8d8626 15709->15714 15710->15666 15710->15670 15717 8d85d8-8d85df 15713->15717 15718 8d85e2-8d8602 15713->15718 15720 8d862d 15714->15720 15715->15699 15716->15715 15717->15718 15724 8d860a-8d861b 15718->15724 15725 8d8604 15718->15725 15720->15710 15724->15710 15727 8d861d-8d8624 15724->15727 15725->15724 15727->15720
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: BINARY$MATCH$NOCASE$RTRIM$automatic extension loading failed: %s$no such vfs: %s$sqlite_rename_table
                                                                                                                                                                      • API String ID: 0-1885142750
                                                                                                                                                                      • Opcode ID: c3c629f4ecde86c7fda1e12fcab2e783e238c3259b3bedc271032bcb5d35dab1
                                                                                                                                                                      • Instruction ID: be920824b0c953c82a602a4b0ef413ebe572e99e59afdc0c7e647e7d14051c72
                                                                                                                                                                      • Opcode Fuzzy Hash: c3c629f4ecde86c7fda1e12fcab2e783e238c3259b3bedc271032bcb5d35dab1
                                                                                                                                                                      • Instruction Fuzzy Hash: 3702F470A00700DBEB219B29EC46B6B77E5FB50704F14462EE84ADB391DFB1EA44CB91
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 15729 8a33b0-8a3420 15730 8a343a-8a34e3 call 7fab20 15729->15730 15731 8a3422 15729->15731 15736 8a34e7-8a350c FindFirstFileA call 7e2df0 15730->15736 15737 8a34e5 15730->15737 15733 8a3424-8a3430 call 7e2df0 15731->15733 15739 8a3432-8a3437 15733->15739 15742 8a3512-8a3516 15736->15742 15743 8a3813-8a383d call 7e2df0 15736->15743 15737->15736 15739->15730 15744 8a3518-8a351f 15742->15744 15745 8a3527-8a352e 15742->15745 15747 8a37e7-8a37f7 FindNextFileA 15744->15747 15748 8a3525 15744->15748 15745->15747 15749 8a3534-8a353d 15745->15749 15747->15742 15751 8a37fd-8a3806 15747->15751 15748->15749 15752 8a3540-8a3545 15749->15752 15751->15742 15759 8a380c-8a3812 15751->15759 15752->15752 15753 8a3547-8a3552 15752->15753 15755 8a355d-8a3560 15753->15755 15756 8a3554-8a3557 15753->15756 15757 8a3562-8a3565 15755->15757 15758 8a3573-8a3577 15755->15758 15756->15747 15756->15755 15757->15758 15760 8a3567-8a356d 15757->15760 15761 8a357d-8a3645 call 7fab20 15758->15761 15762 8a3735-8a3767 call 7e3040 15758->15762 15759->15743 15760->15747 15760->15758 15768 8a3648-8a364d 15761->15768 15769 8a3769-8a3791 15762->15769 15770 8a3793-8a379f call 8042a0 15762->15770 15768->15768 15771 8a364f-8a369f call 7f8f00 15768->15771 15772 8a37a2-8a37a9 15769->15772 15770->15772 15783 8a36c2-8a36ce call 8042a0 15771->15783 15784 8a36a1-8a36c0 15771->15784 15774 8a37ab-8a37b9 15772->15774 15775 8a37d5-8a37e3 15772->15775 15778 8a37cb-8a37d2 call 8138e3 15774->15778 15779 8a37bb-8a37c9 15774->15779 15775->15747 15778->15775 15779->15778 15781 8a383e-8a3843 call 818c60 15779->15781 15787 8a36d1-8a36de 15783->15787 15784->15787 15789 8a370c-8a3730 call 7e2df0 15787->15789 15790 8a36e0-8a36ec 15787->15790 15789->15747 15793 8a36ee-8a36fc 15790->15793 15794 8a3702-8a3709 call 8138e3 15790->15794 15793->15781 15793->15794 15794->15789
                                                                                                                                                                      APIs
                                                                                                                                                                      • FindFirstFileA.KERNELBASE(00000000,?,00000000), ref: 008A34EF
                                                                                                                                                                      • FindNextFileA.KERNELBASE(00000000,00000010), ref: 008A37EF
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileFind$FirstNext
                                                                                                                                                                      • String ID: 4oST$4oST$4oST
                                                                                                                                                                      • API String ID: 1690352074-2236699556
                                                                                                                                                                      • Opcode ID: f469220a27b993f89273253e2aed47af13e1ba8318e68990e7336d4894c446b9
                                                                                                                                                                      • Instruction ID: f50629e53a780e922bfcb0f6833dcb07a4f93e286e366d919fa51ea8ab4f1066
                                                                                                                                                                      • Opcode Fuzzy Hash: f469220a27b993f89273253e2aed47af13e1ba8318e68990e7336d4894c446b9
                                                                                                                                                                      • Instruction Fuzzy Hash: CED18BB0D012888FEB25CF98C9947EEFBB1FF45314F248299E449AB382D7745A85CB51
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Cpp_errorThrow_std::_$AttributesFile
                                                                                                                                                                      • String ID: 4oST$4oST$6l_
                                                                                                                                                                      • API String ID: 3398192513-652797657
                                                                                                                                                                      • Opcode ID: 0e40bcdd6433b29b878a9a66dcd6d5c37fa357efb99e525e5819bf93b3ce82eb
                                                                                                                                                                      • Instruction ID: a2e6de8493578b683f5188c9916168e9772022419b3e8da36830046850a98e96
                                                                                                                                                                      • Opcode Fuzzy Hash: 0e40bcdd6433b29b878a9a66dcd6d5c37fa357efb99e525e5819bf93b3ce82eb
                                                                                                                                                                      • Instruction Fuzzy Hash: 918204B4D01299CFDB15CFA8C991BEEBBB1BF08304F244199D549B7242DB705A85CFA2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: 4oST$4oST$4oST
                                                                                                                                                                      • API String ID: 0-2236699556
                                                                                                                                                                      • Opcode ID: b17116e7593cd55aeb13e828c7ee569be82dcb5d1738706747c517cb46b0ac29
                                                                                                                                                                      • Instruction ID: cd044b66ade35142e2ab15c4066714ea754101364b1404ab84afcb50b6462c47
                                                                                                                                                                      • Opcode Fuzzy Hash: b17116e7593cd55aeb13e828c7ee569be82dcb5d1738706747c517cb46b0ac29
                                                                                                                                                                      • Instruction Fuzzy Hash: B802FF70D05288DEEF14DFA8C9457DDBBB0EF55304F1440A9D805AB382D7B95E88DBA2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0091CA85
                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0091CD87
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 885266447-0
                                                                                                                                                                      • Opcode ID: 93ed0de80c3e9b35965d804e89b302bb2c61689de4a8fefabece2b0dd7ab8cc1
                                                                                                                                                                      • Instruction ID: 825f725f4e6c836a8344443d843033c255e0be960268221bf76e25af10c6f2b9
                                                                                                                                                                      • Opcode Fuzzy Hash: 93ed0de80c3e9b35965d804e89b302bb2c61689de4a8fefabece2b0dd7ab8cc1
                                                                                                                                                                      • Instruction Fuzzy Hash: AD029FB074470AAFDB15CB28C840BAAB7E8BF88314F04866DE859D7650D774ED94CBC2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Cpp_errorFileThrow_std::_$AttributesFindFirst
                                                                                                                                                                      • String ID: 4oST$4oST
                                                                                                                                                                      • API String ID: 1030726901-3962470393
                                                                                                                                                                      • Opcode ID: 35ef8c6a120d73ae2016e6ea8465505060ffd352851072814f2564fc2ee631f6
                                                                                                                                                                      • Instruction ID: 6ce987c8611d654ae8f2b1434bff09e864f84f319bfef95e7ddc6c619c03bcee
                                                                                                                                                                      • Opcode Fuzzy Hash: 35ef8c6a120d73ae2016e6ea8465505060ffd352851072814f2564fc2ee631f6
                                                                                                                                                                      • Instruction Fuzzy Hash: C7A2DFB4D05299CFDB25CFA8C991AEEBBB1BF08300F244199D949B7341D7305A85CFA6
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 119226523288b722b6853d8b2a6263c7efa731c3a5adc2f78602557529edec4f
                                                                                                                                                                      • Instruction ID: 7a414f280562ed626ab18a9bb204a36f6da45e4207be3e162127dfc1853712d4
                                                                                                                                                                      • Opcode Fuzzy Hash: 119226523288b722b6853d8b2a6263c7efa731c3a5adc2f78602557529edec4f
                                                                                                                                                                      • Instruction Fuzzy Hash: A1B1BF7090062E8BDB29CE68A9596BEBBA1FF04304F14061AD892E7793D73199D1CF51
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 008C4050: GetFileAttributesA.KERNELBASE(?,?,?,00840224), ref: 008C40AC
                                                                                                                                                                        • Part of subcall function 008C3FC0: CreateDirectoryA.KERNELBASE(?,00000000,00000005), ref: 008C4005
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 00845AD0
                                                                                                                                                                        • Part of subcall function 008C4050: std::_Throw_Cpp_error.LIBCPMT ref: 008C40FF
                                                                                                                                                                        • Part of subcall function 008C4050: std::_Throw_Cpp_error.LIBCPMT ref: 008C4110
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Cpp_errorCreateDirectoryThrow_std::_$AttributesFile
                                                                                                                                                                      • String ID: 4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$=J ]$=J ]$GoST$GoST$HFd$HFd$HWg$HWg$K@z$K@z$K@z$K@z$MXg$MXg$MXg$MXg$O_w$O_w$UYw$UYw$UYw$UYw$_Ys$_Ys$_Ys$_Ys$g[}
                                                                                                                                                                      • API String ID: 2916759669-3780945421
                                                                                                                                                                      • Opcode ID: 4b66f79a32db9801c7b0fdb7b81bd10c3557ce6e5d0df361117f9d583c0b23e0
                                                                                                                                                                      • Instruction ID: 7a81dd9d2b248e8ca6ecf7899c435c2b1d91ee365b68c0329ead9f9edde64cdf
                                                                                                                                                                      • Opcode Fuzzy Hash: 4b66f79a32db9801c7b0fdb7b81bd10c3557ce6e5d0df361117f9d583c0b23e0
                                                                                                                                                                      • Instruction Fuzzy Hash: EB53C9B0D052A88FDB65DF14C894BEDBBB4BB48304F1041EAE549A7282DB346F85CF56
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 13433 83e090-83e196 call 7eb8e0 call 7f32d0 call 7fab20 CreateDirectoryA 13440 83e830-83e837 13433->13440 13441 83e19c-83e1a0 13433->13441 13442 83ef8e-83f273 call 7e2df0 13440->13442 13443 83e83d-83e8d9 call 7f32d0 call 7fab20 CreateDirectoryA 13440->13443 13444 83e1a2-83e1bd 13441->13444 13460 83ef7f-83ef89 call 7e2df0 13443->13460 13461 83e8df-83e8e3 13443->13461 13447 83e1c3-83e30c call 7f63b0 * 4 call 7f32d0 call 7fab20 call 7fad80 call 7e2df0 call 8c4050 13444->13447 13448 83e7f4-83e81f call 7f63b0 call 8bc3e0 13444->13448 13505 83e30e-83e326 13447->13505 13506 83e32c-83e3ff call 7f32d0 call 7fab20 call 7fad80 call 7f62c0 call 7e2df0 * 2 call 8c4050 13447->13506 13448->13440 13465 83e821-83e828 call 8c3b20 13448->13465 13460->13442 13464 83e8e5-83e900 13461->13464 13468 83ef43-83ef6e call 7f63b0 call 8b49b0 13464->13468 13469 83e906-83ea4f call 7f63b0 * 4 call 7f32d0 call 7fab20 call 7fad80 call 7e2df0 call 8c4050 13464->13469 13475 83e82d 13465->13475 13468->13460 13486 83ef70-83ef77 call 8c3b20 13468->13486 13522 83ea51-83ea69 13469->13522 13523 83ea6f-83eb42 call 7f32d0 call 7fab20 call 7fad80 call 7f62c0 call 7e2df0 * 2 call 8c4050 13469->13523 13475->13440 13492 83ef7c 13486->13492 13492->13460 13505->13506 13514 83e7a3-83e7ef call 7e2df0 * 5 13505->13514 13557 83e401-83e419 13506->13557 13558 83e41f-83e426 13506->13558 13514->13444 13522->13523 13535 83eef2-83ef3e call 7e2df0 * 5 13522->13535 13586 83eb62-83eb69 13523->13586 13587 83eb44-83eb5c 13523->13587 13535->13464 13557->13514 13557->13558 13560 83e52f-83e533 13558->13560 13561 83e42c-83e4ec call 7f32d0 call 7fab20 call 7fad80 call 7e2df0 call 8c4050 13558->13561 13566 83e535-83e598 call 7f32d0 13560->13566 13567 83e59d-83e5a1 13560->13567 13619 83e511-83e51b call 7f6290 13561->13619 13620 83e4ee-83e50f 13561->13620 13582 83e653-83e741 call 7e2cf0 call 7f32d0 call 7fab20 call 7fae20 call 7f62c0 call 7e2df0 * 3 call 8c4050 13566->13582 13572 83e5a3-83e5ee call 7f32d0 13567->13572 13573 83e5f0-83e64e call 7f32d0 13567->13573 13572->13582 13573->13582 13658 83e743-83e75b 13582->13658 13659 83e75d-83e79d call 7f63b0 * 2 call 8bd2b0 13582->13659 13589 83ec72-83ec76 13586->13589 13590 83eb6f-83ec2f call 7f32d0 call 7fab20 call 7fad80 call 7e2df0 call 8c4050 13586->13590 13587->13535 13587->13586 13595 83ece0-83ece4 13589->13595 13596 83ec78-83ecdb call 7f32d0 13589->13596 13641 83ec31-83ec52 13590->13641 13642 83ec54-83ec5e call 7f6290 13590->13642 13602 83ece6-83ed49 call 7f32d0 13595->13602 13603 83ed4b-83eda9 call 7f32d0 13595->13603 13613 83edae-83ee90 call 7e2cf0 call 7f32d0 call 7fab20 call 7fae20 call 7f62c0 call 7e2df0 * 3 call 8c4050 13596->13613 13602->13613 13603->13613 13673 83ee92-83eeaa 13613->13673 13674 83eeac-83eeec call 7f63b0 * 2 call 8bd2b0 13613->13674 13625 83e520-83e52a call 7e2df0 13619->13625 13620->13619 13620->13625 13625->13560 13641->13642 13647 83ec63-83ec6d call 7e2df0 13641->13647 13642->13647 13647->13589 13658->13514 13658->13659 13659->13514 13676 83e79f 13659->13676 13673->13535 13673->13674 13674->13535 13683 83eeee 13674->13683 13676->13514 13683->13535
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 007EB8E0: CreateDirectoryA.KERNELBASE(?,00000000), ref: 007EBA08
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 0083E192
                                                                                                                                                                      • CreateDirectoryA.KERNELBASE(?,00000000), ref: 0083E8D5
                                                                                                                                                                        • Part of subcall function 008C4050: GetFileAttributesA.KERNELBASE(?,?,?,00840224), ref: 008C40AC
                                                                                                                                                                        • Part of subcall function 008B49B0: SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?,009380C7,000000FF), ref: 008B4A1C
                                                                                                                                                                        • Part of subcall function 008B49B0: SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 008B4A43
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CreateDirectory$FolderPath$AttributesFile
                                                                                                                                                                      • String ID: 4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$4oST$rPw$rPw$voST$voST$wWs$wWs
                                                                                                                                                                      • API String ID: 3316307204-3074812837
                                                                                                                                                                      • Opcode ID: cf23ecdb7527da7299e00f415bd97b58b845b25b47b3636c6af78b8c45fa7f18
                                                                                                                                                                      • Instruction ID: a853874ed536c9bd474eb77e3af6c88be9a67b756cb03c9b1be5446e4954ce44
                                                                                                                                                                      • Opcode Fuzzy Hash: cf23ecdb7527da7299e00f415bd97b58b845b25b47b3636c6af78b8c45fa7f18
                                                                                                                                                                      • Instruction Fuzzy Hash: F39200B0D012ACCBDB25DB64CC98BDDBBB4AB14304F1040E9E549A7282DB745F89DF56
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 15869 7e9280-7e92dd call 7f63b0 15872 7e9413-7e9521 call 7e2df0 call 8c77d0 15869->15872 15873 7e92e3-7e92e9 15869->15873 15889 7e9537-7e953f call 7f8dc0 15872->15889 15890 7e9523-7e9535 15872->15890 15875 7e92f0-7e9313 15873->15875 15876 7e9324-7e9331 15875->15876 15877 7e9315-7e931f 15875->15877 15880 7e9342-7e934f 15876->15880 15881 7e9333-7e933d 15876->15881 15879 7e9403-7e9406 15877->15879 15883 7e9409-7e940d 15879->15883 15884 7e9360-7e936d 15880->15884 15885 7e9351-7e935b 15880->15885 15881->15879 15883->15872 15883->15875 15887 7e937e-7e938b 15884->15887 15888 7e936f-7e9379 15884->15888 15885->15879 15891 7e938d-7e9397 15887->15891 15892 7e9399-7e93a6 15887->15892 15888->15879 15893 7e9544-7e9597 call 8c77d0 * 2 15889->15893 15890->15893 15891->15879 15895 7e93a8-7e93b2 15892->15895 15896 7e93b4-7e93c1 15892->15896 15906 7e95cb-7e95e1 call 8c77d0 15893->15906 15907 7e9599-7e95c8 call 8c77d0 call 815260 15893->15907 15895->15879 15898 7e93cf-7e93dc 15896->15898 15899 7e93c3-7e93cd 15896->15899 15901 7e93de-7e93e8 15898->15901 15902 7e93ea-7e93f4 15898->15902 15899->15879 15901->15879 15902->15883 15904 7e93f6-7e93ff 15902->15904 15904->15879 15913 7e95e7-7e95ed 15906->15913 15914 7e96e2 15906->15914 15907->15906 15917 7e95f0-7e96ce WSASend 15913->15917 15915 7e96e6-7e96f0 15914->15915 15918 7e971e-7e973d 15915->15918 15919 7e96f2-7e96fe 15915->15919 15936 7e975f-7e9763 15917->15936 15937 7e96d4-7e96dc 15917->15937 15922 7e976f-7e9796 15918->15922 15923 7e973f-7e974b 15918->15923 15920 7e9714-7e971b call 8138e3 15919->15920 15921 7e9700-7e970e 15919->15921 15920->15918 15921->15920 15925 7e9797-7e97fe call 818c60 call 7e2df0 * 2 15921->15925 15927 7e974d-7e975b 15923->15927 15928 7e9765-7e976c call 8138e3 15923->15928 15927->15925 15931 7e975d 15927->15931 15928->15922 15931->15928 15936->15915 15937->15914 15937->15917
                                                                                                                                                                      APIs
                                                                                                                                                                      • WSASend.WS2_32(?,?,00000001,?,00000000,00000000,00000000), ref: 007E96C9
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Send
                                                                                                                                                                      • String ID: 4oST$4oST$Ws2_32.dll
                                                                                                                                                                      • API String ID: 121738739-1839276265
                                                                                                                                                                      • Opcode ID: cdf678b945171f57483bed12f26343ce9b08b12624182bc6199fcc46541dc10a
                                                                                                                                                                      • Instruction ID: f28ebc5309c8fdee7b7a302421ba1b30d1161f5cdc8305111d97b7f0f81b84f9
                                                                                                                                                                      • Opcode Fuzzy Hash: cdf678b945171f57483bed12f26343ce9b08b12624182bc6199fcc46541dc10a
                                                                                                                                                                      • Instruction Fuzzy Hash: 9102FE71D04288DFCF25CFA8C8907ADBBB0FF59304F244299E4856B6C6D7741986CB92
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • RegGetValueA.KERNELBASE(80000002,?,?,0001FFFF,?,?,00000104), ref: 008C1E20
                                                                                                                                                                      • GetComputerNameExA.KERNELBASE(00000002,?,00000104), ref: 008C1E8C
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ComputerNameValue
                                                                                                                                                                      • String ID: %wZ$4oST
                                                                                                                                                                      • API String ID: 3585273928-2776467258
                                                                                                                                                                      • Opcode ID: 54b92c4ec61a46067b5e7456050b7d5298719471113aa204dd022c934c7ddb0a
                                                                                                                                                                      • Instruction ID: af11b7a9c470044d3ccf9dfce3693572119a87254a1ccb2c4f0e144496e991de
                                                                                                                                                                      • Opcode Fuzzy Hash: 54b92c4ec61a46067b5e7456050b7d5298719471113aa204dd022c934c7ddb0a
                                                                                                                                                                      • Instruction Fuzzy Hash: 35E1EFB4D0125A8BDB15CF98D986BEEBBB5FF09304F204199E948B7341D7305A85CFA2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • CopyFileA.KERNEL32(?,?,00000000), ref: 008B3DD0
                                                                                                                                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 008B3F34
                                                                                                                                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 008B3F45
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Cpp_errorThrow_std::_$CopyFile
                                                                                                                                                                      • String ID: 4oST
                                                                                                                                                                      • API String ID: 4177132511-3759581069
                                                                                                                                                                      • Opcode ID: 5767761375042316f48bc1004e88722ddef0cf674241db17bdb3b9395d5f25d8
                                                                                                                                                                      • Instruction ID: 6e1b3ef6a909b162ec07032cb3ea85e9b8243ff15247a3b1ce853238d2ef22be
                                                                                                                                                                      • Opcode Fuzzy Hash: 5767761375042316f48bc1004e88722ddef0cf674241db17bdb3b9395d5f25d8
                                                                                                                                                                      • Instruction Fuzzy Hash: 3CD168B0D01289DBDB14CFA8C9457EEBBB1FF44304F244299D409B7382DB745A89CBA2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • WSAStartup.WS2_32 ref: 008A596B
                                                                                                                                                                      • socket.WS2_32(?,?,?,?,?,?,00966328,?,?), ref: 008A5A0E
                                                                                                                                                                      • connect.WS2_32(00000000,00936B31,?,?,?,?,00966328,?,?), ref: 008A5A22
                                                                                                                                                                      • closesocket.WS2_32(00000000), ref: 008A5A2D
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Startupclosesocketconnectsocket
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3098855095-0
                                                                                                                                                                      • Opcode ID: 1fc0726b8c2d47163a1777d62210ea1775f0e132cbc3710596a9be04d9b19fa3
                                                                                                                                                                      • Instruction ID: 0c886b0a3729bab25810907c02d658accf81bd73a4b17f5f2b1e0dc1e114c6a8
                                                                                                                                                                      • Opcode Fuzzy Hash: 1fc0726b8c2d47163a1777d62210ea1775f0e132cbc3710596a9be04d9b19fa3
                                                                                                                                                                      • Instruction Fuzzy Hash: E531E1726057105BE7209F68C884B6BB7E5FBC6374F101F19F9A9E36D0E330A84486A2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetFileAttributesA.KERNELBASE(?,?,?,00840224), ref: 008C40AC
                                                                                                                                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 008C40FF
                                                                                                                                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 008C4110
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Cpp_errorThrow_std::_$AttributesFile
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3398192513-0
                                                                                                                                                                      • Opcode ID: a7129008aff9ef043ce9f973722bab700bb88bc5388d8354421d1a9405b08ed8
                                                                                                                                                                      • Instruction ID: 17145c76412930ac8bfb258783d798cbad2115026708a428a4b0f998aa00b86d
                                                                                                                                                                      • Opcode Fuzzy Hash: a7129008aff9ef043ce9f973722bab700bb88bc5388d8354421d1a9405b08ed8
                                                                                                                                                                      • Instruction Fuzzy Hash: 89119770585A009ACF205B2C9865BA977B8FB02734F24132CE531DB6C1DA33C8E88252
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetVolumeInformationA.KERNELBASE(?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 008C2F4B
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: InformationVolume
                                                                                                                                                                      • String ID: 4oST
                                                                                                                                                                      • API String ID: 2039140958-3759581069
                                                                                                                                                                      • Opcode ID: dc1705a65f54ce53c446a237f6fbc5af0e26f1c731dc7500268ce31d712d7f7d
                                                                                                                                                                      • Instruction ID: 44ef9237dead00bb9bbd4c0e593512390115f6fe7841cc7fa5d7fc557f792a42
                                                                                                                                                                      • Opcode Fuzzy Hash: dc1705a65f54ce53c446a237f6fbc5af0e26f1c731dc7500268ce31d712d7f7d
                                                                                                                                                                      • Instruction Fuzzy Hash: 7CF124B0D012499FDB15CFA8C995BEEBBB1FF08304F24419DE505BB281D7719A85CBA2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00000001,?), ref: 008718A9
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Open
                                                                                                                                                                      • String ID: 4oST
                                                                                                                                                                      • API String ID: 71445658-3759581069
                                                                                                                                                                      • Opcode ID: 1d1720721fb1871f0153a4ff40496e15c75b45bb4fc488ccb8d65c2b586a9841
                                                                                                                                                                      • Instruction ID: 228c273cf4dfa4b5ee3715122410066b9a569711a1ced744e2f57b5a527d6bba
                                                                                                                                                                      • Opcode Fuzzy Hash: 1d1720721fb1871f0153a4ff40496e15c75b45bb4fc488ccb8d65c2b586a9841
                                                                                                                                                                      • Instruction Fuzzy Hash: 00C106B0D052599FDB14CFA8D986BEEBBB1FF08310F244159E918B7381D7355A848FA2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: __fread_nolock
                                                                                                                                                                      • String ID: 4oST
                                                                                                                                                                      • API String ID: 2638373210-3759581069
                                                                                                                                                                      • Opcode ID: 6925bc6324edaec5e88e7729c953a0bbc247a848d35e42b129678f923987df46
                                                                                                                                                                      • Instruction ID: d39adb509bd8eab70034618e615fb912e3f7abc0e7af2b83caac003821128241
                                                                                                                                                                      • Opcode Fuzzy Hash: 6925bc6324edaec5e88e7729c953a0bbc247a848d35e42b129678f923987df46
                                                                                                                                                                      • Instruction Fuzzy Hash: 94515CB0D006499BDB10DF98C942BAEFBB5FF44714F10011DE845AB381D7759A45CBA2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: __fread_nolock
                                                                                                                                                                      • String ID: 4oST
                                                                                                                                                                      • API String ID: 2638373210-3759581069
                                                                                                                                                                      • Opcode ID: db061e9de23f5f8202d7e2e2c694837eae044b1b3accbf13162f0646b98e28b5
                                                                                                                                                                      • Instruction ID: 3e24c6b55f28aa0a2ff7f403a2f8ab713de06476c3ea8e80d309b57febb5e35b
                                                                                                                                                                      • Opcode Fuzzy Hash: db061e9de23f5f8202d7e2e2c694837eae044b1b3accbf13162f0646b98e28b5
                                                                                                                                                                      • Instruction Fuzzy Hash: A64139B0D00258DFCB04DF99D882BEEBBB4FF48704F104159E814AB381D7799946CBA6
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 684eedba4a9423b71b8111096c198ae31b630a6bb484ee3b82b9428864815468
                                                                                                                                                                      • Instruction ID: d899542d8619ed038bd981bfc77d30ca7a381c22eab3361cbb1cb9ff3e17684a
                                                                                                                                                                      • Opcode Fuzzy Hash: 684eedba4a9423b71b8111096c198ae31b630a6bb484ee3b82b9428864815468
                                                                                                                                                                      • Instruction Fuzzy Hash: CDB1D2B0A06269EFDF11DF98E881BADBBB1FF55314F144159E440E7282CB7499C1CB61
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 008B3B1A
                                                                                                                                                                      • std::_Throw_Cpp_error.LIBCPMT ref: 008B3B2B
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Cpp_errorThrow_std::_
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2134207285-0
                                                                                                                                                                      • Opcode ID: e3ac4f99175b0fad66d2857339f2afbb4f3bc27e55555ddb461e557b590a40d8
                                                                                                                                                                      • Instruction ID: 2d46d2c831f321716a1dc26db9bed5401d851358eacdfa8e2c156152f076b9df
                                                                                                                                                                      • Opcode Fuzzy Hash: e3ac4f99175b0fad66d2857339f2afbb4f3bc27e55555ddb461e557b590a40d8
                                                                                                                                                                      • Instruction Fuzzy Hash: 9A4103B1E046518BC720DF6CDC417AABBA4FB80314F28032DE865D7391E7B5AA54D7D2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • DeleteFileW.KERNELBASE(?,?,0081D2A1,?), ref: 0082B9CA
                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 0082B9DB
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: DeleteFile__dosmaperr
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1911827773-0
                                                                                                                                                                      • Opcode ID: d3976644024c90d0642cfa04fc2d3fb2949b716154b2efe6ba8bdcab3f37c28c
                                                                                                                                                                      • Instruction ID: 6d4a5bdca999f2578df203a60b430529e4a076ffaf3e9e31f5557bcc0a433b77
                                                                                                                                                                      • Opcode Fuzzy Hash: d3976644024c90d0642cfa04fc2d3fb2949b716154b2efe6ba8bdcab3f37c28c
                                                                                                                                                                      • Instruction Fuzzy Hash: D8D01232157208265F5035BA7C0D41A7B8EDED27747641A52F52CC5291EF22C8E19055
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 9ae15c07c9992b420f73194258b997ac30884c855fedb3be2a00cd09e5793456
                                                                                                                                                                      • Instruction ID: b2c7ef6b953434016c36b0bfbf3aff71d9f18ce4c0cabdae1a137ff70d0eacf1
                                                                                                                                                                      • Opcode Fuzzy Hash: 9ae15c07c9992b420f73194258b997ac30884c855fedb3be2a00cd09e5793456
                                                                                                                                                                      • Instruction Fuzzy Hash: 0E61B0EB27C158FC7A5AD1862B5CAF76A6FFAD6730730842AF407D5B02E3D80A491131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 54834396a0e1dda48182c4c9d06d94b53104594c21812b4a6b3b7365ee15df33
                                                                                                                                                                      • Instruction ID: 2d8b7ddff20dd85e79354d9b31beb0a4ace436e37ec435408ec8927a2fec6fe7
                                                                                                                                                                      • Opcode Fuzzy Hash: 54834396a0e1dda48182c4c9d06d94b53104594c21812b4a6b3b7365ee15df33
                                                                                                                                                                      • Instruction Fuzzy Hash: B96112EB23C218FDAA4AC5855B5CAF72B6FFED67307308426F403D5702E2D40A4A5171
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 32d2ca82170e6cc4019f6c8637bd2fbe76aa1f56fd4bb44b139fc2ee518e4d2e
                                                                                                                                                                      • Instruction ID: e11f311e8ef37d1d022288882e1353738e0d4dea4a507b8af18f7911472606b5
                                                                                                                                                                      • Opcode Fuzzy Hash: 32d2ca82170e6cc4019f6c8637bd2fbe76aa1f56fd4bb44b139fc2ee518e4d2e
                                                                                                                                                                      • Instruction Fuzzy Hash: 2061C0EB27C159FC7A5AC1862B5CAFA6A6FFED67307308426F407D5B02E3D40A895131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 7b2a2ea834b86ffa3ddb54896fda08cab14593b2f04163330f59cec76854ae0c
                                                                                                                                                                      • Instruction ID: b37036e2121d3d82d555e9a00a8858c159e198883fa5ecab38c27abec7887b02
                                                                                                                                                                      • Opcode Fuzzy Hash: 7b2a2ea834b86ffa3ddb54896fda08cab14593b2f04163330f59cec76854ae0c
                                                                                                                                                                      • Instruction Fuzzy Hash: 0B61D1EB27C158FC7A4AD1862B5CAF66A6FFED6730730842AF807D5702E2D40A495131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 95b7d82804f3c2b5e322a16fc10cece4ee588f6fda3799eeee37f25cf65d089d
                                                                                                                                                                      • Instruction ID: 2788fc9f0590b1346714608e9f8427e6b8bf96a80966c0347de355e99ba0df1d
                                                                                                                                                                      • Opcode Fuzzy Hash: 95b7d82804f3c2b5e322a16fc10cece4ee588f6fda3799eeee37f25cf65d089d
                                                                                                                                                                      • Instruction Fuzzy Hash: 4861CFEB27C159FC7A4AC5862B5CAFA6A6FFED6730730842AF407D5702E2D40A4A5131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: d19df922874a38ff6a7eb2d379a86894100e8257e069a53a7fe803d6dbb2e775
                                                                                                                                                                      • Instruction ID: 5b3d27479ee45a4077099d459285397461e7e94c379739eab92ef0c85934280f
                                                                                                                                                                      • Opcode Fuzzy Hash: d19df922874a38ff6a7eb2d379a86894100e8257e069a53a7fe803d6dbb2e775
                                                                                                                                                                      • Instruction Fuzzy Hash: 3E6102EB27C258FCBA5AC5461B5CAFA6B6FFED6730730842AF403C5702E2D40A591131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: a7ff300359602115c3ac1a340fbb3fcdd323f3914ed51d5a87031f2b8d617c9e
                                                                                                                                                                      • Instruction ID: 1de37b7e3a14b34751b3aa3673075908d8f6f90587ebafa3913566416bd987a9
                                                                                                                                                                      • Opcode Fuzzy Hash: a7ff300359602115c3ac1a340fbb3fcdd323f3914ed51d5a87031f2b8d617c9e
                                                                                                                                                                      • Instruction Fuzzy Hash: F051D1EB27C259FDBA4AC5961B5C9FA6B6FFED6730730842AF403D6702E2C40A495131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: c0385aba180772f30d9871c27d5d111a14591d42d7cd9698041623cf5744e489
                                                                                                                                                                      • Instruction ID: 6f4e3d9a656c25a3c9ee0edf4d7906a3ac16cf4cbd0cb0e6ac20e36de4f0d26f
                                                                                                                                                                      • Opcode Fuzzy Hash: c0385aba180772f30d9871c27d5d111a14591d42d7cd9698041623cf5744e489
                                                                                                                                                                      • Instruction Fuzzy Hash: 1851CFEB27C159FC7A4AC5862B5CAFA6A6FFED6730730842AF403D5702E3D40A4A5131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 16b70e414597465860db0d20425cccdd624a7cc98420fad47d386e064ee06dec
                                                                                                                                                                      • Instruction ID: 2440a7d4ea02ac9f5c6763d10ca27832b1ac0a172bf0e055cf7e15f7e305c0ef
                                                                                                                                                                      • Opcode Fuzzy Hash: 16b70e414597465860db0d20425cccdd624a7cc98420fad47d386e064ee06dec
                                                                                                                                                                      • Instruction Fuzzy Hash: CD51B1EB27C159FC7A5AC1861B5CAF76A6FFED67307308426F407D6702E2C40A4A5131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080614274.00000000052D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52d0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 6d977a104726ab23fc204392909a0d8ab7234655064315058e9462282f798ba4
                                                                                                                                                                      • Instruction ID: d7e835d57fc32b7cc63295ee0dd8ac70a3ee2e98533aa1d037b39d5e43f1cf63
                                                                                                                                                                      • Opcode Fuzzy Hash: 6d977a104726ab23fc204392909a0d8ab7234655064315058e9462282f798ba4
                                                                                                                                                                      • Instruction Fuzzy Hash: 9551B4EB27D111BDB152C1922B5C9FAD76FEDC6630B308426F407CA563F2C54E494571
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 45b756fdaf3b069a0b0eb2dd80095542885067d801dffb9fa419f2d1c0d39dea
                                                                                                                                                                      • Instruction ID: e3ce317bcc73630cb1c19c3d6a331bc47bcc11ec92c2b1c9b1895962909477a9
                                                                                                                                                                      • Opcode Fuzzy Hash: 45b756fdaf3b069a0b0eb2dd80095542885067d801dffb9fa419f2d1c0d39dea
                                                                                                                                                                      • Instruction Fuzzy Hash: 5E51BFEB27C159FCBA5AC5861B5CAFA6A6FFED67307308426F403D5702E3C40A4A5131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 66c2d86c67a051aa8543f89a8970ce651db38d69d5907614c4cf12180245f2df
                                                                                                                                                                      • Instruction ID: bdd5406367ca745556dbfb3bf3c19e4b216a8c53a244e81178d901e2558e05bb
                                                                                                                                                                      • Opcode Fuzzy Hash: 66c2d86c67a051aa8543f89a8970ce651db38d69d5907614c4cf12180245f2df
                                                                                                                                                                      • Instruction Fuzzy Hash: A641CEEB27C159BC7A5AD1862B5CAFA5B6FF9D67303308426F807D5702E3C80B4A1171
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: 17f0cd93fcd999b4782098cd9ea4e4f1a1a336acef7655a983680c5c9b56c034
                                                                                                                                                                      • Instruction ID: 15902dd279138fee2ed9eb40d2792921391d6f7d47cbf56ed96f1cbf171a76af
                                                                                                                                                                      • Opcode Fuzzy Hash: 17f0cd93fcd999b4782098cd9ea4e4f1a1a336acef7655a983680c5c9b56c034
                                                                                                                                                                      • Instruction Fuzzy Hash: C7419FEB27C169FC7A5AD1862B5CAFA5A6FF9D67307308426B407D5B02E2C80B4A5131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: 953f8326946ba9c2419b8d5914716dce387b53ce3fb432c6508f2440e61cf054
                                                                                                                                                                      • Instruction ID: 5dad26cfa520e029b61f1f71c6fa0f1e04dc587e4080bb5cd22e1c3b1c8af342
                                                                                                                                                                      • Opcode Fuzzy Hash: 953f8326946ba9c2419b8d5914716dce387b53ce3fb432c6508f2440e61cf054
                                                                                                                                                                      • Instruction Fuzzy Hash: 4A418EEB27C159FC7A5AD1862B5CAFA5A6FF9D67307308426B407D5702E2C80B4A5131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • Process32FirstW.KERNEL32(?,?,?,?), ref: 052D0727
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080614274.00000000052D0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052D0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52d0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FirstProcess32
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2623510744-0
                                                                                                                                                                      • Opcode ID: d5d95930ce675e9401ba71934cce6788ec2773ebac4541df4c1c524d6e69fdcf
                                                                                                                                                                      • Instruction ID: ffb07cf12904895cc54ad8da21e70177b721fbc001473a83b27da3115b49b583
                                                                                                                                                                      • Opcode Fuzzy Hash: d5d95930ce675e9401ba71934cce6788ec2773ebac4541df4c1c524d6e69fdcf
                                                                                                                                                                      • Instruction Fuzzy Hash: B54190EB27D121BDB142C1922F5C9FADB6FE9D6A30B318426F807CA562F2C44E495472
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 007F4093
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Concurrency::cancel_current_task
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 118556049-0
                                                                                                                                                                      • Opcode ID: 0b1508490fa6a6811fcca367a7eaba14e8aad23e05e0a2f9975c35ea94b07aa1
                                                                                                                                                                      • Instruction ID: 53d27c6a407f85f474d73a4ba8012da333f2ffc84eaa4246710fa885da100b03
                                                                                                                                                                      • Opcode Fuzzy Hash: 0b1508490fa6a6811fcca367a7eaba14e8aad23e05e0a2f9975c35ea94b07aa1
                                                                                                                                                                      • Instruction Fuzzy Hash: E4C129B0901249DFDB00CF68C4447A9FBF4BF09314F28C19AE558AB392D77A9A45CF91
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: 19cecb1e010eaac94d9f96aa74c9cca24ab417669c98440eb420dc318866d97b
                                                                                                                                                                      • Instruction ID: 473f0d226f43700818f16ecb73417a2cd97efd69650c7c4d30151331cfc93360
                                                                                                                                                                      • Opcode Fuzzy Hash: 19cecb1e010eaac94d9f96aa74c9cca24ab417669c98440eb420dc318866d97b
                                                                                                                                                                      • Instruction Fuzzy Hash: 594106EB27C199BDBA4AC2562B5CAFA5B6FEDC7630730847AF443D5703E2C40A4A5131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: e3a6bb18c56e2ac4a48332ea6b00e242e16c65a9282413b23e2d8bd7a0b7fcf5
                                                                                                                                                                      • Instruction ID: 8932b1aaa00bcd1c5e748c7cd8632d18fe30ce27be03577f0177d0a953b23ad2
                                                                                                                                                                      • Opcode Fuzzy Hash: e3a6bb18c56e2ac4a48332ea6b00e242e16c65a9282413b23e2d8bd7a0b7fcf5
                                                                                                                                                                      • Instruction Fuzzy Hash: F941BFEB27C159FC7A5AD1862B5CAF75A6FFAD6730330842AB803D5B02E3C40B4A5071
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: 5df3ca50923e2d48d239cc9bcdec5a81120fedeac027d6afd4b51326abec8d39
                                                                                                                                                                      • Instruction ID: 1db11a78fe35bc57d7b2ae36f7c6d797e526831c55785e652d38cb1b997c2fd6
                                                                                                                                                                      • Opcode Fuzzy Hash: 5df3ca50923e2d48d239cc9bcdec5a81120fedeac027d6afd4b51326abec8d39
                                                                                                                                                                      • Instruction Fuzzy Hash: 7841C2EB27C159BCB94AC1562B1CAFB5B6FE9D6730330842AF403D5702E3D80A4A5071
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: 038c685e315a6a1b9821ddadba3ec66ddac696cd3c600e507b88244e48832fd3
                                                                                                                                                                      • Instruction ID: c23afa39bcbe366297c5799cd97af43142b49fc9c501c0bbdaf66655db2896df
                                                                                                                                                                      • Opcode Fuzzy Hash: 038c685e315a6a1b9821ddadba3ec66ddac696cd3c600e507b88244e48832fd3
                                                                                                                                                                      • Instruction Fuzzy Hash: BD419FEB27C159BC795AD1962B5CAFB5B6FE9D6730330843AF807D5B02E3C80A4A5071
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 5a3d7835baa57f39e4a3c36098deaf7425fcf03cd30b42b1b224f9c1f3fc25aa
                                                                                                                                                                      • Instruction ID: 202b656e132a7c13fac6ac4213101bb2d70cd18bfbbafef06daabc6923e1895a
                                                                                                                                                                      • Opcode Fuzzy Hash: 5a3d7835baa57f39e4a3c36098deaf7425fcf03cd30b42b1b224f9c1f3fc25aa
                                                                                                                                                                      • Instruction Fuzzy Hash: BD31AFEB17C114BCB053C046AF4CAFA5A2FEAD77707B08026F80BD9A02A2D90E5F1031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: 5c9fa863efd366e721a4961f1cc981770493f42b12bbf68ddfd95f5d5f385f1e
                                                                                                                                                                      • Instruction ID: 214073ac3d163d6f64138e0b107f89c22edd2591a3cb460cb829d49d71e019fe
                                                                                                                                                                      • Opcode Fuzzy Hash: 5c9fa863efd366e721a4961f1cc981770493f42b12bbf68ddfd95f5d5f385f1e
                                                                                                                                                                      • Instruction Fuzzy Hash: ED419FEB23C159BCB94AD1962B5CAFB576FEAD6730330843AF407D6702E3D80A4A5171
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: 30260da8e5c677dfab81303704512f9532fa59b23639e4f4cace8301f1000a91
                                                                                                                                                                      • Instruction ID: 3b4b03d2556e6d7268d16ce5fd67a78d7448c1340da0e35ccb7ad784fc682da9
                                                                                                                                                                      • Opcode Fuzzy Hash: 30260da8e5c677dfab81303704512f9532fa59b23639e4f4cace8301f1000a91
                                                                                                                                                                      • Instruction Fuzzy Hash: 634192EB22C159BDBA4AD1562B5CAFB5BAFEED6730330843BF403D5702E2C50A4A5171
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: ce9ce877747e983888a92abda4daa41df98c834d93dcb8a33cbf4ee099e09233
                                                                                                                                                                      • Instruction ID: ae370ad08834cd498bd59c072aed4c56cc31760d36671fe5d1808ac13fba576f
                                                                                                                                                                      • Opcode Fuzzy Hash: ce9ce877747e983888a92abda4daa41df98c834d93dcb8a33cbf4ee099e09233
                                                                                                                                                                      • Instruction Fuzzy Hash: 77318FEB17C154BCB452C1466F5CAFA5A2FEAD77707B08026F80BD9A02A2C90E5B1031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: cf3d63b98ad4acda45eee9513d4ee5fe30fd9e686947dec9774860dd7f19c785
                                                                                                                                                                      • Instruction ID: bce4a053711bd6bf75ce0154b878ec615ac7852493457ae1e0483c51938322c0
                                                                                                                                                                      • Opcode Fuzzy Hash: cf3d63b98ad4acda45eee9513d4ee5fe30fd9e686947dec9774860dd7f19c785
                                                                                                                                                                      • Instruction Fuzzy Hash: 1B416EEB27C159BC7A5AD1962B5CAFB57AFE9D6730330843AF803D5702E3C80A4A5171
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • WriteFile.KERNELBASE(?,00000000,?,?,00000000,00000000,00000000,?,008C41EC,?,0081CFD7,008C41EC,?,00956E10,00000010,0081D0B7), ref: 008298FE
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3934441357-0
                                                                                                                                                                      • Opcode ID: a40407253ba9ca24991ae437fb21a30f5e9908f2c0cc8a69b64771dab3c51715
                                                                                                                                                                      • Instruction ID: 3a842b40285c9fdb7851f4f8d5e23c82c52fa460d9219e977005785a67000fff
                                                                                                                                                                      • Opcode Fuzzy Hash: a40407253ba9ca24991ae437fb21a30f5e9908f2c0cc8a69b64771dab3c51715
                                                                                                                                                                      • Instruction Fuzzy Hash: AF61B371D14129AFDF119FA8E844AEEBFB9FF09318F180159E984E7252D331D981CBA1
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: a7c8eb7cfd181fffb6b967940fd2dac2265280585c5a44fca0dffbcbf17d41f3
                                                                                                                                                                      • Instruction ID: d85bb90180c85fb2bd5f4be8335aa3194bbaed5b7462f824caf64ac28d623725
                                                                                                                                                                      • Opcode Fuzzy Hash: a7c8eb7cfd181fffb6b967940fd2dac2265280585c5a44fca0dffbcbf17d41f3
                                                                                                                                                                      • Instruction Fuzzy Hash: 1341A5EB27C159BCBA4AD1562B5CAF65BAFEDC6630330843BF443D5702E2D40A4E5171
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: 9029671cd682482e93712d20af90e8783b3cc3d0f4bea7b4c8869a242293119e
                                                                                                                                                                      • Instruction ID: af3c9d321608d3a27d30832df039fbbf1146451e3d01a0e5046c01673aa0658f
                                                                                                                                                                      • Opcode Fuzzy Hash: 9029671cd682482e93712d20af90e8783b3cc3d0f4bea7b4c8869a242293119e
                                                                                                                                                                      • Instruction Fuzzy Hash: 4F319EEB27C119BCBA4AD2962B5CAFB576FE9D6730330843AF403D5702E3D40A4A5171
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: a2cf5de51af28a65d2e43b709e5b5ae0da7400c9bac2ec60f47de44c3f61d1db
                                                                                                                                                                      • Instruction ID: bf365c1458081cca9515578eafe25a1feb2a6bbf231b6d53f422dcf9a90dede0
                                                                                                                                                                      • Opcode Fuzzy Hash: a2cf5de51af28a65d2e43b709e5b5ae0da7400c9bac2ec60f47de44c3f61d1db
                                                                                                                                                                      • Instruction Fuzzy Hash: 54319CEB17C114BDB152C1866F5CAFA5B2FEAD37307B08426F80BD9A02A2D91F5B1031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: aecd0ec3e80c863b8f929dfe5ccea693d10621939d199fcdfa7604c6e6b0cdac
                                                                                                                                                                      • Instruction ID: 2355c3d52423f7474bf61de58cb1738c2132f348618458f5bbf683324b498098
                                                                                                                                                                      • Opcode Fuzzy Hash: aecd0ec3e80c863b8f929dfe5ccea693d10621939d199fcdfa7604c6e6b0cdac
                                                                                                                                                                      • Instruction Fuzzy Hash: 7E317AEB17C164BC7552C1866F5CAFA5B2FEAD77303B08426F80B99A02A2C91F5F1031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 49908290d6ecb313ebb7d6001c8cdd0af0c10ab3b3f9fa862aef4d5bc3a14508
                                                                                                                                                                      • Instruction ID: 97afa69999f69e88be8aba9480eeaaa9a138f99e3c142624775e9d275cdbc5f4
                                                                                                                                                                      • Opcode Fuzzy Hash: 49908290d6ecb313ebb7d6001c8cdd0af0c10ab3b3f9fa862aef4d5bc3a14508
                                                                                                                                                                      • Instruction Fuzzy Hash: 11319EEB17C110BCB552C1466F5CAFA6B6FE9D77703B08426F80799A42A2C91B5F1031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 83e226a5e6a128941e869043b18c3520b37310fde2ded2629b56d3663079d7b7
                                                                                                                                                                      • Instruction ID: 50c348a53bdb5801b510f34450aa04f7f24db306132d8c747790be94edf67e75
                                                                                                                                                                      • Opcode Fuzzy Hash: 83e226a5e6a128941e869043b18c3520b37310fde2ded2629b56d3663079d7b7
                                                                                                                                                                      • Instruction Fuzzy Hash: 04318CEB17D124BDB152C1566F5CAFA5B6FEAD77703B08026F80BD9A02A2C91B5F1031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • BaseDllReadWriteIniFile.KERNEL32(?,?,?,?,?,?,?,?,?,?,0000001F), ref: 052906C3
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080319397.0000000005290000.00000040.00001000.00020000.00000000.sdmp, Offset: 05290000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5290000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BaseFileReadWrite
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234091865-0
                                                                                                                                                                      • Opcode ID: 40c6310a8acae705e6ad00f776e8c8296c77b40c163fc05d3953e726df1fcb9c
                                                                                                                                                                      • Instruction ID: 5b0b0604664f0e7af4ffc52fe401916d3f69e662fe756f87ff019de2fe49dc46
                                                                                                                                                                      • Opcode Fuzzy Hash: 40c6310a8acae705e6ad00f776e8c8296c77b40c163fc05d3953e726df1fcb9c
                                                                                                                                                                      • Instruction Fuzzy Hash: E93163EB26C119BDB94AD1962B5CAFB5B6FE9D6630330843AF403D5702E2D40A4E5171
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 007F546E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Concurrency::cancel_current_task
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 118556049-0
                                                                                                                                                                      • Opcode ID: cdc2c0a572b2a3d5c283e12c2c0420b7f7fe77c4e8a6a94979b7a50b95d6b38c
                                                                                                                                                                      • Instruction ID: 2c9267f574f0d6d17158373a2e1cf5643d42fdcd1f6a1d0378cfb6f741c02400
                                                                                                                                                                      • Opcode Fuzzy Hash: cdc2c0a572b2a3d5c283e12c2c0420b7f7fe77c4e8a6a94979b7a50b95d6b38c
                                                                                                                                                                      • Instruction Fuzzy Hash: F3618AB1A01618DFCB10CF5DC984B6ABBF5FF48710F24816AE6199B391C779DA41CB90
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 0ecce422df43bcabaa1b0ff84e7a908faf724d6efc92b6d817a54f596b62e365
                                                                                                                                                                      • Instruction ID: 366c71a4a6d3742286384ed4047a2c411b34cef466d664d957a7acb2107bd46b
                                                                                                                                                                      • Opcode Fuzzy Hash: 0ecce422df43bcabaa1b0ff84e7a908faf724d6efc92b6d817a54f596b62e365
                                                                                                                                                                      • Instruction Fuzzy Hash: B5319AEB17D024BC7052C1866F5CAFA5A6FE9D37303B08026F80BD9A02A2C90F5F1031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 8b056d16aa5ec1519476c748f91ec5d779d30278b434a57d089014f3507edd1a
                                                                                                                                                                      • Instruction ID: 6c6fdae344fe8b2c5e21421f5ad9d78f4026d43c0029c59df9150d00d6301ca7
                                                                                                                                                                      • Opcode Fuzzy Hash: 8b056d16aa5ec1519476c748f91ec5d779d30278b434a57d089014f3507edd1a
                                                                                                                                                                      • Instruction Fuzzy Hash: 113138EB17D121BC7152C0966F5CAFA5A6FE9D77703B0842AF80BD9A02A2C91E5F1035
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: c7e59620117e13965e96fd3ee8812293b8ddd7c6e64e58103c5e43c553d8bd08
                                                                                                                                                                      • Instruction ID: e6e1cf0ccd952d1b0793eb4ba7369472e37945894c8b5311c46ed23d4203cfbb
                                                                                                                                                                      • Opcode Fuzzy Hash: c7e59620117e13965e96fd3ee8812293b8ddd7c6e64e58103c5e43c553d8bd08
                                                                                                                                                                      • Instruction Fuzzy Hash: B33129EB17D024BC7152C1962F5CAFA9B6FE9D77703B08426F807D9A02A2C91B5F1035
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: a7b17cdcebb12653f46d2e059dad21c5e3f302c69c24b2763b103c090e6fdfb9
                                                                                                                                                                      • Instruction ID: cf1187e79d8838d2bb9d7afe682a8b8e24b57f5d01030243566b89ea47c306f3
                                                                                                                                                                      • Opcode Fuzzy Hash: a7b17cdcebb12653f46d2e059dad21c5e3f302c69c24b2763b103c090e6fdfb9
                                                                                                                                                                      • Instruction Fuzzy Hash: 2D215CEB17C120BDB152C1862F5CAFA576FE9D37307B0842AF806D9502A2C91A4F1031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 08f1f3807282621eb053c9f82b79389e212b6a122f5e2dc246242ffb0abe0264
                                                                                                                                                                      • Instruction ID: 0df9fe87b20a1990d002379268732ec1dfbcd367ce86cf12535490ed69f7fe49
                                                                                                                                                                      • Opcode Fuzzy Hash: 08f1f3807282621eb053c9f82b79389e212b6a122f5e2dc246242ffb0abe0264
                                                                                                                                                                      • Instruction Fuzzy Hash: 262129EB17D124BCB152C1862F5DAFA576FE9D77703B08426F806D9A02A2C91A5F1035
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: e97f9d6e88d8ee0addfcb3150460fbfd5c940120dec87e32875e66e0425c5d15
                                                                                                                                                                      • Instruction ID: e1e826743fd979d7033fa2169f0b356c1da1c28a059fe52fca752fa25b63ab53
                                                                                                                                                                      • Opcode Fuzzy Hash: e97f9d6e88d8ee0addfcb3150460fbfd5c940120dec87e32875e66e0425c5d15
                                                                                                                                                                      • Instruction Fuzzy Hash: 8F51B470A00208EFDB14DF58C886EE97BA6FF49314F298159F849DB252DB71DD82CB91
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: b7684d34146df76ce4e14c79128a8e82766ea488379481176b89cda9c398abe5
                                                                                                                                                                      • Instruction ID: 038c6328b8da1d9ddd8161c287c11a30fb6a059bed01af369adbea520bf25f6d
                                                                                                                                                                      • Opcode Fuzzy Hash: b7684d34146df76ce4e14c79128a8e82766ea488379481176b89cda9c398abe5
                                                                                                                                                                      • Instruction Fuzzy Hash: 13212AEB17D020BCB152C1862F58AFA576FE9D67707B0842BF807D9602A2C91A5F1035
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 72f0a6d15585108553f80e96d6a64dbd1cbdb29558143d85f37a611fee4e09c4
                                                                                                                                                                      • Instruction ID: f7dcca39926134f8dcbcc18f3fbe980b1ef675d9d76752db0d506be20022626c
                                                                                                                                                                      • Opcode Fuzzy Hash: 72f0a6d15585108553f80e96d6a64dbd1cbdb29558143d85f37a611fee4e09c4
                                                                                                                                                                      • Instruction Fuzzy Hash: C9215AEB27C120BCB156C1866F5CAFA5B6FE9D67303B0842BF807D9902A2C91B5F1035
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 1e26f1373ff275f9af7a3e377b81436b2c2db37983059b15851dc018cc4bd3b0
                                                                                                                                                                      • Instruction ID: c7dc80069a5c541eee0b7b7b78b843dd0706c5143e81bc7ed9d45d8116380453
                                                                                                                                                                      • Opcode Fuzzy Hash: 1e26f1373ff275f9af7a3e377b81436b2c2db37983059b15851dc018cc4bd3b0
                                                                                                                                                                      • Instruction Fuzzy Hash: 6B21ADEB17C1207C7112C1962B5CAFA9B6FE9E77303B0842BF806DA602A2C91E4F1031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 4b3f7aa696c874048a425ff21f1f71197888702fdcd1a422b5897c7d1b836c43
                                                                                                                                                                      • Instruction ID: 8061f72d3cdcfffb4b6920e5994388dcdca79466edd77c1ae23feecbc172008b
                                                                                                                                                                      • Opcode Fuzzy Hash: 4b3f7aa696c874048a425ff21f1f71197888702fdcd1a422b5897c7d1b836c43
                                                                                                                                                                      • Instruction Fuzzy Hash: FA219AEB17D1147CB112C1962B59AFA9B6FE9D77703B08427F806E9A42A2C91E4F1032
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 7869d59c4dfe39bacf5986dd3206cf22de86f2aace3e6a016366676b09c2bd52
                                                                                                                                                                      • Instruction ID: 9dfcb10023fb125a35fbcca7c0264cb38e7059424d50c1e3cf2ba06782855a7f
                                                                                                                                                                      • Opcode Fuzzy Hash: 7869d59c4dfe39bacf5986dd3206cf22de86f2aace3e6a016366676b09c2bd52
                                                                                                                                                                      • Instruction Fuzzy Hash: 212128EB17C124BC7056C1862F5CAFA576FE9D27707B0842BF807D9902A2C91B5F1035
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 23745937bd939c8d92ba0fc2f0603eb10cdeec28903df5fbdbc1d1aba16c7881
                                                                                                                                                                      • Instruction ID: f66cc2bf4baca55d5274f06196d6fc094f9d6e5988329a84cfd92fc34f408522
                                                                                                                                                                      • Opcode Fuzzy Hash: 23745937bd939c8d92ba0fc2f0603eb10cdeec28903df5fbdbc1d1aba16c7881
                                                                                                                                                                      • Instruction Fuzzy Hash: 6C2123D717D1607DB112C0922EACAFA5B5FE9E37703B0846BF446D9946E2C91E4F5031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 4a6a91c1a7285ff77a7f839ab298dc452bb789e6444f6f950fbd462d45b5b716
                                                                                                                                                                      • Instruction ID: 254eea22506cdcb6ff0ca1b413f1ee8179fe247978c2a57112200d864e9b8fb9
                                                                                                                                                                      • Opcode Fuzzy Hash: 4a6a91c1a7285ff77a7f839ab298dc452bb789e6444f6f950fbd462d45b5b716
                                                                                                                                                                      • Instruction Fuzzy Hash: A91149EB17C024BCB052C1923B5CAFA5B6FE8D67703B08427F807D8902A2C91B4F1032
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: d25e9480e0c4e0a5dc77df71e471ceb2062214d6f1310a2b9fd7590219c3da33
                                                                                                                                                                      • Instruction ID: 8818d702ffa669b0f4b3ecce244ea2881f5c80d655e7e44148c889f351b5d8e9
                                                                                                                                                                      • Opcode Fuzzy Hash: d25e9480e0c4e0a5dc77df71e471ceb2062214d6f1310a2b9fd7590219c3da33
                                                                                                                                                                      • Instruction Fuzzy Hash: D71118EB17D124BCB012C0927F5CAFBA7AFE9D6B703B08426F407D4902A2C91A4F5035
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: fefe65fadcd821caf7e416f169b70ecbaa0795bcb9c6d21bb959e8b31ea715bc
                                                                                                                                                                      • Instruction ID: 4f2b7d39413a7c3181de2f4a179a1321994dc08850eb72710fef7cdebb30af24
                                                                                                                                                                      • Opcode Fuzzy Hash: fefe65fadcd821caf7e416f169b70ecbaa0795bcb9c6d21bb959e8b31ea715bc
                                                                                                                                                                      • Instruction Fuzzy Hash: 3301E5EB17D124BC7042C1823B5CAFA566FE8D67702B08427F807D4906A2C91F5E1035
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 4d6fa7e11d98c383dd29fcf2f6f229b7e7e86f6a6fb115e774231999387a8a5a
                                                                                                                                                                      • Instruction ID: 9d96dd6a8f2a586656946df0fd56b39073a752142c9dd181a5758b79f8a73053
                                                                                                                                                                      • Opcode Fuzzy Hash: 4d6fa7e11d98c383dd29fcf2f6f229b7e7e86f6a6fb115e774231999387a8a5a
                                                                                                                                                                      • Instruction Fuzzy Hash: 0901ADEB17D124BCB102D0523F6CAFA576FE8D27303B0882BF406D5446E2C95E8E5031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 28a2b5e33697914c71dcc728bcfaee56891260929ab5733d0a9351c236d15f15
                                                                                                                                                                      • Instruction ID: e1b09253dc6b4d7a69780b393322bfe66bc465b93f0fabdd6d68f89642c2a856
                                                                                                                                                                      • Opcode Fuzzy Hash: 28a2b5e33697914c71dcc728bcfaee56891260929ab5733d0a9351c236d15f15
                                                                                                                                                                      • Instruction Fuzzy Hash: 12F0C4EB16D125BC7152C1823B28EFB576EE4D6B703B1C827F806E5906A2C95F4E6031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 70f5c7c6f0f77c04556bf822a8a864cf046eee959915ab80371f6652d2eedf16
                                                                                                                                                                      • Instruction ID: 3f37de3bf892cf35f3dbb42127d1719199c5d5859e2ef5edb7738654fd77ea9a
                                                                                                                                                                      • Opcode Fuzzy Hash: 70f5c7c6f0f77c04556bf822a8a864cf046eee959915ab80371f6652d2eedf16
                                                                                                                                                                      • Instruction Fuzzy Hash: 680128AB13D1146EB102C1526A5DEFB67BEDDC6770370C817F442D6042D1D55E8B4031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: b4621909863a0e5487e0528a60f8710e55290992102001f0e19adbd11a88de59
                                                                                                                                                                      • Instruction ID: 4325af04c7771e4aa02ab7af0dc6a2867ffd5c144391d33f1175f158dd016134
                                                                                                                                                                      • Opcode Fuzzy Hash: b4621909863a0e5487e0528a60f8710e55290992102001f0e19adbd11a88de59
                                                                                                                                                                      • Instruction Fuzzy Hash: 5CF074EB17D125BC7015C1823B2CEFA576ED4D2B703B08827F406D4906A2C95E5E6035
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 88f85babc0f1a43446184761e9c16218bca2029316f948d12e4dc45480ae6a1f
                                                                                                                                                                      • Instruction ID: db950be174544e3185e7e27a28e258eefdf457ad136882c980cd64fa06abf905
                                                                                                                                                                      • Opcode Fuzzy Hash: 88f85babc0f1a43446184761e9c16218bca2029316f948d12e4dc45480ae6a1f
                                                                                                                                                                      • Instruction Fuzzy Hash: D5F0C9EB17D1257C7016C1923B28EFA532ED4D2B703B4C827F446D0806E6C95F5E5031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • FindCloseChangeNotification.KERNELBASE(00000000,00000000,CF830579,?,00828CD6,00000000,CF830579,00957178,0000000C,00828D92,0081D06D,?), ref: 00828E45
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ChangeCloseFindNotification
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2591292051-0
                                                                                                                                                                      • Opcode ID: 56e9705cc34dcdf7231e2145a510b3c93da3d00fc8d50b8839388137ff804d8d
                                                                                                                                                                      • Instruction ID: 4a852761a3e958679330afcaa3acee3b5601749fc657082a845ce5d1178447e4
                                                                                                                                                                      • Opcode Fuzzy Hash: 56e9705cc34dcdf7231e2145a510b3c93da3d00fc8d50b8839388137ff804d8d
                                                                                                                                                                      • Instruction Fuzzy Hash: BE116B3B60613496DE252238784AB7E678DEF92734F3B0A1EF814E71C2DE609CC08195
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: b28642a62cb2e938efce9755f530346c76ef92b65137ba81616c1778caa2b883
                                                                                                                                                                      • Instruction ID: 321fb46a5b803994c06b68ac246897026fb948d5ba68e619f4b102f0999129ff
                                                                                                                                                                      • Opcode Fuzzy Hash: b28642a62cb2e938efce9755f530346c76ef92b65137ba81616c1778caa2b883
                                                                                                                                                                      • Instruction Fuzzy Hash: 2CF058EB17E024AE7106C1927F29EFB576ED9D1B703B08827F44AE644292D91F8E5031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 9be9a75fd8231feeb1d52641a87d04c03d8351e6b1013c766eecd93b0ef9fbef
                                                                                                                                                                      • Instruction ID: 4f243d114e8a805ea578c4e400b5cc04a1ddfe8dbca9f8595cc9b517b0958d5e
                                                                                                                                                                      • Opcode Fuzzy Hash: 9be9a75fd8231feeb1d52641a87d04c03d8351e6b1013c766eecd93b0ef9fbef
                                                                                                                                                                      • Instruction Fuzzy Hash: C8F05EEB169264BDB502C1823B19FFB572ED9D2B713748827F40AD844291C90E4F5031
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • SetFilePointerEx.KERNELBASE(00000000,00000000,0081D0B7,00000000,00000002,00000000,00000000,00000000,00000000,?,00822646,00000000,00000000,0081D0B7,00000002,00000000), ref: 00822548
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FilePointer
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 973152223-0
                                                                                                                                                                      • Opcode ID: b9073459b28f009822238847db3c08ea46a3193d2fd19e980735c6fe6e1992ea
                                                                                                                                                                      • Instruction ID: 5a1a17bcb1ce007848d8c8f5a51bb7c1f5881d93570bff85ea40d72d15fa7b8f
                                                                                                                                                                      • Opcode Fuzzy Hash: b9073459b28f009822238847db3c08ea46a3193d2fd19e980735c6fe6e1992ea
                                                                                                                                                                      • Instruction Fuzzy Hash: CC0126326101297FCF09CF18EC1589E3B1AEF81320F244209F810DB290E671EDD2CB90
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • SetupDiGetClassDevsA.SETUPAPI(0093A560,00000000,00000000), ref: 008C30F8
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClassDevsSetup
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2330331845-0
                                                                                                                                                                      • Opcode ID: 53d91fec5231bca7402147bbc366b25fc65ad2df1f7199e4f8c7343f932d8a1b
                                                                                                                                                                      • Instruction ID: 0e4c184e01f58f91746d7cb37ddd799853e96004f1d8bec778b6d65d27ee3256
                                                                                                                                                                      • Opcode Fuzzy Hash: 53d91fec5231bca7402147bbc366b25fc65ad2df1f7199e4f8c7343f932d8a1b
                                                                                                                                                                      • Instruction Fuzzy Hash: C111CEB0D047489BE720DF28D946757BBF4EB00B28F10471EE851573C1E7B6AA5887D2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringA.KERNEL32(?,?,?,?,?,?), ref: 052E02DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080692211.00000000052E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 052E0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_52e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1096422788-0
                                                                                                                                                                      • Opcode ID: 9a4d34f5c34ca25722ce21f3be7e79ea8ab691032e2e483b2ad739a510eddec1
                                                                                                                                                                      • Instruction ID: 6c706b4db5c249f5c2e1ede3a35f42d533bdcc6647c973a8ec66fbbb7150e718
                                                                                                                                                                      • Opcode Fuzzy Hash: 9a4d34f5c34ca25722ce21f3be7e79ea8ab691032e2e483b2ad739a510eddec1
                                                                                                                                                                      • Instruction Fuzzy Hash: 7EF082EB1291647DB106C1923B19EFB572EC5D2B70370C43BF806D5442D5C90F5E5071
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 007E331F
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Concurrency::cancel_current_task
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 118556049-0
                                                                                                                                                                      • Opcode ID: 6ec4655adc9d8c581670169791bfeb4c3c4bb59604ad5d7a34e59d92e7cd2194
                                                                                                                                                                      • Instruction ID: ad8e2ea1f75825c429cbfcfb45ec6505d7f65dabcb6701e0b35d76ae333128a5
                                                                                                                                                                      • Opcode Fuzzy Hash: 6ec4655adc9d8c581670169791bfeb4c3c4bb59604ad5d7a34e59d92e7cd2194
                                                                                                                                                                      • Instruction Fuzzy Hash: 84F0B472501104DBCB146F69E419CE9B3ECEF283A1B10097AE88DC7612EB2ADA8197D1
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • RtlAllocateHeap.NTDLL(00000008,000000FF,00000000,?,0082A079,00000001,00000364,00000006,000000FF,00000000,00000000,?,00818A22,00000000,?), ref: 0082A68E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                      • Opcode ID: 9084892cf25b293186066fbf11715c2c8be037722446175b14bfd45c5fa7c63e
                                                                                                                                                                      • Instruction ID: c55d5295132f302a64baeaac7c0a6e2dc67d7a243936355b5c76d409cbe02820
                                                                                                                                                                      • Opcode Fuzzy Hash: 9084892cf25b293186066fbf11715c2c8be037722446175b14bfd45c5fa7c63e
                                                                                                                                                                      • Instruction Fuzzy Hash: A5F0B4321156366B9F6A6A66BC05B6A3749FF61760B1D4111AC08EA190DB20D88085E2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      • RtlFreeHeap.NTDLL(00000000,00000000,?,00831B36,?,00000000,?,?,00831DD7,?,00000007,?,?,008322CB,?,?), ref: 0082B022
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FreeHeap
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3298025750-0
                                                                                                                                                                      • Opcode ID: 15f0d645995cf8d13a7b60cc39845d2cf6a9fede6de5ab4f3c9db36cb14005bc
                                                                                                                                                                      • Instruction ID: b848cd398e63f361ae4c930be54563b1636573286a563d327cb1805637ee672b
                                                                                                                                                                      • Opcode Fuzzy Hash: 15f0d645995cf8d13a7b60cc39845d2cf6a9fede6de5ab4f3c9db36cb14005bc
                                                                                                                                                                      • Instruction Fuzzy Hash: 05E0CD31102624A6DF3137A8FC08B9D375AFF50754F280425F618D7150DF3888D082D5
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3072030296.00000000007E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 007E0000, based on PE: true
                                                                                                                                                                      • Associated: 00000009.00000002.3071977831.00000000007E0000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072030296.0000000000962000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.0000000000967000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096C000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072315180.000000000096F000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000974000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000B00000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000BC9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C09000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C11000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072417756.0000000000C20000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3072896101.0000000000C21000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073060707.0000000000DAD000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DAE000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB3000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073093292.0000000000DB6000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073205048.0000000000DB9000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      • Associated: 00000009.00000002.3073237386.0000000000DBA000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_7e0000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: H_prolog3
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 431132790-0
                                                                                                                                                                      • Opcode ID: 5a30a4b0ca73cae887ed59b186c75275599e0b5922cc36ac943d1f3944f09bc7
                                                                                                                                                                      • Instruction ID: 82481e0e868208e7abc9ef990c30cb7681553c914e9af80fbc3f1696c234890c
                                                                                                                                                                      • Opcode Fuzzy Hash: 5a30a4b0ca73cae887ed59b186c75275599e0b5922cc36ac943d1f3944f09bc7
                                                                                                                                                                      • Instruction Fuzzy Hash: 1BE09AB2D0020D9ADF10DFE8D542BEFB7BCFF04310F504066A245E6181EB7497858BA2
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: kZXZ
                                                                                                                                                                      • API String ID: 0-1435790286
                                                                                                                                                                      • Opcode ID: a3b6fdb64085411b9e1ad8f2b7f363fc8af86ba6976a488df551a78f3f6c7459
                                                                                                                                                                      • Instruction ID: 737a3bed20afb7b63e121a8318fba48031b1fd9e03691b4f0fe286e41fe88d1e
                                                                                                                                                                      • Opcode Fuzzy Hash: a3b6fdb64085411b9e1ad8f2b7f363fc8af86ba6976a488df551a78f3f6c7459
                                                                                                                                                                      • Instruction Fuzzy Hash: E901F7AB18C410AEB21AC591AA5DEF66B2EF1C27303B5941BFC47D4C01A2864B4D9030
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: kZXZ
                                                                                                                                                                      • API String ID: 0-1435790286
                                                                                                                                                                      • Opcode ID: bcc7112dd25cb9201c2ba34edf8a4769755dc9531c79d4183d17e1dbc0f398cd
                                                                                                                                                                      • Instruction ID: 7d43fde3e2c4dbe4aaf78cffb9b6c7ee6b6ce48e52d0f9127f08d26f54d1bd41
                                                                                                                                                                      • Opcode Fuzzy Hash: bcc7112dd25cb9201c2ba34edf8a4769755dc9531c79d4183d17e1dbc0f398cd
                                                                                                                                                                      • Instruction Fuzzy Hash: 34F0A9AB24C000AEA609C6916A6DDB67F6EF5C6730375946BF843D4C01E256874D5171
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080048564.0000000005250000.00000040.00001000.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5250000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 61bf127a62cf23ed950670dc36bd0021a7a567975d6431ef8a425cf89ce2ec16
                                                                                                                                                                      • Instruction ID: 6ed23b7416d2b1d27f985b904bc8f95c722dad80dfc28c235f7eb162530457ea
                                                                                                                                                                      • Opcode Fuzzy Hash: 61bf127a62cf23ed950670dc36bd0021a7a567975d6431ef8a425cf89ce2ec16
                                                                                                                                                                      • Instruction Fuzzy Hash: F7C145EB57D115BDB202C5826F5CBFAA76FEBD6730B30842AFC03E5542E2E80A495531
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080048564.0000000005250000.00000040.00001000.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5250000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 5d4b31751e0ac25c8276712c5b86ee63ffd5eb52e9c41654f4a69f4a29211753
                                                                                                                                                                      • Instruction ID: c66bd0cbb223d26a4b9913e77d8dc4e37ab2999b38631dfd27a108644d29a468
                                                                                                                                                                      • Opcode Fuzzy Hash: 5d4b31751e0ac25c8276712c5b86ee63ffd5eb52e9c41654f4a69f4a29211753
                                                                                                                                                                      • Instruction Fuzzy Hash: 073126FB52D265BDB202C5916F18AFA67AEDED37307318467FC42D6002E2E55E094131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080048564.0000000005250000.00000040.00001000.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5250000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: d42ae56562051b99e25061fe95b19c9deda92b4342937b515ecf274e9b594b98
                                                                                                                                                                      • Instruction ID: 04241a13a0f72e4b9c82a6e6ae4661c57143f5d7ccdfc43392f80d8c65eb2e4e
                                                                                                                                                                      • Opcode Fuzzy Hash: d42ae56562051b99e25061fe95b19c9deda92b4342937b515ecf274e9b594b98
                                                                                                                                                                      • Instruction Fuzzy Hash: 9531AFFB52C254BDF202C6916F58AFA67BEEEC6730731846BFC42D6102E2E95E095131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080048564.0000000005250000.00000040.00001000.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5250000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: bb1657b58833a7e1f4c5143c9c7212879c79add897305175788f46bce618b57e
                                                                                                                                                                      • Instruction ID: 0fbd80303bf52c25bd6e18ef57c5a11186085b471d3691fb9d16812836412a5a
                                                                                                                                                                      • Opcode Fuzzy Hash: bb1657b58833a7e1f4c5143c9c7212879c79add897305175788f46bce618b57e
                                                                                                                                                                      • Instruction Fuzzy Hash: 3F21B1FB52C224BDB202C1816F58AFA67AFEEC67307318427FC03D6102E2E95E095131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: f409759eb77b161d2d661e264a3aa75b2b4fc9cca48b02d5e75ed7f4c03d6a3f
                                                                                                                                                                      • Instruction ID: 69a785adc179e8acbdb53a57425d359aee15f5bdce249071d08aa7cf600da4ee
                                                                                                                                                                      • Opcode Fuzzy Hash: f409759eb77b161d2d661e264a3aa75b2b4fc9cca48b02d5e75ed7f4c03d6a3f
                                                                                                                                                                      • Instruction Fuzzy Hash: FB216DEB18C020BD750AC582AB6CEFA6B3FE1C6730371A42AFC07C4C02E2964B4D5176
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 786a5f307b1e4f5eb1d4a5d5eb05c6ffee2b7db4b4e40f2c7f4821afc5bfcf64
                                                                                                                                                                      • Instruction ID: 66fd4b7abf88f01f2e286a8a319c810f23b6f9979d1dfcfbc7dbcb965abed654
                                                                                                                                                                      • Opcode Fuzzy Hash: 786a5f307b1e4f5eb1d4a5d5eb05c6ffee2b7db4b4e40f2c7f4821afc5bfcf64
                                                                                                                                                                      • Instruction Fuzzy Hash: 3A117FEB19C120BDB10AC5826B6CEFA677FE1C6730371942AFC07D4C02E29A4B4D6172
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 85eddf423a4f793754e96630759ce413a9f71c83890f75ad4f79dca15ee6f51b
                                                                                                                                                                      • Instruction ID: 52e73c98491c488eb180e3c9d647e9026067d04eaa30086e80f6ba956a18ed4d
                                                                                                                                                                      • Opcode Fuzzy Hash: 85eddf423a4f793754e96630759ce413a9f71c83890f75ad4f79dca15ee6f51b
                                                                                                                                                                      • Instruction Fuzzy Hash: 0B113DEB19C120BE710AC5826B5CEFA672FE1C6730371942AFC07D4C02E29A4B4D6172
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: c7c065a36f4cecd136942c102ed446362d92d483f133dc27e7289a13f7474b0a
                                                                                                                                                                      • Instruction ID: 9bc4e48256e88661a906456dd7e97a3e047fd0364ad7c330eb8efe08e254b681
                                                                                                                                                                      • Opcode Fuzzy Hash: c7c065a36f4cecd136942c102ed446362d92d483f133dc27e7289a13f7474b0a
                                                                                                                                                                      • Instruction Fuzzy Hash: 0F111CAB14D124BEB50AC5826B1DEFA672EE1C2730371942AFD07D4C02E29A4B0D6171
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 2d0ee7a52d3975336208591dae6b4532d829876075d50e87849545d5832b89ec
                                                                                                                                                                      • Instruction ID: 952e01758ca4ce9f9e31db62a2a3af83d01a847262f1f87b5082f7a3e1318114
                                                                                                                                                                      • Opcode Fuzzy Hash: 2d0ee7a52d3975336208591dae6b4532d829876075d50e87849545d5832b89ec
                                                                                                                                                                      • Instruction Fuzzy Hash: 34111CAB14D120BDB10AC5816B6CEFA672FE1C6730771942AFC07D4C02E29A4B4D6132
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 577381f28a7fb96bade8ee79b61f1c97f8f50e952025a1a3ed2457f7baac5fe6
                                                                                                                                                                      • Instruction ID: 25946f1b1ec3398ba88305ebb3c27972890368d3c7708e53bfdcc81e2d63c67f
                                                                                                                                                                      • Opcode Fuzzy Hash: 577381f28a7fb96bade8ee79b61f1c97f8f50e952025a1a3ed2457f7baac5fe6
                                                                                                                                                                      • Instruction Fuzzy Hash: F711FBAB15D125BEB20AD5826B1DEFA672EE1C27307B1942BFC07D4C02E39A5B4D6131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080048564.0000000005250000.00000040.00001000.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5250000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 3ea822a2b7154507b0a86087832670e1625a2fb3a849c27d6bf1ebe145f5d6ff
                                                                                                                                                                      • Instruction ID: 11ca14f7b8baca7b18734a0c3322e1ae7c9eb60d663cf02b82c37be5a108d3b0
                                                                                                                                                                      • Opcode Fuzzy Hash: 3ea822a2b7154507b0a86087832670e1625a2fb3a849c27d6bf1ebe145f5d6ff
                                                                                                                                                                      • Instruction Fuzzy Hash: EC11C3BB52D255BEE211C5905F1CAFA77BAEFC2730B318466FC02E6002E2E55E094131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080048564.0000000005250000.00000040.00001000.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5250000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 9084b440b4ab4cca69810f0dcfce25bd3179c111e63714567215c7b473829d7d
                                                                                                                                                                      • Instruction ID: 8871830686ef6763fe258f922b5781719c7a09eef474c1570f6240522eafff69
                                                                                                                                                                      • Opcode Fuzzy Hash: 9084b440b4ab4cca69810f0dcfce25bd3179c111e63714567215c7b473829d7d
                                                                                                                                                                      • Instruction Fuzzy Hash: 3211B1FB62D255BDB201C5916F1CAFA677EEEC6730B35886AFC02E6102E2E55E094131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 8247bcd47c38273c54dad5e1288117396939976650d7421b6a4a2d8c7e9437d4
                                                                                                                                                                      • Instruction ID: fa9072e1d8c80d461afe6b8fa93e6a67aba7f447e65848169e58c726e53d1784
                                                                                                                                                                      • Opcode Fuzzy Hash: 8247bcd47c38273c54dad5e1288117396939976650d7421b6a4a2d8c7e9437d4
                                                                                                                                                                      • Instruction Fuzzy Hash: 2A011EAB18D014BDB61AC5826B2DEFA673FE1C67307B1D42BFD07D4C01A29A574D6131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: b1441c9889cf469d8777a24ecc346f2c2e27a0ae5f129428464d53fd0846e48b
                                                                                                                                                                      • Instruction ID: 49d442e0fa77953a980ee55ae5792174d1a31272630fadb5d7dbe3daaa7e6b31
                                                                                                                                                                      • Opcode Fuzzy Hash: b1441c9889cf469d8777a24ecc346f2c2e27a0ae5f129428464d53fd0846e48b
                                                                                                                                                                      • Instruction Fuzzy Hash: 26011EAB14C010BDB54AC5826B2CEFA673EE1D67307B1D427F807D0C02E39A570D5135
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 602115b643f0b1b0257d51036bd5057e933745d549cb4a878063c6d909d29d26
                                                                                                                                                                      • Instruction ID: 3a85d86142326f04b47dbb529bc4c960cab690e3fed3bc30bb4d5425fe620d5f
                                                                                                                                                                      • Opcode Fuzzy Hash: 602115b643f0b1b0257d51036bd5057e933745d549cb4a878063c6d909d29d26
                                                                                                                                                                      • Instruction Fuzzy Hash: A5012DAB14C114BE7209D5916B2CEFAAB3EE1D6730771D42BFD07E4C02E2964B0D5131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 7a677c43f72d7f1f2bb955a5eacae4aae62a34c413b4e1789a570833f532d284
                                                                                                                                                                      • Instruction ID: 118708fd68786c1c7a960f5e0b5203e3f3ea0e0b1315c538d0fb303a9d430487
                                                                                                                                                                      • Opcode Fuzzy Hash: 7a677c43f72d7f1f2bb955a5eacae4aae62a34c413b4e1789a570833f532d284
                                                                                                                                                                      • Instruction Fuzzy Hash: F001E9AB14D011BEB559C5826B2DEFA673EE2D27307B1942BFC47D0C02A396564D6131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3080048564.0000000005250000.00000040.00001000.00020000.00000000.sdmp, Offset: 05250000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5250000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: ed42c0cb5aa4e185f0d924ccff864cccb6757293a6fbebd9f0931a0a50ddae5f
                                                                                                                                                                      • Instruction ID: 04e9460cd1990734dc0ccee1284e7bfee2e159922b3b525e50d89e15ddc026b7
                                                                                                                                                                      • Opcode Fuzzy Hash: ed42c0cb5aa4e185f0d924ccff864cccb6757293a6fbebd9f0931a0a50ddae5f
                                                                                                                                                                      • Instruction Fuzzy Hash: D801C2FB62D255BDF201C6816F18AFEA76EEAD5734B318827FC02E2002E2E51E094131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: e4c72f2f17ed7d8abcfbc4205b8e458cc30417b0cdfc17f63bf2e193a8db0167
                                                                                                                                                                      • Instruction ID: f1eee624f8e35c70bebfdaa0381b3bc7182a4ec4a69d0b7cb39c1a8eee689f6c
                                                                                                                                                                      • Opcode Fuzzy Hash: e4c72f2f17ed7d8abcfbc4205b8e458cc30417b0cdfc17f63bf2e193a8db0167
                                                                                                                                                                      • Instruction Fuzzy Hash: 99F06DAB14C010AE624AC1826B2CEBA6B2EE1D23313B4942BF843D0C01A686570D5131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: c153aceee9f2f57b4c1195f7bb12b2fb31450ae9b6f8c357efdc1c2c2111ff96
                                                                                                                                                                      • Instruction ID: 9509667c587bbd489e9c2e288cb7cfb31c13a48ff35db202dd7280c44fb6cf15
                                                                                                                                                                      • Opcode Fuzzy Hash: c153aceee9f2f57b4c1195f7bb12b2fb31450ae9b6f8c357efdc1c2c2111ff96
                                                                                                                                                                      • Instruction Fuzzy Hash: FBF082AB18D010BEA115D6D1676CEF6AB7EE0DA330371A066F803D4C01A286464D9130
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%

                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000009.00000002.3081391249.0000000005350000.00000040.00001000.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_9_2_5350000_d361f35322.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: b3998abd4d043ac435c0aac22e074b386d993cc253a9837cc9f062f84c642258
                                                                                                                                                                      • Instruction ID: bb05c713f64dabd5e07b685b4813d51627498d0431e06391764df69d3858d913
                                                                                                                                                                      • Opcode Fuzzy Hash: b3998abd4d043ac435c0aac22e074b386d993cc253a9837cc9f062f84c642258
                                                                                                                                                                      • Instruction Fuzzy Hash: AAF030AB18D110BEA259D5D16B1DEFAAB2EB1C6731371942BF943E0C01A2D6470DA131
                                                                                                                                                                      Uniqueness

                                                                                                                                                                      Uniqueness Score: -1.00%